To search, Click below search items.
All Published Papers Search Service
Title
Phishing Attacks on Cryptocurrency Traders in Arab States of The Gulf
Author
Sawsan Alshehri, Reem Alhotaylah, Marwa Alyami, Abdullah Alghamdi, Mesfer Alrizq
Vol. 24 No. 8 pp. 125-134
Keywords
Cryptocurrency, Ceybersecurity, Phishing Attack, Awareness, Privacy.
Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education
Waleed Alghaith
Vol. 24 No. 8 pp. 105-118
MCC, PMT, Security, adoption, Saudi Arabia.
Soft Computing Optimized Models for Plant Leaf Classification Using Small Datasets
Priya1 and Jasmeen Gill
Vol. 24 No. 8 pp. 72-84
Plant leaf classification; Artificial Neural Networks; Grasshopper Optimization Algorithm; Particle Swarm Optimization; optimization techniques
Experiment in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI
Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii
Vol. 24 No. 8 pp. 54-60
Policy-based network management; DACS Scheme; QOS