To search, Click below search items.
All Published Papers Search Service
Title
Hybrid Tensor Flow DNN and Modified Residual Network Approach for Cyber Security Threats Detection in Internet of Things
Author
Abdulrahman Mohammed Alshehri and Mohammed Saeed Fenais
Vol. 22 No. 10 pp. 237-245
Keywords
IoT, malware detection, software piracy, cyber security, data mining, Tensor flow DNN.
Cross-Project Pooling of Defects for Handling Class Imbalance
J. M. Catherine, S Djodilatchoumy2
Vol. 22 No. 10 pp. 11-16
Software Defect, Random Forest, Matthews Correlation Coefficient, Accuracy, Dataset Imbalance handling
Flow-based Reconnaissance Attacks Detection in SDN-based Environment
Abdulmohsen Alsaedi, Adel Alshamrani, and Talal Alharbi
Vol. 22 No. 9 pp. 747-755
software-defined networking; reconnaissance attack; flow-based.
Information Technology of Education in the Light of Vincent Ocon¡¯s Theory of Multi Sided Personality Learning
Krystyna Cha©©as, Oksana Dubinina, Tetiana Burlaienko, Tetiana Kravchynska
Vol. 22 No. 9 pp. 657-665
information technologies, Digital Twins, software, institution of general secondary education, theory of multifaceted personality education.