To search, Click below search items.
All Published Papers Search Service
Title
Detecting A Crypto-mining Malware By Deep Learning Analysis
Author
Shahad Aljehani and Hatim Alsuwat
Vol. 22 No. 6 pp. 172-180
Keywords
Crypto-mining, Crypto-jacking, Cryptography, Deep Learning, Detection
A Survey on Cloud Storage System Security via Encryption Mechanisms
Wejdan Alsuwat1 and Hatim Alsuwat
Vol. 22 No. 6 pp. 181-186
Cloud Storage, Cloud Security, Cloud Infrastructure, Cloud encryption, Limitations, and Advantages.
The Teacher¡¯s Role in the Context of Information Society
Natalia Dmitrenko, Oksana Voloshyna, Liudmyla Melnyk, Valentyna Hrebenova, Inna Mazur
Vol. 22 No. 6 pp. 187-193
transformation of the teacher¡¯s role, teacher¡¯s competencies, modification of the educational process, training of prospective teachers
Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network
Hanouf Aloufi1 and Hatim Alsuwat
Vol. 22 No. 6 pp. 194-202
Public Network, Wi-Fi, Security, Man in the middle attack, Cryptography, Survey.