To search, Click below search items.
All Published Papers Search Service
Title
Energy Efficient Software Development Techniques for Cloud based Applications
Author
Aeshah A. Alsayyah and Shakeel Ahmed
Vol. 23 No. 7 pp. 119-130
Keywords
Cloud Computing, Energy-efficient, Software Development Life cycle, Parameterized development, Green computing.
CRF Based Intrusion Detection System using Genetic Search Feature Selection for NSSA
Azhagiri M, Rajesh A, Rajesh P, and Gowtham Sethupathi M
Vol. 23 No. 7 pp. 131-140
Network Security Situational Awareness (NSSA), Intrusion Detection System (IDS), Network Security, Intelligent Systems, Conditional Random Fields(CRF), Feature selection, Machine learning.
Original Identifier Code for Patient Information Security
Ahmed Nagm and Mohammed Safy
Vol. 23 No. 7 pp. 141-148
Patient information; data payload; spatial domain; Medical image watermarking; Data Integrity Protection.
Use of Blockchain to Support the Security of Internet of Things-A Review
Saher Un Nisa, Maryam Khalid
Vol. 23 No. 7 pp. 149-154
IoT (Internet of things), security, Privacy, Blockchain , Centralized , Decentralized.