To search, Click below search items.
All Published Papers Search Service
Title
Cyber Threat Intelligence Traffic Through Black Widow Optimisation by Applying RNN-BiLSTM Recognition Model
Author
Kanti Singh Sangher, Archana Singh, Hari Mohan Pandey
Vol. 23 No. 11 pp. 99-109
Keywords
Darknet, Deep Learning, Cyber Attack, Feature Selection, Feature Extraction..
A Review on Preserving Data Confidentiality in Blockchain-based IoT-Supply Chain Systems
Omimah Alsaedi, Omar Batarfi, Mohammed Dahab
Vol. 23 No. 11 pp. 110-116
Blockchain, Supply Chain, SCM, IoT, Confidentiality
Towards a UTAUT Model for Acceptance of MOOCs
Dr. Sara Jeza Alotaibi
Vol. 23 No. 11 pp. 117-127
e-learning, e-training, MOOCs, Massive Open Online Courses, UTAUT, Online Learning
A Blockchain Framework for Investment Authorities to Manage Assets and Funds
Vinu Sherimon, Sherimon P.C., Jeff Thomas, Kevin Jaimon
Vol. 23 No. 11 pp. 128-132
OIA, fund transfer, fund allocation, Hyperledger, blockchain networks.