To search, Click below search items.
All Published Papers Search Service
Title
Ransomware, Threat and Detection Techniques: A Review
Author
SH Kok, Azween Abdullah, NZ Jhanjhi and Mahadevan Supramaniam
Vol. 19 No. 2 pp. 136-146
Keywords
Ransomware, Intrusion Detection (ID), Machine Learning (ML), Honeypot
Model in the Loop Simulation of Flexible Joint Manipulator under Uncertainties
Lilia Zouari, Mossaad Ben Ayed, Slim Chtourou, Mohamed Abid
Vol. 19 No. 2 pp. 126-135
Model In the Loop Simulation Flexible Joint Manipulator Uncertainties Hysteresis controller Fuzzy logic PI controller
Method of Numbers¡¯ Dichotomic Decomposition for Generation of Equal Probability Binary Sets
Rabah AlShboul, Vitaliy A. Romankevich
Vol. 19 No. 2 pp. 120-125
dichotomic decomposition, equiprobable binary vectors, pseudo-random generators.
Grouping of Aspects into Relevant Category Based on WordNet Definitions
Sheikh Muhammad Saqib, Shakeel Ahmad, Asif Hassan Syed, Tariq Naeem, Fahad Mazaed Alotaibi
Vol. 19 No. 2 pp. 113-119
Machine Translation, Information Retrieval, Sentiment Analysis, Aspect Extraction.