To search, Click below search items.
All Published Papers Search Service
Title
Authentication Techniques in Cloud and Mobile Cloud Computing
Author
Mahamudul Hasan, Md. Hasnat Riaz, Md. Auhidur Rahman
Vol. 17 No. 11 pp. 28-39
Keywords
Could Computing, Mobile Cloud computing, Authentication, Confidentiality, Integrity.
WSN Multi-Tier MDC GRID based Routing Protocol to mitigate Financial Impact
Farhan A. Siddqui, Muhammad Saeed, Jibran R. Khan, Muhammad Arshad, Nasir Touheed
Vol. 17 No. 11 pp. 20-27
Wireless Sensor Networks, Multitier Architecture, Energy efficiency, Mobile Data Collector, Financial Gain, Agri-Business
Analyzing the Dynamics of Particulate Matters (PM) using Nonlinear Dynamical Techniques and Predicting the Behavior Based on Robust Regression Models
Sharjil Saeed Adnan Idris, Lal Hussain, Imtiaz Ahmed Awan
Vol. 17 No. 11 pp. 6-19
Complex correlation measure, Lyapunov exponent, Particulate matter, Phase space reconstruction, Poincare plot, Gaussian process regression, support vector regression, root mean squared error
Cultural impact on Users¡¯ Ability to protect themselves against Phishing websites
Ibrahim Mohammed Alseadoon, Rabie A. Ramadan and Ahmed Y. Khedr
Vol. 17 No. 11 pp. 1-5
Phishing, behavior, scam, culture, impact, websites, emails, vulnerability.