To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10750

Title

Preventive Techniques of Phishing Attacks in Networks

Author

Muhammad Adil

Citation

Vol. 25  No. 8  pp. 161-169

Keywords

Network Security, Information security, Malware, Phishing, Spam, Social engineering, and machine learning, Anti-Phishing.


Title

Big Data Technology Evaluation, Selection, Analytics and Adoption: A Developing Country Perspective

Author

Anas Jebreen Atyeh, Mohammed-Issa Riad Mousa Jaradat and Omar Suleiman Arabeyyat

Citation

Vol. 25  No. 8  pp. 148-160

Keywords

Big data; big data analytics (BDA), BDA platform, Goal programming, intuitionistic fuzzy numbers; multi criteria group decision making; adoption; Jordan.


Title

A Goal Programming Model for Ranking Product Aspects in Customer Reviews

Author

Saif A. Ahmad Alrababah and Anas Jebreen Atyeh

Citation

Vol. 25  No. 8  pp. 139-147

Keywords

product aspect, MCDM, GP, aspect ranking, deviation degree


Title

High-speed and Secure Elliptic Curve Cryptosystem for Multimedia Applications

Author

Mohammad Alkhatib

Citation

Vol. 25  No. 8  pp. 124-138

Keywords

Elliptic curves cryptosystem, Performance, Binary method, Projective Coordinates, Security applications.


[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [next] ... [2688]