To search, Click below search items.
All Published Papers Search Service
Title
Preventive Techniques of Phishing Attacks in Networks
Author
Muhammad Adil
Vol. 25 No. 8 pp. 161-169
Keywords
Network Security, Information security, Malware, Phishing, Spam, Social engineering, and machine learning, Anti-Phishing.
Big Data Technology Evaluation, Selection, Analytics and Adoption: A Developing Country Perspective
Anas Jebreen Atyeh, Mohammed-Issa Riad Mousa Jaradat and Omar Suleiman Arabeyyat
Vol. 25 No. 8 pp. 148-160
Big data; big data analytics (BDA), BDA platform, Goal programming, intuitionistic fuzzy numbers; multi criteria group decision making; adoption; Jordan.
A Goal Programming Model for Ranking Product Aspects in Customer Reviews
Saif A. Ahmad Alrababah and Anas Jebreen Atyeh
Vol. 25 No. 8 pp. 139-147
product aspect, MCDM, GP, aspect ranking, deviation degree
High-speed and Secure Elliptic Curve Cryptosystem for Multimedia Applications
Mohammad Alkhatib
Vol. 25 No. 8 pp. 124-138
Elliptic curves cryptosystem, Performance, Binary method, Projective Coordinates, Security applications.