default search action
11th ISNCC 2024: Washington, DC, USA
- International Symposium on Networks, Computers and Communications, ISNCC 2024, Washington, DC, USA, October 22-25, 2024. IEEE 2024, ISBN 979-8-3503-6491-0
- Raid Boudi, Mohammed Lalou, Nardjes Bouchemal, Chirihane Gherbi:
Optimizing Latency in SD-IoT through Heterogeneous Traffic Flow-Based Controller Placement. 1-6 - Zaid Jabbar Al-Allaq, Wafaa Mohammed Ridha Shakir:
A Comprehensive Analysis of FSO Communications with UAV Technologies. 1-7 - Yahia Salman, Muhammad Irfan, Mohammad Shike, Suk-Jin Lee, Ahmad Salman:
Real-Time Emotion Recognition for Companion Robots Using Deep Learning and Edge Computing. 1-6 - Huilin Wang, Kun Liu, Lidong Zhu, Wenxuan Xie:
A Topology Reconfiguration Algorithm for Cross-Domain Multi-System Measurement and Control Network Based on Minimum Connectivity. 1-6 - Swarnamouli Majumdar, Mayur Srivastava, Aamir Khan:
Voice AI IoT Model for Rescue Operations Among First Responders for Disaster Management. 1-8 - Wenxuan Xie, Lidong Zhu, Yanjun Song, Huilin Wang:
A Non-Terrestrial Network Congestion Control Scheme Based on the SAC Method. 1-6 - Selma Benouadah, Shereen Ismail:
Mastering Water Sort Puzzle: A Reinforcement Learning Approach with Deep Q-Learning Techniques. 1-6 - Turki Al Lelah, George Theodorakopoulos, Amir Javed, Eirini Anthi:
Detecting the Abuse of Cloud Services for C&C Infrastructure Through Dynamic Analysis and Machine Learning. 1-7 - Tsega Weldu Araya, Muhammad Azam, Nizar Bouguila, Jamal Bentahar:
Multivariate Bounded Support Kotz Mixture Model with Minimum Message Length Criterion. 1-6 - Dimitriya Angelova Mihaylova, Georgi Iliev, Zlatka Valkova-Jarvis:
Methods for PCA Detection: An Efficiency Assessment Through Classification Metrics. 1-4 - Anteneh Girma, Antione Searcy, Adine Barrett:
Analysis of Privacy, Security, and Trust in the Internet of Things (IoT) Ecosystem. 1-8 - Timothy Joshua D. Chua, Marc Patrick C. Celon, Paul Grant R. Ilaga, Nestor Michael C. Tiglao:
Hardware Accelerated Vehicle Detection for Dynamic Traffic Scheduling. 1-6 - Eric Gyamfi, James Adu Ansere, Fatemeh Golpayegani:
Ontology-Based Reinforcement Learning for Semantic Offloading in MEC-Enabled 6G IoT Networks. 1-8 - Michele Luglio, Cesare Roseti, Francesco Zampognaro:
A Framework for the Virtualization of Satellite Gateways: The SURPRISE Project. 1-6 - Salman Ali, Cedric Gondro, Qiben Yan, Wolfgang Banzhaf:
A Distributed System for Optimization of Carbon Emitting Resource Consumption in Supply Chains. 1-8 - Jiaze Luo, Alma Oracevic:
Adaptive Machine Learning for Efficient Anomaly Detection in Autonomous UAVs Swarm Operations. 1-8 - Dejang Liu:
Business Intelligence Tools for Data Extractions Transformations and Visualizations. 1-4 - Sachinthani Alahakoon, Mustafa Muwafak Alobaedy, Yousef Fazea:
Conceptual Framework for the Optimization of Edge Device Workload Allocation in Wireless Body Area Networks. 1-5 - Yanhua Zhao, Vladica Sark, Milos Krstic, Eckhard Grass:
High-Efficiency Gesture Recognition Using Multiple mmWave FMCW RADARs. 1-5 - Osama Hamed, Mohammed Amer, Tarek Bejaoui:
Survey on Advancements in Machine Learning for Natural Language Processing. 1-6 - Mubark Alghamdi, Ivica Kostanic:
Command, Control and Communications for Unmanned Aereal Systems in C-Band. 1-6 - Faiza Tahsin, Hafsa Ennajari, Nizar Bouguila:
Author Dirichlet Multinomial Allocation Model with Generalized Distribution (ADMAGD). 1-7 - Terunobu Inaba, Yutaka Ishikawa, Atsushi Igarashi, Taro Sekiyama:
Rabbit: A Language to Model and Verify Data Flow in Networked Systems. 1-8 - Imtiaj Uddin Ahamed, Al-Amin Hossain, Uchchas Das Gupta, Imam Uddin Ahamed, Ayvee Nusreen Anika, Alvee Islam:
Synergistic Machine Learning Approaches for Early Lung Cancer Detection and Improved Prognostics. 1-6 - Anwar Alyatama, Abdullah Alshaibani:
Neural Networks for Predicting Relative Cost. 1-6 - Karthika Satheesh, Kamal Deep Singh, Sid Ali Hamideche, Marie-Line Alberi-Morel, César Viho:
User Environment Detection Using Long Short-Term Memory Autoencoder. 1-6 - Harsha Nutalapati, Sachin Velmurugan, Nestor Michael C. Tiglao:
Coding Buddy: An Adaptive AI-Powered Platform for Personalized Learning. 1-6 - Maged Abdullah Esmail:
Intrusion-Localization Method Using Distributed Optical Sensing. 1-6 - Li Wang, Shiyue Hou, Yiming Xie, Ningfang Mi:
Uncovering the Impact of Bursty Workloads on System Performance in Serverless Computing. 1-6 - Anil Kumar Prajapati, Emmanuel S. Pilli, Ramesh Babu Battula, Krishan Pal Singh:
Securing RPL-Based IoT Networks: A Hyperparameter Based Deep Learning Approach for Intrusion Detection. 1-6 - Fatima Zahra Rabahi, Nagore Merino Herran:
Enhancing 5G Indoor Device-to-Device Communications Through a Reinforcement Learning Algorithm. 1-6 - Jayson P. Rogelio, Elmer P. Dadios, Argel A. Bandala, Raouf Naguib, Ryan Rhay Vicerra, Edwin Sybingco, Laurence A. Gan Lim:
6D Pose Estimation and Correction for Fully Occluded 3D Model X-Ray Source Using Deeplabv3 Utilizing Mobilenetv2 Backbone and Dense Fusion Algorithm. 1-8 - Mohammed El-Amine Mahlia, Slimane Mekaoui, Mohamed Lamine Tounsi:
Design of a Multiband Microstrip Circular $4\times 4$ Array Antenna for 5G Millimeter-Wave Applications. 1-6 - Prithvi Sairaj Krishnan:
The Deep Dive into the Use of Image Processing and Object Detection to Identify Pneumonia. 1-9 - Thomas Cox, Ibrahim Badawi, Mohamed Abu Sharkh:
Predicting Public Sentiment to Proposed Laws: E-waste Management Laws as a Use Case. 1-6 - Ndala Yves Mulongo, Monica Lusamba:
Evolution of Industry 4.0 In Manufacturing Sectors: Insight On Prisma Approach. 1-6 - Dustin Sutanto, Febri Fransisca, Steven Liem, Andry Chowanda, Yohan Muliono, Zahra Nabila Izdihar:
Machine Learning for Threat Detection. 1-6 - Omar Otoniel Flores-Cortez, Carlos Osmin Pocasangre, Fernando Arévalo, David Adriel Solis, Jefry Orlando Comayagua, Benancio Henríquez Miranda:
IoT for CO2 Surveillance in Volcanic Soil Using a Web-Based Monitoring and the LI-830 sensor. Study case in Cerro Pacho, El Salvador. 1-5 - Dalia Ammar Khodja, Sreejith V. Nair, Ryan S. Adams, Ronald A. Fevig, Maleeha Altaf:
Development of a Priority Queue-Based Protocol Stack for Handling Different Traffic Classes. 1-6 - Ndala Yves Mulongo:
Key Performance Indicators of Artificial Intelligence For IT Operations (AIOPS). 1-8 - Harsha Nutalapati, Amna Hayat, Renzheng Zheng, Calvin Huan Li, Nicholas Prakoso, Nestor Michael C. Tiglao:
Machine Learning-Based Predictive Analytics for Customer Churn in the Telecom Industry. 1-6 - Guillaume Terrier, Cédric Gueguen, Yassine Hadjadj Aoul:
Adaptative Artificial Intelligence for Efficiency Schedulers Provider in Wireless Networks. 1-7 - Edafe Maxwell Damatie, Amna Eleyan, Tarek Bejaoui:
Real-Time Email Phishing Detection Using a Custom DistilBERT Model. 1-6 - Zahraa El Attar, Kevin Hoarau, Yassine Hadjadj Aoul, Géraldine Texier:
RGCN for Beyond Pairwise Training: Generalizing Monitors Selection in Network Tomography. 1-6 - Jorge Munilla, Mike Burmester, Pino Caballero-Gil:
Cryptanalysis of TRUTH: Fixing a Protocol to Make it 5G-Compliant. 1-6 - Xiao Hu, Umit Karabiyik:
Shopping While Watching: An Updated Forensic Analysis of TikTok on Android and iOS. 1-8 - Vinicius Lima, Umit Karabiyik:
Identifying Media Storage Locations in Baby Camera Apps: A Mobile Forensic Approach. 1-7 - Yiming Xie, Pinrui Yu, Geng Yuan, Xue Lin, Ningfang Mi:
Adaptive Homogeneity-Based Client Selection Policy for Federated Learning. 1-6 - Ameni Boumaiza, Kenza Maher:
AI-Powered Framework for Predicting Renewable Energy in Peer-to-Peer Trading. 1-7 - Oras Baker, Wei Li, Qing Yuan:
Advanced Human Motion Detection and Precision Movement Measurement via Mobile Devices Using YOLOv8, R-CNN, and Augmented Reality. 1-6 - Bryan Chiu, Anson Ho, Abraham Lu, Bosco Lee, Leo Li, Matthew Yau:
CircularX Regenerative Resources DePIN. 1-8 - Sameera Siddiqui:
Design Considerations for Next Generation Software-Defined Federated Satellite Networks. 1-4 - Patrick Arndt, Karol Niewiadomski, Dietmar Tutsch:
Hardware Accelerated Matrix Multiplication for Embedded Systems. 1-6 - Amar Amouri, Mohamad Mahmoud Al Rahhal, Yakoub Bazi, Ismail Butun, Imad Mahgoub:
Enhancing Intrusion Detection in IoT Environments: An Advanced Ensemble Approach Using Kolmogorov-Arnold Networks. 1-6 - Weria Ghazizadeh, Puya Ghazizadeh:
Analyzing the Impact of COVID-19 on U.S. Employment Through Data Visualization. 1-5 - Miftahul Qorib, Junwhan Kim:
Fake Tweets Detection and Its Impacts on the 2020 U.S. Election Prediction. 1-6 - Haythem Chaker, Houcine Chougrani, Symeon Chatzinotas, Joel Grotz:
Flexible MEO Down-Link Beamforming Using Constrained Clustering for Near-Optimal Load-Balancing. 1-7 - Ahmed Shafee, Tasneem A. Awaad, Ahmed Moro:
Robust In-Vehicle Diagnostic-Based Intrusion Detection System. 1-7 - Rua Y. Aburasain, Awatef Balobaid:
Hybrid Deep Learning with Optimized Hyperparameters Based Intrusion Detection in Internet of Things for Smart Farming. 1-8 - Antoine Le Borgne, Xavier Marjou, Fanny Parzysz, Tayeb Lemlouma:
Estimating the Benefits of a Multi-Operator Approach to Enhance Cellular Connectivity of Drones. 1-6 - Christopher Dube, Wassila Lalouani:
Digital Fingerprint for Intelligent Autonomous Vehicle Security. 1-6 - Vaibhav Bhosale, Navrati Saxena, Ketan Bhardwaj, Ada Gavrilovska, Abhishek Roy:
Efficient Cross-Frequency Beam Prediction in 6G Wireless Using Time Series Data. 1-6 - Tosin Ige, Christopher Kiekintveld, Aritran Piplai, Amy Wagler, Olukunle Kolade, Bolanle Hafiz Matti:
Towards an in-Depth Evaluation of the Performance, Suitability and Plausibility of Few-Shot Meta Transfer Learning on An Unknown Out-of-Distribution Cyber-attack Detection. 1-6 - Navaneetha Channiganathota Manjappa, Nebojsa Maletic, Lara Wimmer, Eckhard Grass:
Analysis of IQ Imbalance Effects on Physical Layer Secure Key Generation in mmWave Systems. 1-6 - Michael Shultz, Christopher Rouff, Ali Tekeoglu:
Autonomic IoT Pet Health Monitoring System. 1-6 - Shiyue Hou, Nathan R. Tallent, Li Wang, Ningfang Mi:
Performance Analysis of Data Processing in Distributed File Systems with Near Data Processing. 1-6 - Yuvaraj Munian, Izzat Alsmadi, Garrett Crumrine:
AlexNet and Convolutional Neural Network Analysis in Thermogram Images for Automobile Application Using High Performance Computing. 1-8 - Tasneem Duridi, Derar Eleyan, Amna Eleyan, Tarek Bejaoui:
Arabic Fake News Detection Using Machine Learning Approach. 1-7 - Md Ahnaf Akif, Ismail Butun, Imad Mahgoub:
Harnessing Machine Learning for Enhanced Internet of Things (IoT) Security and Attack Detection. 1-6 - Ndala Yves Mulongo:
Optimisation of Manufacturing Workflow Through Generative Artificial Intelligence. 1-6 - Al-Amin Hossain, Imtiaj Uddin Ahamed, Uchchas Das Gupta, Ayvee Nusreen Anika, Alvee Islam, Utsha Saha:
Exploring Sleep Patterns and Behavioral Components for Stress Detection: A Machine Learning Approach. 1-6 - Cesare Roseti, Francesco Zampognaro:
Framework for the Applicability of the QUIC Over Broadband Satellite Networks. 1-6 - Mahmudul Hasan, Sachin Shetty, Peter B. Foytik:
Enhancing Sentiment Analysis with Attention Mechanism and Bayesian-Lipschitz Recurrent Neural Networks. 1-4 - Rishabh Goel, Yizi Xiao, Ramin Ramezani:
Transformer Models as an Efficient Replacement for Statistical Test Suites to Evaluate the Quality of Random Numbers. 1-6 - Rasika Nilaweera Kalahe-Wattege, Fernando Beltrán:
Enhancing Throughput for 5G NR-U and WiFi Networks in 6GHz Shared-Spectrum. 1-6 - Rajon Bardhan, Raymond Garay-Paravisini, Gokila Dorai, Logan VanPutte:
Digital Forensics Analysis of a Financial Mobile Application: Uncovering Security and Privacy Implications. 1-8 - Mahfuza Farooque, Matthew Walter, Aaron Falk:
NeuroDual: A Hybrid SAT Solver Combining Graph Attention Networks with Algorithmic Techniques. 1-4 - Ndala Yves Mulongo:
Navigating The Interplay Between Artificial Intelligence And Managerial Skills. 1-4 - Hemant Gupta, Amiya Nayak:
Access Control in Vehicle to Emergency Services (V2S) Communicating Over MQTT-SN. 1-6 - Wafa Mehrez, Monia Najjar:
Ultra Compact and High Contrast Ratio 4x2 Encoder Based on 2D Photonic Crystal Coupler. 1-6 - Yulia Kumar, C. Paredes, G. Yang, J. Jenny Li, Patricia Morreale:
Adversarial Testing of LLMs Across Multiple Languages. 1-6 - Mohammed Amer, Farid Abu-Sada, Ahmad Abu-Hantash, Moath Abu-Readi, Mahmoud Elsisi, Tayma Daqa, Alya Dababat, Tarek Bejaoui:
Reliable Computer Vision With IoT for Fluid Filling Machines. 1-7 - Sayeed Ahmed, Tet Yeap, Sabbir Ahmed, Iluju Kiringa:
Ambient Light Impact on Power Reception in Outdoor VLC: A Distance-Based Analysis. 1-7 - Baker Al Smadi, Jhada Carmel, Bennie D. Ferguson:
The Kiosk Fraud Detection System. 1-5 - Mahdi Attawna, Tung V. Doan, Frank H. P. Fitzek, Giang T. Nguyen:
StateProc: Empowering Network Functions with Enhanced Processing Capabilities in Edge Clouds. 1-6 - Jihene Rezgui, Antoine Bolduc, Enric Soldevila, Yousra Azmour, Fadner Dieujuste Richardson:
Accessible Time Interval Based Local Positioning System: Applications for Self-Driving Cars in Smart Cities. 1-7 - Yathartha Patankar, Kanika Sood:
A Hybrid Approach for Fraudulent Transaction Detection: SMOTE-Autoencoder Framework. 1-8 - Horace Mingo:
Enhancing Sentiment Analysis with Logistic Regression and NLP: A Case Study of 2023 Amazon Software Reviews. 1-8 - Michele Luglio, Cesare Roseti, Mattia Quadrini, Francesco Zampognaro:
Definition of Satellite Systems Role in Integrated Access Backhaul (IAB) Architectures. 1-6 - Mohammad Hajarian, Paloma Díaz, Ignacio Aedo:
On Privacy, Security and Trust for Misuse Prevention in Social Networks. 1-4 - Dixuan Hu, Lidong Zhu, Qiangjian Song, Yong Zhang:
Low Peak Sidelobe Level Beamforming with Minimum Movable-Antenna Array Size. 1-5 - Recep ÖZbay, Uraz Yavanoglu:
Leveraging Artificial Intelligence for Active Cyber Defense Against to Advanced Persistent Threats to Homeland Security. 1-6 - Aliaa H. Abbas, Wasan A. Wali:
A Cylindrical Microwave Plasma Reactor Simulation Using COMSOL Multiphysics for CO2 Dissociation in Pure and Gas Mixture Streams. 1-7 - Elyson De La Cruz, James C. Hyatt, Geeta Sandeep Nadella, Hari Gonaygunta, Sai Sravan Meduri, Anna Marie De La Cruz:
Government Cybersecurity Data Analytics System Success: An Exploratory Study of Technology and Organization. 1-6 - Abdallah Moubayed:
Comparing Boosting-Based and GAN-Based Models for Intrusion Detection in 5G Networks. 1-6 - Maiada Mahmoud, Yasser Omar Youssef, Ayman Abdel-Hamid:
An Explainable Intelligent Intrusion Detection System. 1-6 - Yousef Fazea, Mustafa Muwafak Alobaedy, Mohamed Alsamman, Fathey Mohammed:
Coherence Big Data Space Division Multiplexing. 1-4 - Kanwalinderjit Kaur, Priscilla Zavala:
Analysis of Signal Propagations Between an Access Point and IoT Devices in a Complex Indoor Environment Using Ray Tracing. 1-7 - Alexandria Macko-Dobrovic, Justin Verhosek, Joshua Buxton, Brian Krupp:
Comparative Analysis of LoRa Antennae for Low-Cost IoT Deployments. 1-6 - Ainur Daurembekova, Hans D. Schotten:
Unified 3D Networks: Dynamic RAN Functions Placement and Link Challenges. 1-6 - Bruce Hartpence, Daryl Johnson, Bill Stackpole, Andres Kwasinski:
RIT Network and Security Dataset Collections. 1-6 - Rahul Singh Gulia, Amlan Ganguly, Andres Kwasinski, Michael E. Kuhl, Ehsan Rashedi, Clark Hochgraf:
Automated Warehouse 5G Infrastructure Modeling Using Variational Autoencoders. 1-6 - Md. Sipon Miah, Mingbo Niu, Ana García Armada:
Secure Spectrum Sensing in CR-IoT Networks: A Hybrid DL-ViT-GRU. 1-5 - Stephanie M. Opoku, Habib Louafi, Malek Mouhoub:
IoT Device Identification based on Network Traffic Analysis and Machine Learning. 1-8 - Hisham Sager, Tufik M. Buzid, Abdeljawad E. Ramadan:
Is Ultra-Wideband UWB Reconfigurable to Bluetooth? 1-4 - Wen He, Zhiyuan Tan, Lidong Zhu, Ying Zhang, Heyun Yan, Kun Liu:
Research on Intelligent Decision Algorithm of Satellite Communication System for Complex Electromagnetic Environment. 1-5 - Juan Ignacio Iturbe Araya, Helena Rifà-Pous:
Impact of Dataset Composition on Machine Learning Performance for Anomaly Detection in Smart Home Cybersecurity. 1-10 - Shengkai Sam Xu, Sam Shue:
Real-Time Object Detection Algorithm Performance on Edge Computing Devices. 1-5 - Yufeng Gong, Umit Karabiyik:
Forensics Analysis of Android Social Networking Application: Tencent QQ Revisited. 1-8 - Tosin Ige, Christopher Kiekintveld, Aritran Piplai, Amy Wagler, Olukunle Kolade, Bolanle Hafiz Matti:
An in-Depth Investigation Into the Performance of State-of-the-Art Zero-Shot, Single-Shot, and Few-Shot Learning Approaches on an Out-of-Distribution Zero-Day Malware Attack Detection. 1-6 - Babar Shah, Muhammad Junaid, Mohammad Habib:
Enhancing IoT Protocol Security Through AI and ML: A Comprehensive Analysis. 1-7 - Edem Dawson, Mawuena Komla Ackotia, Joseph Apiriala-Atedoghu, Paul Obeng, Grace Oletu:
Design and Construction of an Automatic Hand Washing Dispenser. 1-4 - Sheeja Rani S, Raafat Aburukba, Khaled El-Fakih:
Enhancing Cloud Data Security with Davies-Meyer Hash and Gestalt Pattern Matching in Blockchain. 1-6 - Anita Priyadarshini, Durai Pandian:
Sustainable Energy Efficient Unmanned Aerial Vehicles with Deep Q-Network and Deep Deterministic Policy Gradient. 1-6 - Kashif Islam, Syed Farrukh Hassan, Alexander Orel:
An Architecture for Edge Driven Networks. 1-5 - Oussama Ghorbel, Iteb BenMoussa, Mariem Turki, Raouia Khelif, Mohamed Kharrat, Mohamed Abid:
Water Leak Detection Using Machine Learning Method Based on Wireless Sensor Networks. 1-6 - Wichakorn Angathipatr, Chinnawat Panjan, Pradya Prempraneerach, Pvin Kesa, Parima Kesa:
WiFi-Enable Oxygen Enrichment Device. 1-4 - Ndala Yves Mulongo:
Best Practices of Machine Learning System Operations (MLOPS) In The South African Manufacturing Industry. 1-6 - Anatolii Kargin, Tetyana Petrenko:
Feeling Artificial Intelligence. Cognitive Decision-Making Model Borrowed from Living Beings. 1-6 - Sijin Ren, Gautam Siwach, Cheryl Qing Li:
Enhancing Transfer Learning Network Classification Accuracy on Degraded Images by Network Structural Modification. 1-6 - Preetha Evangeline D, Atma R. Sahu, Anandhakumar P:
Framework for Optimizing Distribution of Deep Neural Network Inference Tasks across Computing Networks. 1-7 - D. M. Ruiz, A. Watson, Yulia Kumar, J. Jenny Li, Patricia Morreale:
An AI-Powered Digital Foundation Recommender System. 1-7 - Seth Barrett, Calvin Idom, German Zavala Villafuerte, Andrew Byers, Berk Gülmezoglu:
Ain't How You Deploy: An Analysis of BGP Security Policies Performance Against Various Attack Scenarios with Differing Deployment Strategies1. 1-8 - Aseel Habeeb Gatea, Alaa Al-Ibadi, Musaab Adil Ali:
Smart Office Solutions: Monitoring and Enhancing Environmental Quality for Optimal Workplace Performance. 1-6 - Iman I. M. Abu Sulayman, Abdelkader Ouda:
SUP: Security User Profiles for Behavioral Data Platforms. 1-7 - Kawtar Oukil, Zouhair Chiba, Khalid Moussaid, Noreddine Abghour:
Green Cloud Computing: A Literature Review on the Current State of Research. 1-6 - Rim Moussa, Tarek Bejaoui:
Balancing the Complexity of Data Pipeline Engineering: A Technological Landscape Where Human Expertise Meets Large Language Models. 1-6 - Abhinanda Dutta, Abhishek Roy, Navrati Saxena, Steven Weber:
Predictive Optimal Channel Allocation in Integrated Sensing, Communication and Computation Systems. 1-6 - David Baldassin, Ludovic Roux, Guillaume Urvoy-Keller, Dino Martin López-Pacheco:
Assessing the Interplay between WebRTC and QUIC Congestion Control Algorithms. 1-6 - Abbas Hussein Ali, Uraz Yavanoglu:
Challenges of Integrating Blockchain Technology into Educational Institutions. 1-6 - Rika Zakiyyah, Daniel Permana, Devan Valenecio, Andry Chowanda, Yohan Muliono, Zahra Nabila Izdihar:
Security Challenges and Issues in Cloud Computing. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.