default search action
Journal of Internet Services and Information Security, Volume 13
Volume 13, Number 1, January 2023
- Latifah Alamer:
Intelligent Health Risk and Disease Prediction Using Optimized Naive Bayes Classifier. 1-10 - Lil oja, P. Ranjana:
An Intrusion Detection System Using a Machine Learning Approach in IOT-based Smart Cities. 11-21 - Rahmawan Santoso, Tandiyo Rahayu, Sugi Harto, Heny Setyawati:
Software Development Tools with Android Base for Skills Data Collection in Physical Education. 22-33 - K. Malathi, R. Anandan, J. Frank Vijay:
Cloud Environment Task Scheduling Optimization of Modified Genetic Algorithm. 34-43
Volume 13, Number 2, May 2023
- Meryem Ammi:
Cyber Threat Hunting Case Study using MISP. 1-29 - Zulfani Sesmiarni, Gusnita Darmawati, Yulifda Elin Yuspita, Saiful Yeri, Ilian Ikhsan:
Android-Based Augmented Reality: An Alternative in Mastering Tajweed for Student Learning. 30-47 - Akila R., S. Revathi:
Fine Grained Analysis of Intention for Social Media Reviews Using Distance Measure and Deep Learning Technique. 48-64 - Alaa Obeidat, Rola Yaqbeh:
Business Project Management Using Genetic Algorithm for the Marketplace Administration. 65-80 - Kritsanapong Somsuk, Sarutte Atsawaraungsuk, Chanwit Suwannapong, Suchart Khummanee, Chalida Sanemueang:
The Variant of Digital Signature Algorithm for Constant Message. 81-95 - J. Brindha Merin, W. Aisha Banu, K. Fahima Sanobar Shalin:
Semantic Annotation Based Effective and Quality Oriented Web Service Discovery. 96-116 - Richard Romero, Raúl A. Sánchez-Ancajima, Javier A. López-Céspedes, Miguel A. Saavedra-López, Segundo Juan Sánchez Tarrillo, Ronald M. Hernández:
Security Model for a Central Bank in Latin America using Blockchain. 117-127 - K. Vimal Kumar Stephen, V. Mathivanan, Antonio Rutaf Manalang, Prajith Udinookkaran, Rudiardo Percival Niñalga De Vera, Mohammed Tariq Shaikh, Faiza Rashid Ammar Al-Harthy:
IOT-Based Generic Health Monitoring with Cardiac Classification Using Edge Computing. 128-145 - B. S. Venkatesh Prasad, H. R. Roopashree:
Energy Efficient Secure Key Management Scheme for Hierarchical Cluster Based WSN. 146-156 - Mohamed El Bekri:
Dynamic Inertia Weight Particle Swarm Optimization for Anomaly Detection: A Case of Precision Irrigation. 157-176 - Madhavi M, Sasirooba T., Kranthi Kumar G.:
Hiding Sensitive Medical Data Using Simple and Pre-Large Rain Optimization Algorithm through Data Removal for E-Health System. 177-192 - Laith Abdul Raheem Al anzy, Ahmed Aizaldeen Abdullah, Ali Kahtan Lilo Aquraishi:
IoT Cloud System Based Dual Axis Solar Tracker Using Arduino. 193-202 - Matthew Evans Audric Rengkung, Arya Wicaksana:
RSA Prime Factorization on IBM Qiskit. 203-210 - Mahmoud E. Farfoura, Osama Ahmed Khashan, Hani A. Omar, Yazn Alshamaila, Nader Abdel Karim, Hsiao-Ting Tseng, Mohammad Alshinwan:
A Fragile Watermarking Method for Content-Authentication of H.264-AVC Video. 211-232 - Varshavardhini S:
An Efficient Feature Subset Selection with Fuzzy Wavelet Neural Network for Data Mining in Big Data Environment. 233-248
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.