[PDF][PDF] Attack and anomaly detection in iot networks using machine learning techniques: A review
SH Haji, SY Ameen - Asian J. Res. Comput. Sci, 2021 - researchgate.net
ABSTRACT The Internet of Things (IoT) is one of today's most rapidly growing technologies.
It is a technology that allows billions of smart devices or objects known as" Things" to collect …
It is a technology that allows billions of smart devices or objects known as" Things" to collect …
[PDF][PDF] Web server performance improvement using dynamic load balancing techniques: A review
Today, web services rapidly increased and are accessed by many users, leading to massive
traffic on the Internet. Hence, the web server suffers from this problem, and it becomes …
traffic on the Internet. Hence, the web server suffers from this problem, and it becomes …
Ensuring user authentication and data integrity in multi-cloud environment
L Megouache, A Zitouni, M Djoudi - Human-centric Computing and …, 2020 - Springer
The necessity to improve security in a multi-cloud environment has become very urgent in
recent years. Although in this topic, many methods using the message authentication code …
recent years. Although in this topic, many methods using the message authentication code …
[PDF][PDF] Deep learning approaches for intrusion detection
AA Salih, SY Ameen, SR Zeebaree… - Asian Journal of …, 2021 - academia.edu
Recently, computer networks faced a big challenge, which is that various malicious attacks
are growing daily. Intrusion detection is one of the leading research problems in network …
are growing daily. Intrusion detection is one of the leading research problems in network …
Review on natural language processing based on different techniques
DH Maulud, SY Ameen, N Omar… - Asian Journal of …, 2021 - publications.articalerewriter.com
With the exponential growth of the information on the Internet, there is a high demand for
making this information readable and processable by machines. For this purpose, there is a …
making this information readable and processable by machines. For this purpose, there is a …
[PDF][PDF] Reliable communications for vehicular networks
Vehicular communications, referring to information exchange among vehicles, and
infrastructures. It has attracted a lot of attentions recently due to its great potential to support …
infrastructures. It has attracted a lot of attentions recently due to its great potential to support …
[PDF][PDF] A state of art for survey of combined iris and fingerprint recognition systems
Biometrics is develo** into a technological science in this lifelong technology for the
defense of identification. Biometrics is the technology to recognize individuals based on …
defense of identification. Biometrics is the technology to recognize individuals based on …
[PDF][PDF] Paralinguistic speech processing: An overview
RM Abdullah, SY Ameen, DM Ahmed… - Asian Journal of …, 2021 - academia.edu
Clients can adequately control PCs and create reports by speaking with the guide of
innovation, discourse acknowledgment empowers records to be delivered all the more …
innovation, discourse acknowledgment empowers records to be delivered all the more …
[PDF][PDF] Enhancing the Quality of Service of Cloud Computing in Big Data using Virtual Private Network and Firewall in Dense Mode
H Shah, A ud Din, A Khan… - International Journal of …, 2020 - pdfs.semanticscholar.org
Cloud Computing entails accessing and storing programs and data over the internet instead
of the hard drive of a personal computer. Over the Internet, it is the practice of software and …
of the hard drive of a personal computer. Over the Internet, it is the practice of software and …
Comparative analysis of VPN protocols: Comparative analysis of VPN protocols
J Antoniuk, M Plechawska-Wójcik - Journal of Computer Sciences …, 2023 - ph.pollub.pl
The aim of the study was to check the performance of the set-up internet connection using
the three VPN protocols: Wireguard, OpenVPN and L2TP/IPSec. The Docker applications …
the three VPN protocols: Wireguard, OpenVPN and L2TP/IPSec. The Docker applications …