Systematic Review on Software Application Under-distributed Denial of Service Attacks for Group Websites
The Internet is constantly under serious threat from distributed denial of service (DDoS)
attacks. In order to overload victim resources, modern DDoS attacks are moving up to the …
attacks. In order to overload victim resources, modern DDoS attacks are moving up to the …
Credit Investigation and Comprehensive Risk Management System based Big Data Analytics in Commercial Banking
M VenkateswaraRao, SS Vellela… - 2023 9th …, 2023 - ieeexplore.ieee.org
The banking industry has experienced significant transformations in terms of how effectively
they function and provide services over the past few decades. The banking services …
they function and provide services over the past few decades. The banking services …
Multi-agent personalized recommendation system in e-commerce based on user
As more sectors began to switch from conventional business models to e-commerce in
response to the general trend toward mobile Internet use, the scale of e-commerce grew …
response to the general trend toward mobile Internet use, the scale of e-commerce grew …
Cloud-hosted concept-hierarchy flex-based infringement checking system
Unlike competing online Infringement solutions, Infringement is copy-paste elimination
software. Infringement is the illegal use of another person's words or ideas without …
software. Infringement is the illegal use of another person's words or ideas without …
A cloud-based smart IoT platform for personalized healthcare data gathering and monitoring system
Several technological and informational technologies are currently develo** quickly and
profoundly altering our contemporary way of life. The Internet of Things (IoT) has become …
profoundly altering our contemporary way of life. The Internet of Things (IoT) has become …
Design And Implementation of An Integrated IOT Blockchain Framework for Drone Communication
As more data is transmitted and processed, as it moves from its infancy to full maturity, the
Internet of Things (IoT) has the possibility of develo** quite quickly. This is because …
Internet of Things (IoT) has the possibility of develo** quite quickly. This is because …
Prediction And Analysis Using A Hybrid Model For Stock Market
Success in optimising AI-related solutions has been greatly enhanced by the use of deep
learning (AI). The stock market, trade execution tactics, and portfolio optimization are just …
learning (AI). The stock market, trade execution tactics, and portfolio optimization are just …
Qos-Aware Video Streaming Based Admission Control And Scheduling For Video Transcoding In Cloud Computing
Power and other computing resources can be stored and processed in cloud computing
environments. Depending on the features of the clients' devices, video streams, whether …
environments. Depending on the features of the clients' devices, video streams, whether …
A Novel Approach to Human Iris Recognition And Verification Framework Using Machine Learning Algorithm
The component of a computer system that is in responsibility of user security is one of the
most important modules. It was demonstrated that simple logins and passwords are easy for …
most important modules. It was demonstrated that simple logins and passwords are easy for …
Novel and Secure Protocol for Trusted Wireless Ad-hoc Network Creation
In order to share the initial data and the secret keys that will be used to encrypt the data, a
secure protocol is presented in this research for spontaneous wireless ad hoc networks that …
secure protocol is presented in this research for spontaneous wireless ad hoc networks that …