Self-Configured Framework for scalable link prediction in twitter: Towards autonomous spark framework | 0 | 0.34 | 2022 |
GRAIN: Granular multi-label encrypted traffic classification using classifier chain | 0 | 0.34 | 2022 |
The rise of obfuscated Android malware and impacts on detection methods | 1 | 0.63 | 2022 |
A Survey On Video Content Rating: Taxonomy, Challenges And Open Issues | 0 | 0.34 | 2021 |
Grano-Gt: A Granular Ground Truth Collection Tool For Encrypted Browser-Based Internet Traffic | 0 | 0.34 | 2021 |
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches | 1 | 0.35 | 2021 |
The rise of traffic classification in IoT networks: A survey. | 6 | 0.48 | 2020 |
Retraction Note to: Input Displacement Neuro-fuzzy Control and Object Recognition by Compliant Multi-fingered Passively Adaptive Robotic Gripper | 0 | 0.34 | 2020 |
MapReduce scheduling algorithms: a review | 1 | 0.35 | 2020 |
Applications of link prediction in social networks: A review | 5 | 0.45 | 2020 |
Blending Big Data Analytics: Review on Challenges and a Recent Study. | 1 | 0.35 | 2020 |
Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey | 0 | 0.34 | 2020 |
Halal Products on Twitter: Data Extraction and Sentiment Analysis Using Stack of Deep Learning Algorithms. | 1 | 0.38 | 2019 |
Evaluation of IoT-Based Computational Intelligence Tools for DNA Sequence Analysis in Bioinformatics. | 0 | 0.34 | 2019 |
Challenges And Recommended Solutions In Multi-Source And Multi-Domain Sentiment Analysis | 0 | 0.34 | 2019 |
The rise of "blockchain": bibliometric analysis of blockchain study. | 0 | 0.34 | 2019 |
Retraction Note to: Support vector regression methodology for prediction of input displacement of adaptive compliant robotic gripper | 0 | 0.34 | 2019 |
SMSAD: a framework for spam message and spam account detection | 4 | 0.41 | 2019 |
Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management. | 2 | 0.39 | 2018 |
Challenges of Internet of Things and Big Data Integration. | 2 | 0.40 | 2018 |
Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics | 3 | 0.36 | 2018 |
Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario. | 3 | 0.38 | 2018 |
Multi-objective scheduling of MapReduce jobs in big data processing. | 8 | 0.42 | 2018 |
Discovering optimal features using static analysis and a genetic search based method for Android malware detection. | 1 | 0.34 | 2018 |
Internet of Things: Infrastructure, Architecture, Security and Privacy. | 0 | 0.34 | 2018 |
An Overview of Audio Event Detection Methods from Feature Extraction to Classification. | 0 | 0.34 | 2017 |
Source camera identification: a distributed computing approach using Hadoop. | 2 | 0.36 | 2017 |
Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey. | 1 | 0.35 | 2017 |
Malicious accounts: Dark of the social networks. | 0 | 0.34 | 2017 |
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection. | 13 | 0.58 | 2017 |
The Evolution of Android Malware and Android Analysis Techniques. | 45 | 1.56 | 2017 |
The rise of "malware": Bibliometric analysis of malware study. | 8 | 0.44 | 2016 |
Service delivery models of cloud computing: security issues and open challenges. | 1 | 0.35 | 2016 |
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. | 2 | 0.39 | 2016 |
Secure and dependable software defined networks | 17 | 0.70 | 2016 |
Intrusion response systems: Foundations, design, and challenges. | 6 | 0.45 | 2016 |
The role of big data in smart city. | 77 | 2.66 | 2016 |
MapReduce: Review and open challenges. | 18 | 0.66 | 2016 |
Evaluation of machine learning classifiers for mobile malware detection. | 51 | 1.36 | 2016 |
Big data: From beginning to future. | 0 | 0.34 | 2016 |
Input Displacement Neuro-fuzzy Control and Object Recognition by Compliant Multi-fingered Passively Adaptive Robotic Gripper | 9 | 0.57 | 2016 |
Pixel value differencing steganography techniques: Analysis and open challenge | 4 | 0.40 | 2015 |
Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network. | 3 | 0.41 | 2015 |
The rise of "big data" on cloud computing: Review and open research issues. | 128 | 3.86 | 2015 |
A review on feature selection in mobile malware detection | 37 | 1.03 | 2015 |
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions. | 3 | 0.39 | 2015 |
The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations. | 2 | 0.41 | 2015 |
Blind source mobile device identification based on recorded call. | 3 | 0.38 | 2014 |
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. | 44 | 1.02 | 2014 |
Botnet detection techniques: review, future trends, and issues. | 1 | 0.34 | 2014 |