The monarch butterfly optimization algorithm for solving feature selection problems | 0 | 0.34 | 2022 |
Dns Rule-Based Schema To Botnet Detection | 0 | 0.34 | 2021 |
IoT transaction processing through cooperative concurrency control on fog–cloud computing environment | 6 | 0.42 | 2020 |
Firefly photinus search algorithm | 0 | 0.34 | 2020 |
(eta)-Hill climbing algorithm with probabilistic neural network for classification problems | 0 | 0.34 | 2020 |
A comparative study on spiking neural network encoding schema: implemented with cloud computing. | 0 | 0.34 | 2019 |
Fast-flux hunter: a system for filtering online fast-flux botnet. | 2 | 0.37 | 2018 |
An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms | 4 | 0.38 | 2018 |
Enhancing The Security Of Exchanging And Storing Dicom Medical Images On The Cloud | 1 | 0.50 | 2018 |
Botnets Detecting Attack Based on DNS Features | 0 | 0.34 | 2018 |
Economic load dispatch problems with valve-point loading using natural updated harmony search. | 12 | 0.49 | 2018 |
Security-Aware Coap Application Layer Protocol For The Internet Of Things Using Elliptic-Curve Cryptography | 1 | 0.34 | 2018 |
A survey of botnet detection based on DNS | 11 | 0.74 | 2017 |
Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. | 30 | 0.76 | 2017 |
A Variable Service Broker Routing Policy for data center selection in cloud analyst | 7 | 0.74 | 2017 |
RESEARCH PROPOSAL: AN INTRUSION DETECTION SYSTEM ALERT REDUCTION AND ASSESSMENT FRAMEWORK BASED ON DATA MINING | 0 | 0.34 | 2013 |
Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email | 9 | 0.53 | 2013 |
A Survey of Phishing Email Filtering Techniques | 33 | 1.04 | 2013 |