Indices
This title is listed in the following:
Close
Reference Hub
This research has been cited in:
Conference
A computationally efficient approach for temporal pattern mining in IoT2016 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2016.7745354 Conference
Conference
A computationally optimal approach for extracting similar temporal patterns2016 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2016.7745344 Conference
Self-configuration model based neural predition and agent technology for cloud infrastructure2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8273008 Conference
A novel cluster analysis for gene-miRNA interactions documents using improved similarity measure2016 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2016.7745383 Conference
Design of novel fuzzy distribution function for dimensionality reduction and intrusion detection2016 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2016.7745346 Conference
Text mining based approach for intrusion detection2016 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2016.7745351 Conference
Image encryption/decryption design using NIOSII soft core processor2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8273002 Conference
A similarity measure for temporal pattern discovery in time series data generated by IoT2016 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2016.7745355 Conference
An approach for intrusion detection using fuzzy feature clustering2016 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2016.7745345 Conference
Internet of Things: An exploration study of opportunities and challenges2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8273047 Conference
A classification approach for web and cloud based applications2016 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2016.7745356 Conference
A survey on routing techniques for transmission of packets in networks2016 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2016.7745349 Article
Double image compression and encryption scheme using logistic mapped convolution and cellular automataMultimedia Tools and Applications10.1007/s11042-017-4606-0 Conference
Sensorless speed control of a 3 phased asynchronous machine based on MRAS observer and fuzzy logic control technique2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8273040 Conference
An approach for improving performance of Web services and cloud based applications2016 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2016.7745348 Conference
A concept map based scenario for assessment of short and open answer questions2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8273011 Conference
A similarity measure for outlier detection in timestamped temporal databases2016 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2016.7745347 Conference
Exploring the design space of curve-based cryptographic accelerators2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8273045 Conference
An Overview about the Polymorphic Worms SignaturesProceedings of the The International Conference on Engineering & MIS 201510.1145/2832987.2833031 Conference
Recommended architecture for car parking management system based on cyber-physical system2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8272987 Conference
Overview of firewalls: Types and policies: Managing windows embedded firewall programmatically2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8273003 Conference
Article
Conference
Systemized software hardware partitioning algorithm for system on programmable chip to minimize logic power2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8273038 Conference
Combining software-defined networking with Internet of Things: Survey on security and performance aspects2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8273027 Conference
Conference
Conference
Looking into the possibility of novel dissimilarity measure to discover similarity profiled temporal association patterns in IoT2016 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2016.7745353 Conference
Conference
Performance evaluation of virtual machines migration within a datacenter2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8272984 Conference
Mining the Web for learning ontologies: State of art and critical review2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8273103 Conference
Software/Hardware implementations of a video watermarking scheme based on motion vectors2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8272989 Conference
Conference
Dimensionality reduction approach for high dimensional text documents2016 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2016.7745364 Conference
A recent survey on challenges in security and privacy in internet of thingsProceedings of the 5th International Conference on Engineering and MIS10.1145/3330431.3330457 Conference
A mathematical model of integrated cloud computing and WSNs for emergency systems2017 International Conference on Engineering & MIS (ICEMIS)10.1109/ICEMIS.2017.8272973 Conference
Chapter
An Algorithm for Securing Hybrid Cloud Outsourced Data in the Banking SectorOnline Banking Security Measures and Data Protection10.4018/978-1-5225-0864-9.ch010 Chapter
Article
Parallel and Distributed Population based Feature Selection Framework for Health MonitoringInternational Journal of Cloud Applications and Computing10.4018/IJCAC.2017010104 Chapter
Chapter
Chapter
The Rise of Big Data, Cloud, and Internet of ThingsCritical Research on Scalability and Security Issues in Virtual Cloud Environments10.4018/978-1-5225-3029-9.ch010 Chapter
Chapter
Chapter
Chapter
Chapter
Article
User Modeling Approach for Dyslexic Students in Virtual Learning EnvironmentsInternational Journal of Cloud Applications and Computing10.4018/IJCAC.2017040101 Article
Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application VulnerabilitiesInternational Journal of Cloud Applications and Computing10.4018/IJCAC.2017070101 Article
Countering MitM Attacks Using Evolved PathFinder AlgorithmInternational Journal of Cloud Applications and Computing10.4018/IJCAC.2017040104 Chapter
Emerging Challenges, Security Issues, and Technologies in Online Banking SystemsOnline Banking Security Measures and Data Protection10.4018/978-1-5225-0864-9.ch006 Article
Article
Secure Mobile Multi Cloud Architecture for Authentication and Data StorageInternational Journal of Cloud Applications and Computing10.4018/IJCAC.2017040105 Article
Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing EnvironmentInternational Journal of Cloud Applications and Computing10.4018/IJCAC.2017040103 Chapter
Chapter
Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in CloudApplication Development and Design10.4018/978-1-5225-3422-8.ch009 Chapter
Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)Cloud Technology10.4018/978-1-4666-6539-2.ch038 Chapter
Article
Article
Cloud Computing Deployment and Selection Criteria for OrganizationsInternational Journal of Cloud Applications and Computing10.4018/ijcac.2013100101 Chapter
Article
Measures for Cloud Computing Effectiveness AssessmentInternational Journal of Cloud Applications and Computing10.4018/ijcac.2014070102 Chapter
Bio-Inspired Private Information Retrieval System over Cloud Service Using the Social Bees' Lifestyle with a 3D VisualisationAdvanced Research on Cloud Computing Design and Applications10.4018/978-1-4666-8676-2.ch014 Article
Cloud Computing for Global Software DevelopmentInternational Journal of Cloud Applications and Computing10.4018/ijcac.2015010105 Article
A Secure Data Transmission Mechanism for Cloud Outsourced DataInternational Journal of Cloud Applications and Computing10.4018/ijcac.2013010104 Article
Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in CloudInternational Journal of Cloud Applications and Computing10.4018/IJCAC.2017010101 Chapter
Bio-Inspired Private Information Retrieval System Over Cloud Service Using the Social Bees' Lifestyle With a 3D VisualisationInformation Retrieval and Management10.4018/978-1-5225-5191-1.ch066 Article
A Migration Approach for Fault Tolerance in Cloud ComputingInternational Journal of Grid and High Performance Computing10.4018/ijghpc.2014040102 Chapter
Chapter
Article
Application of Meta-Heuristics Methods on PIR Protocols Over Cloud Storage ServicesInternational Journal of Cloud Applications and Computing10.4018/ijcac.2014070101 Article
Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)International Journal of Cloud Applications and Computing10.4018/ijcac.2014010104 Article
Ranking Model for SLA Resource Provisioning ManagementInternational Journal of Cloud Applications and Computing10.4018/ijcac.2014070105 Chapter
Close Top Results From Your Most Recent Search
Close