


default search action
Journal of Internet Services and Information Security, Volume 13
Volume 13, Number 1, January 2023
- Latifah Alamer

:
Intelligent Health Risk and Disease Prediction Using Optimized Naive Bayes Classifier. 1-10 - Lil oja, P. Ranjana:

An Intrusion Detection System Using a Machine Learning Approach in IOT-based Smart Cities. 11-21 - Rahmawan Santoso, Tandiyo Rahayu, Sugi Harto, Heny Setyawati:

Software Development Tools with Android Base for Skills Data Collection in Physical Education. 22-33 - K. Malathi, R. Anandan, J. Frank Vijay

:
Cloud Environment Task Scheduling Optimization of Modified Genetic Algorithm. 34-43
Volume 13, Number 2, May 2023
- Meryem Ammi:

Cyber Threat Hunting Case Study using MISP. 1-29 - Zulfani Sesmiarni, Gusnita Darmawati, Yulifda Elin Yuspita

, Saiful Yeri, Ilian Ikhsan
:
Android-Based Augmented Reality: An Alternative in Mastering Tajweed for Student Learning. 30-47 - Akila R., S. Revathi:

Fine Grained Analysis of Intention for Social Media Reviews Using Distance Measure and Deep Learning Technique. 48-64 - Alaa Obeidat

, Rola Yaqbeh:
Business Project Management Using Genetic Algorithm for the Marketplace Administration. 65-80 - Kritsanapong Somsuk, Sarutte Atsawaraungsuk, Chanwit Suwannapong, Suchart Khummanee, Chalida Sanemueang:

The Variant of Digital Signature Algorithm for Constant Message. 81-95 - J. Brindha Merin, W. Aisha Banu, K. Fahima Sanobar Shalin:

Semantic Annotation Based Effective and Quality Oriented Web Service Discovery. 96-116 - Richard Romero

, Raúl A. Sánchez-Ancajima, Javier A. López-Céspedes, Miguel A. Saavedra-López, Segundo Juan Sánchez Tarrillo
, Ronald M. Hernández:
Security Model for a Central Bank in Latin America using Blockchain. 117-127 - K. Vimal Kumar Stephen, V. Mathivanan, Antonio Rutaf Manalang, Prajith Udinookkaran, Rudiardo Percival Niñalga De Vera, Mohammed Tariq Shaikh, Faiza Rashid Ammar Al-Harthy:

IOT-Based Generic Health Monitoring with Cardiac Classification Using Edge Computing. 128-145 - B. S. Venkatesh Prasad, H. R. Roopashree:

Energy Efficient Secure Key Management Scheme for Hierarchical Cluster Based WSN. 146-156 - Mohamed El Bekri:

Dynamic Inertia Weight Particle Swarm Optimization for Anomaly Detection: A Case of Precision Irrigation. 157-176 - Madhavi M

, Sasirooba T., Kranthi Kumar G.
:
Hiding Sensitive Medical Data Using Simple and Pre-Large Rain Optimization Algorithm through Data Removal for E-Health System. 177-192 - Laith Abdul Raheem Al anzy, Ahmed Aizaldeen Abdullah, Ali Kahtan Lilo Aquraishi:

IoT Cloud System Based Dual Axis Solar Tracker Using Arduino. 193-202 - Matthew Evans Audric Rengkung, Arya Wicaksana

:
RSA Prime Factorization on IBM Qiskit. 203-210 - Mahmoud E. Farfoura, Osama Ahmed Khashan, Hani A. Omar

, Yazn Alshamaila, Nader Abdel Karim, Hsiao-Ting Tseng, Mohammad Alshinwan
:
A Fragile Watermarking Method for Content-Authentication of H.264-AVC Video. 211-232 - Varshavardhini S:

An Efficient Feature Subset Selection with Fuzzy Wavelet Neural Network for Data Mining in Big Data Environment. 233-248

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














