Research Title | MAG. TITLE | RESEARCH AREA | PUBLISH YEAR | DOI | Journal URL |
A cutting-edge intelligent cyber model for intrusion detection | Cluster Computing | Cyber security 5G networks IoT SYNFLOOD attack Simulation Machine learning | 2024 | |
Visit URL
|
Towards a Reference Model of Software Resources Quality | Journal of Computer Science | Software Engineering | 2018 | |
Visit URL
|
HIPAA security and privacy rules auditability in extreme programming environments | International journal of information systems in the service sector | Software Engineering | 2017 | |
Visit URL
|
A round-based data replication strategy | IEEE Transactions on Parallel & Distributed Systems | Computer networks | 2016 | |
Visit URL
|
A trade-off model of software requirements for balancing between security and usability issues | International Review on Computers and Software | Software Engineering | 2015 | |
Visit URL
|
An efficient adaptive genetic algorithm for vector space model | Journal of Theoretical and Applied Information Technology | Information Retrieval | 2015 | |
Visit URL
|
Towards a requirements model of system security using international standards | International Journal of Software Engineering and Its Applications | Software Engineering | 2015 | |
Visit URL
|
Experimental evaluation of an industrial technique for the approximation of software functional size | International Journal of Computers & Technology | Software Engineering | 2013 | |
Visit URL
|
A finite mixture model for simultaneous high-dimensional clustering localized feature selection and outlier rejection | Expert Systems with Applications | Machine Learning | 2012 | |
Visit URL
|
Digital forensics evidence mining tool | the Ubiquitous Computing and Communication Journal | Computer Security | 2010 | |
Visit URL
|