Search

Your search keyword '"Jantan, Aman"' showing total 27 results

Search Constraints

Start Over You searched for: Author "Jantan, Aman" Remove constraint Author: "Jantan, Aman" Database Complementary Index Remove constraint Database: Complementary Index
27 results on '"Jantan, Aman"'

Search Results

1. Digital Forensic Investigation on Social Media Platforms: A Survey on Emerging Machine Learning Approaches.

2. Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review.

3. A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features.

4. HoneyDetails: A prototype for ensuring patient's information privacy and thwarting electronic health record threats based on decoys.

5. A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm.

6. Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp.

7. Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization.

8. Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication.

9. Modified honey encryption scheme for encoding natural language message.

10. An enhanced Bat algorithm with mutation operator for numerical optimization problems.

11. A Cognitively Inspired Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multi-layer Perceptrons.

12. Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems.

13. Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence.

14. Novel Multi-Objective Artificial Bee Colony Optimization for Wrapper Based Feature Selection in Intrusion Detection.

16. E-Cyborg: The Cybercrime Evidence Finder.

17. A NEW APPROACH FOR RESOLVING CYBER CRIME IN NETWORK FORENSICS BASED ON GENERIC PROCESS MODEL.

20. Privacy Risk Diagnosis: Mining l-Diversity.

21. Honeybee-Based Model to Detect Intrusion.

22. Clustering-Based Frequency l-Diversity Anonymization.

24. An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction.

25. Real-Time Detection of Intrusive Traffic in QoS Network Domains.

26. Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse.

27. MULTI-CONNECT ARCHITECTURE (MCA) ASSOCIATIVE MEMORY: A MODIFIED HOPFIELD NEURAL NETWORK.

Catalog

Books, media, physical & digital resources