Zobrazeno 1 - 10
of 18
pro vyhledávání: '"GHADI, Abderrahim"'
Publikováno v:
International Journal of Electrical & Computer Engineering (2088-8708); Apr2023, Vol. 13 Issue 2, p1827-1836, 10p
Publikováno v:
Innovations in Smart Cities Applications Edition 3 ISBN: 9783030376284
With the immigration to IPv6 and the large range of addresses provided by this protocol, reducing the size of IP routing tables becomes one of the main and the most compelling challenges facing the internet.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::826ca01eb9b6ce87be283b58a1967b81
https://doi.org/10.1007/978-3-030-37629-1_43
https://doi.org/10.1007/978-3-030-37629-1_43
Publikováno v:
Innovations in Smart Cities Applications Edition 3 ISBN: 9783030376284
Malware detection process is based principally on extracting data given to classifier model; those data are information about application’s behavior during its execution, permissions required by it or activities made in response to some commands. W
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9043f07752b363a937f40b2ebca32fdb
https://doi.org/10.1007/978-3-030-37629-1_74
https://doi.org/10.1007/978-3-030-37629-1_74
Publikováno v:
International Journal of Information Science and Technology, Vol 1, Iss 1, Pp 26-32 (2018)
Nowadays, the internet has become the first source of information for most people, it plays a vital role in the teaching, research and learning process. MOOCs are probably the most important "novelty" in the field of e-learning of the last years, it
Publikováno v:
SCA
The revolution and development of malwares over time necessitate an intensive researches on advanced techniques to secure user's personal and critical information, the most challenging task is to build a strong and robust classifier allows to detect
Autor:
Ghadi Abderrahim, Lamrani Kaoutar
Publikováno v:
SCA
Nowadays, the web content of e-commerce data is increasing rapidly, which make the traditional techniques to querying this resources not efficient, for that the researches focus to how using the new technologies to provide a relevant and complete ans
Publikováno v:
Innovations in Smart Cities Applications Edition 2 ISBN: 9783030111953
In field of mobile security android malware is well known as a problematic never can finally solved despite of many solutions that have been proposed over time by researchers because of revolution and development of attackers techniques used in codes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2b809b1cf86d71aa71b809357834b422
https://doi.org/10.1007/978-3-030-11196-0_56
https://doi.org/10.1007/978-3-030-11196-0_56
Publikováno v:
Innovations in Smart Cities Applications Edition 2 ISBN: 9783030111953
Today, the Web knows a rapid increase in data level that makes their processing and storage limited in traditional technologies. That is why future technology tries to exploit the notion of semantics and ontology by adapting them to big data technolo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2078dd67c596cc3b9fcb442c13f7df56
https://doi.org/10.1007/978-3-030-11196-0_21
https://doi.org/10.1007/978-3-030-11196-0_21
Publikováno v:
SCA
The mobile operation system Android is one of the most OS's used in the entire world, which make it the target of many malware projects and the mission of detecting those malware applications is getting harder over time due to evaluation and developm
Publikováno v:
SCA
Today, the Web knows a rapid increase in data level that makes their processing and storage limited in traditional technologies. That is why future technology tries to exploit the notion of semantics and ontology by adapting them to big data technolo