Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Idris Ismaila"'
Publikováno v:
In Computers & Security April 2024 139
Publikováno v:
ARPN Journal of Engineering and Applied Sciences 9 (12), 2528 - 2533 (2014)
Makespan minimization in tasks scheduling of infrastructure as a service (IaaS) cloud is an NP-hard problem. A number of techniques had been used in the past to optimize the makespan time of scheduled tasks in IaaS cloud, which is propotional to the
Externí odkaz:
http://arxiv.org/abs/1510.03173
Publikováno v:
The Eighth International Conference on eLearning for Knowledge-Based Society, 23-24 February 2012, Thailand
An improved email classification method based on Artificial Immune System is proposed in this paper to develop an immune based system by using the immune learning, immune memory in solving complex problems in spam detection. An optimized technique fo
Externí odkaz:
http://arxiv.org/abs/1402.1242
Today, Nigerian Universities feel pressured to get a portal up and running dynamic, individualized web systems have become essential for institutions of higher learning. As a result, most of the Nigerian University portals nowadays do not meet up to
Externí odkaz:
http://arxiv.org/abs/1402.1241
Publikováno v:
2022 5th Information Technology for Education and Development (ITED).
Publikováno v:
Transactions on Networks and Communications. 8:31-44
Tracking of computer network system attacks is a proactive measure to protect against attacks on data, that are basically encrypted for confidential security reasons, while in transit on the computer information channel. Cyber security threat continu
Publikováno v:
2019 15th International Conference on Electronics, Computer and Computation (ICECCO).
Botnet is one of the major security threats in the field of information technology today (IT). The increase in the rate of attack on industrial IT infrastructures, theft of personal data and attacks on financial information is becoming critical. Majo
Publikováno v:
International Journal of Image, Graphics and Signal Processing. 10:22-30
Publikováno v:
International Journal of Computer Network and Information Security. 10:60-67
Publikováno v:
i-manager's Journal on Mobile Applications and Technologies. 5:37