Zobrazeno 1 - 10
of 94
pro vyhledávání: '"Mohammed, Bouhorma"'
Publikováno v:
Recent Advances in Computer Science and Communications. 15:1026-1042
Objective: Newborn malware increase significantly in recent years, becoming more dangerous for many applications. So, researchers are focusing more on solutions that serve the defense of new malwares trends and variance, especially zero-day malware a
Publikováno v:
Innovations in Smart Cities Applications Volume 6 ISBN: 9783031268519
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c098ebe2e3d68f8634d74655349a41cc
https://doi.org/10.1007/978-3-031-26852-6_77
https://doi.org/10.1007/978-3-031-26852-6_77
Publikováno v:
Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies ISBN: 9783031211003
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::38db8fc9a4ff8b457f5b034a60c1b515
https://doi.org/10.1007/978-3-031-21101-0_1
https://doi.org/10.1007/978-3-031-21101-0_1
Publikováno v:
Innovations in Smart Cities Applications Volume 6 ISBN: 9783031268519
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9af85328321a0c2358c5d1f196f157de
https://doi.org/10.1007/978-3-031-26852-6_64
https://doi.org/10.1007/978-3-031-26852-6_64
Autor:
Youness Mourtaji, Mohammed Bouhorma, Ghadah Aldabbagh, Abdullah Alghamdi, Daniyal M. Alghazzawi
Publikováno v:
Wireless Communications and Mobile Computing, Vol 2021 (2021)
The phenomenon of phishing has now been a common threat, since many individuals and webpages have been observed to be attacked by phishers. The common purpose of phishing activities is to obtain user’s personal information for illegitimate usage. C
Publikováno v:
Lecture Notes on Data Engineering and Communications Technologies ISBN: 9783031151903
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0a7ea846911687185ddcbdc1dbfa297b
https://doi.org/10.1007/978-3-031-15191-0_25
https://doi.org/10.1007/978-3-031-15191-0_25
Publikováno v:
Lecture Notes on Data Engineering and Communications Technologies ISBN: 9783031151903
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dae768142f29d20248f48f16964d8c3f
https://doi.org/10.1007/978-3-031-15191-0_40
https://doi.org/10.1007/978-3-031-15191-0_40
Publikováno v:
Lecture Notes on Data Engineering and Communications Technologies ISBN: 9783031151903
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ee7b35165d675a204a2dbaf87dd8bda9
https://doi.org/10.1007/978-3-031-15191-0_41
https://doi.org/10.1007/978-3-031-15191-0_41
Publikováno v:
International Journal of Electrical and Computer Engineering (IJECE). 13:1724
Detection of objects and their location in an image are important elements of current research in computer vision. In May 2020, Meta released its state-of-the-art object-detection model based on a transformer architecture called detection transformer
In this paper, we continue investigating how to improve Hadoop performance , we will investigate further strategies, tackling the data locality with respect to data access patterns, cluster memory and effective scheduling. In a Hadoop cluster, users
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::64165781f038be63a4e1fa1ccfb28aff
https://doi.org/10.21203/rs.3.rs-1570462/v1
https://doi.org/10.21203/rs.3.rs-1570462/v1