Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Nermin Hamza"'
Publikováno v:
Yanbu Journal of Engineering and Science, Vol 5, Iss 1 (2021)
Externí odkaz:
https://doaj.org/article/296a32c14cc045f2a9318106ec64f179
Publikováno v:
Security and Privacy. 4
Autor:
Afrah Albalawi, Nermin Hamza
Publikováno v:
International Journal of Advanced Computer Science and Applications. 11
Now-a-days, cloud computing proved its impor-tance where it is being used by small and big organizations. The importance of cloud computing is due to the various services provided by the cloud. One of these services is storage as a service (SaaS) whi
Publikováno v:
International Journal of Computer Applications Technology and Research. :133-138
Publikováno v:
International Journal of Computer Applications. 180:23-28
Publikováno v:
2019 2nd International Conference on Computer Applications & Information Security (ICCAIS).
This paper reports security factors to custom-made software at SMEs from development perspectives. The primary purpose of this work is to support the In-house software development companies to understand the security issues are being addressed to dea
Publikováno v:
International Journal of Advanced Computer Science and Applications. 10
In recent years, privacy has become great attention in the research community. In Location-based Recommendation Systems (LbRSs), the user is constrained to build queries depend on his actual position to search for the closest points of interest (POIs
Publikováno v:
2018 1st International Conference on Computer Applications & Information Security (ICCAIS).
Recommender systems help users to find and evaluate their point of interest (POI) where the number of choices can be overwhelming. These systems incorporate data mining techniques and make their recommendations using knowledge learned from past exper
Publikováno v:
International Journal of Computer Applications. 93:33-39
With the growth of Information Technology and the Internet, governments apply the same principles and technologies that are supporting E-business revolution, to achieve similar transformation. Security becomes necessary to protect the citizens and go
Publikováno v:
Journal of Information Security. :101-112
Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with the data modified to mask sensitiv