[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 13, Issue 22023
Publisher:
  • Inderscience Publishers
  • World Trade Center Bldg, 29, route de Pre-Bois, Case Postale 896
  • Geneva 15
  • Switzerland
ISSN:1748-569X
EISSN:1748-5703
Reflects downloads up to 13 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
Network intrusion detection using meta-heuristic feature selection and cost-sensitive learning

In contemporary society, networked computers are playing a pivotal role in dissemination of knowledge and critical data in information systems; ensuring its security has become a challenging task for the network administrators and researchers. Machine ...

research-article
A contemporary anti-phishing framework based on visual cryptography and steganography

In new technologies developing tremendously, and with this, the usage of online commodities has also seen a surge with a drastic daily increase in the number of users. Online support has also led to increased online attacks on the user's confidential data,...

research-article
Credit card fraud detection using predictive features and machine learning algorithms

CCF can destabilise economies, reduce confidence between customers and banks, and severely affect other people and businesses. The primary objective of banks and businesses is to identify fraudulent transactions with a high level of accuracy and to also ...

research-article
Analysis of blockchain based smart contract system to understand its performance in different applications

Smart contract technology plays a significant role in various fields for achieving secure and automated transactions without the interference of third parties. There arise certain issues of security and privacy issue during the transaction with the ...

research-article
TRO-CP-ABE: a secure and flexible layer with traceability and easy revocation in ciphertext-policy attribute-based encryption

Attribute-based encryption (ABE) is a very efficient way of authorising users to access confidential data in organisations without public-key validation from external trusted authorities or complex login processes. Ciphertext-policy attribute-based ...

research-article
Implementation of Bixby oriented electric vehicle charging station searching service

As the electric vehicle market has significantly grown, the needs to install the charging station infrastructure for electric vehicles (EVs) have also been increased. Therefore, it is required for the efficient searching scheme for the appropriate ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.