Found: 29 resources
Miner Alerts Module to Generate Itemsets Based on FP-Growth Algorithm Improvement
Al-Mustansiriyah Journal of Science, 2018, Volume 29, Issue 1, Pages 114-117
A Study of Graph Theory Applications in IT Security
Iraqi Journal of Science, 2020, Volume 61, Issue 10, Pages 2705-2714
Analysis and Implementation of Kerberos Protocol in Hybrid Cloud Computing Environments
Engineering and Technology Journal, 2021, Volume 39, Issue 1part (B) Science, Pages 41-52
A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain
Iraqi Journal of Science, 2023, Volume 64, Issue 2, Pages 958-972
Security Issues of Solar Energy Harvesting Road Side Unit (RSU)
Iraqi Journal for Electrical And Electronic Engineering, 2015, Volume 11, Issue 1, Pages 18-31
Storage Architecture for Network Security in Cloud Computing
Academic Science Journal, 2018, Volume 14, Issue 1 - Part 1, Pages 1-17
On the designing of two grains levels network intrusion detection system
Karbala International Journal of Modern Science, 2015, Volume 1, Issue 1, Pages 15-25
Detecting Malicious DNS Queries Over Encrypted Tunnels Using Statistical Analysis and Bi-Directional Recurrent Neural Networks
Karbala International Journal of Modern Science, 2021, Volume 7, Issue 4, Pages 268-280
A Review of Hash Function Types and their Applications
Wasit Journal of Computer and Mathematics Science, 2022, Volume 1, Issue 3, Pages 120-139