Skip to main content
    • by 
    • Advanced Computer Networks
    • by 
    • Advanced Computer Networks
    • by 
    • Advanced Computer Networks
    • by 
    •   9  
      Computer NetworksQoS and QoEDissertationsWFQ
    • by 
    • Advanced Computer Networks
    • by 
    •   2  
      Advanced Computer NetworksAdvanced Computer Architecture
    • by 
    •   2  
      MedicineAdvanced Computer Networks
    • by 
    •   9  
      Software EngineeringSoftware DevelopmentWeb DevelopmentWeb Applications
The increasing need for better authentication methods against hackers has called for the use of the biometric authentication method to guard against unauthorized access into the systems. The used of human characteristics for biometrics... more
    • by 
    •   2  
      Computer ScienceAdvanced Computer Networks
    • by 
    •   8  
      Computer NetworksQoS and QoEDissertationsWFQ
This paper proposes an intelligent and compact machine learning model for IoT intrusion detection using an ensemble of semi-parametric models with Ada boost. The proposed model provides an adequate realtime intrusion detection at an... more
    • by 
    •   18  
      Machine LearningComputer NetworksWireless Networks (Computer Science)Cloud Computing
    • by 
    •   4  
      Use casesAdvanced Computer NetworksAdvanced Computer ArchitectureAgricultural and rural development (ARD)
    • by 
    • Advanced Computer Networks
In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic monitoring, and other medical... more
    • by 
    •   17  
      Computer NetworksKnowledge Networks (Computer Science)Wireless Networks (Computer Science)Computers and Networks Engineering
At the beginning of the paper we give an overview of linear and differential cryptanalysis of block ciphers. We describe two extensions of linear cryptanalysis (analysis with multiple expressions (7) and differential- linear cryptanalysis... more
    • by 
    •   4  
      Differential cryptanalysisLinear CryptanalysisAdvanced Computer NetworksBlock Cipher
    • by 
    •   5  
      BioinformaticsComputer ScienceData MiningComputational Biology
    • by 
    •   2  
      Advanced Computer NetworksAdvanced Computer Architecture
    • by 
    •   2  
      PsychologyAdvanced Computer Networks
    • by 
    •   4  
      Computer ScienceTime SeriesAdvanced Computer NetworksAdvanced Computer Architecture
    • by 
    • Advanced Computer Networks
    • by 
    • Advanced Computer Networks
At the beginning of the paper we give an overview of the linear and differential cryptanalysis of block ciphers. We describe two extensions of linear cryptanalysis (analysis with multiple expressions [7] and differentiallinear... more
    • by 
    •   4  
      Differential cryptanalysisLinear CryptanalysisAdvanced Computer NetworksBlock Cipher
    • by 
    •   2  
      Computer ScienceAdvanced Computer Networks
    • by 
    • Advanced Computer Networks
    • by 
    •   2  
      Computer ScienceAdvanced Computer Networks
    • by 
    •   2  
      Advanced Computer NetworksAdvanced Computer Architecture
    • by 
    • Advanced Computer Networks
    • by 
    • Advanced Computer Networks
    • by 
    • Advanced Computer Networks
9 th International Conference on Advanced Computer Science and Information Technology (ICAIT 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Advanced... more
    • by 
    •   18  
      BusinessComputer ScienceProgramming LanguagesInformation Technology