Funding Data Link References Status API Help
Page 1 of 103 results
Sort by: relevance publication year

WAVELET ANALYSIS OF EEG FOR THE IDENTIFICATION OF ALCOHOLICS USING PROBABILISTIC CLASSIFIERS AND NEURAL NETWORKS

Journal Article published 2018 in International Journal of Intelligence and Sustainable Computing volume 1 issue 1 on page 1

Authors: Malar E, Gauthaam M

Journal Issue published 29 Jun 2017 in International Journal of Information Security and Cybercrime volume 6 issue 1

Journal Issue published 29 Dec 2017 in International Journal of Information Security and Cybercrime volume 6 issue 2

Need for Education on Cybersecurity

Journal Article published 29 Jun 2017 in International Journal of Information Security and Cybercrime volume 6 issue 1 on pages 25 to 32

Authors: Maxim DOBRINOIU

The Darknet: A New Passageway to Identity Theft

Journal Article published 29 Jun 2017 in International Journal of Information Security and Cybercrime volume 6 issue 1 on pages 41 to 50

Authors: Eric HOLM

Strategic Management of Critical Infrastructures and Financial Domain

Journal Article published 29 Jun 2017 in International Journal of Information Security and Cybercrime volume 6 issue 1 on pages 13 to 24

Authors: Mircea-Constantin ŞCHEAU

Hardware and Software Technologies used in the Financial Industry

Journal Article published 29 Jun 2017 in International Journal of Information Security and Cybercrime volume 6 issue 1 on pages 33 to 40

Authors: Ruxandra PRICOPE

Public Key Infrastructures for Trust and Authentication in the IoT

Journal Article published 29 Jun 2017 in International Journal of Information Security and Cybercrime volume 6 issue 1 on pages 51 to 56

Authors: Lavinia NĂSTASE

Detecting Cyber Bullies on Twitter using Machine Learning Techniques

Journal Article published 29 Jun 2017 in International Journal of Information Security and Cybercrime volume 6 issue 1 on pages 63 to 66

Authors: Sashaank Pejathaya MURALI

Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit

Journal Article published 29 Jun 2017 in International Journal of Information Security and Cybercrime volume 6 issue 1 on pages 67 to 72

Authors: S.O. SUBAIRU, A.O. ISAH, J.K. ALHASSAN