Open Access
ARTICLE
Yongjie Yang1, Shanshan Tu1, Raja Hashim Ali2, Hisham Alasmary3,4, Muhammad Waqas5,6,*, Muhammad Nouman Amjad7
1 Engineering Research Center of Intelligent Perception and Autonomous Control, Faculty of Information Technology, Beijing University of Technology, Beijing, 100124, China
2 Faculty of Computer Science and Engineering, GIK Institute of Engineering Sciences and Technology, Topi, 23460, Pakistan
3 Department of Computer Science, College of Computer Science, King Khalid University, Abha, Saudi Arabia
4 Information Security and Cybersecurity Unit, King Khalid University, Abha, Saudi Arabia
5 Computer Engineering Department, College of Information Technology, University of Bahrain, 32038, Bahrain
6 School of Engineering, Edith Cowan University, Joondalup Perth, WA, 6027, Australia
7 School of Engineering, University of Management and Technology, Lahore, Pakistan
* Corresponding Author: Muhammad Waqas. Email:
Computers, Materials & Continua 2023, 74(1), 801-815. https://doi.org/10.32604/cmc.2023.031907
Received 29 April 2022; Accepted 24 June 2022; Issue published 22 September 2022
View
Download
Like
Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory
Chak Fong Cheang, Yiqin Wang,...A Data Download Method from RSUs Using Fog Computing in Connected Vehicles
Dae-Young Kim, Seokhoon KimDependency-Based Local Attention Approach to Neural Machine Translation
Jing Qiu, Yan Liu, Yuhan Chai,...