Open Access
ARTICLE
NZ Jhanjhi1, Mamoona Humayun2,*, Saleh N. Almuayqil2
1 School of Computer Science and Engineering (SCE), Taylor’s University, Selangor, Malaysia
2 Department of Information Systems, College of Computer and Information Sciences, Jouf University, Al-Jouf, Saudi Arabia
* Corresponding Author: Mamoona Humayun. Email:
Computer Systems Science and Engineering 2021, 37(3), 361-380. https://doi.org/10.32604/csse.2021.015206
Received 10 November 2020; Accepted 20 December 2020; Issue published 08 March 2021
View
Download
Like
Securing Display Path for Security-Sensitive Applications on Mobile Devices
Jinhua Cui, Yuanyuan Zhang, Zhiping...A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security
Changting ShiA Convolution-Based System for Malicious URLs Detection
Chaochao Luo, Shen Su, Yanbin...Identifying and Verifying Vulnerabilities through PLC Network Protocol and Memory Structure Analysis
Joo-Chan Lee, Hyun-Pyo Choi, Jang-Hoon...APU-D* Lite: Attack Planning under Uncertainty Based on D* Lite
Tairan Hu, Tianyang Zhou, Yichao...