CORE
🇺🇦Â
 make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Filters
4 research outputs found
Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks
Author
A. Meenakshi
Adedeji Kazeem B.
+17Â more
Adetunmbi A.O.
Anil Kumar K.S.
Anitha Ruth J.
Farid D.M.
Guo C.
H. Sirmathi
Hajimirzaei B.
Hoque M.S.
J. Anitha Ruth
Jiang R.
Mathew S.
Mazini M.
Naidu N.
Pitchaiah M.
Sahu V.
Singh R.
Zarrabi A.
Publication venue
'Institution of Engineering and Technology (IET)'
Publication date
Field of study
No full text
Crossref
Prediction of flooding in the downstream of the Three Gorges Reservoir based on a back propagation neural network optimized using the AdaBoost algorithm
Author
B Hajimirzaei
B Xu
+29Â more
C Xiao
D Wang
D Zheng
F Silvestro
H Liu
H Xue
H-L Wu
J Lyu
J-C Li
J-P Zhang
L Huang
L Wang
L Wu
MH Jahangir
ML Huang
MYA Khan
Q Luo
S Barbetta
S Senanayake
S Wang
S Wang
W Sun
W Wang
X Zhang
XJ Liu
Y Liu
Y Zhang
Y Zhou
Z Lei
Publication venue
'Springer Science and Business Media LLC'
Publication date
Field of study
No full text
Crossref
Detection of anomaly intrusion utilizing self-adaptive grasshopper optimization algorithm
Author
A Banitalebi
A Buczak
+48Â more
A Zakeri
AS Eesa
B Gu
B Hajimirzaei
C Kim
C Kolias
C Martinez
CG Sentelle
CJ Lin
DJ Weller-Fahy
E Emary
F Maciá-Pérez
G Caminero
H Sadreazami
H Sedjelmaci
H Wang
J Liu
M Ahmed
M Aladeemy
M Ambusaidi
M Lopez-Martin
M Mafarja
M Mafarja
M Mahmud
M Mazini
M Prasad
M Wang
MM Drugan
MM Rathore
MT Nguyen
N Sengupta
R Aamir
S Dwivedi
S Dwivedi
S Garg
S Gupta
S Kaur
S Saremi
T Cruz
TT Allen
V Hajisalem
W Elmasry
W Liang
WL Al-yaseen
XK Li
Y Wang
Y Zhou
Z Peng
Publication venue
'Springer Science and Business Media LLC'
Publication date
Field of study
No full text
Crossref
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues
Author
Abbasi
Abdellaoui
+178Â more
Abdi
Abusitta
Abusitta
Aceto
Aceto
Aceto
Aceto
Adrienn Dineva
Al-Emran
Aldribi
Ali
Alizadeh
Ambedkar
Ardabili
Atre
B.
Bace
Balamurugan
Balduzzi
Bharadwaja
Buyya
Cardellini
Chan
Chandolikar
Chandrasekaran
Chiba
Choi
Chonka
Chonka
Chonka
Chuah
Cisco
Crompton
Dainotti
Dainotti
Dainotti
Damopoulos
Darwish
Denz
Derfouf
Deshpande
Dinh
Donald
Drago
D’Arienzo
Eid
Engelbrecht
Enzai
Fernando
Franke
Fung
Gai
Gai
Gai
Gai
Ganeshkumar
Garfinkel
Ghorbani
Ghorbani
Ghosh
Ghosh
Guan
Guo
Gupta
Gupta
Hajimirzaei
Haken
Hanen
He
Hoang
Hoque
Huang
Huang
Huang
Huerta-Canepa
Idhammad
Inayat
Iqbal
Iyengar
Jansen
Jia
John
Karen
Khan
Kholidy
Khorshed
Koc
Kumar
Kumar
Kumar
Kumar
Kwon
La Polla
Liao
Lin
Liu
Liu
Lo
Lo'ai
Lombardi
Lopez
Lyu
Mahajan
Mell
Milenkoski
Mishra
Mishra
Modi
Modi
Mollah
Moustafa
Mukkamala
Nezarat
Nguyen
Nikolai
Nosratabadi
Osanaiye
Osanaiye
Otoum
Pandeeswari
Park
Patcha
Patel
Peng
Persico
Pitropakis
Poston
Rahimi
Raja
Rakotondravony
Ram
Rastegari
Ring
Roesch
Ruay-Shiung-Chang
Sabahi
Salek
Salimi
Sanaei
Shafi
Sharafaldin
Sharma
Sharma
Shelke
Shi
Shi
Shiravi
Shirazi
Siddique
Smith
Stavroulakis
Su
Suo
Tavallaee
Tsang
Velliangiri
Vemuri
Vieira
Vissers
Vivekanandan
VivinSandar
Wack
Wang
Wang
Wang
Wang
Wang
Wang
Watson
Wu
Xiao
Xiong
Xu
Yang
Yang
Yu
Zhang
Zydney
Publication venue
'Elsevier BV'
Publication date
Field of study
No full text
Crossref