Skip to content
VuFind
Advanced
  • Application Of Confidence Rang...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
QR Code

Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing

Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When u...

Full description

Bibliographic Details
Main Authors: Mohanaad, Shakir, Asmidar, Abu Bakar, Younus, Yousoff, Mostafa, Al-Emran, Maytham, Hammood
Format: Article
Language:English
English
Published: JATIT 2016
Subjects:
QA76 Computer software
Online Access:http://umpir.ump.edu.my/id/eprint/16640/
http://umpir.ump.edu.my/id/eprint/16640/1/Application%20Of%20Confidence%20Range%20Algorithm%20In%20Recognizing%20User%20Behavior%20Through%20EPSB%20in%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/16640/6/Application%20Of%20Confidence%20Range%20Algorithm%20In%20Recognizing%20User%20Behavior%20Through%20EPSB%20in%20Cloud%20Computing.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://umpir.ump.edu.my/id/eprint/16640/
http://umpir.ump.edu.my/id/eprint/16640/1/Application%20Of%20Confidence%20Range%20Algorithm%20In%20Recognizing%20User%20Behavior%20Through%20EPSB%20in%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/16640/6/Application%20Of%20Confidence%20Range%20Algorithm%20In%20Recognizing%20User%20Behavior%20Through%20EPSB%20in%20Cloud%20Computing.pdf

Similar Items

  • Model of security level classification for data in hybrid cloud computing
    by: Shakir, Mohanaad, et al.
    Published: (2016)
  • Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
    by: Eldow, Abdalla, et al.
    Published: (2019)
  • Recognizing user activity based on accelerometer data from a mobile phone
    by: Ayu, Media Anugerah, et al.
    Published: (2011)
  • Human system interaction with confident computing
    by: Chang, Elizabeth, et al.
    Published: (2008)
  • Recognizing culture based religious icons from muslim culture user interface design (MCUID) prototype
    by: Nasruddin, Zan Azma, et al.
    Published: (2014)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips