Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When u...
| Main Authors: | Mohanaad, Shakir, Asmidar, Abu Bakar, Younus, Yousoff, Mostafa, Al-Emran, Maytham, Hammood |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
JATIT
2016
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/16640/ http://umpir.ump.edu.my/id/eprint/16640/1/Application%20Of%20Confidence%20Range%20Algorithm%20In%20Recognizing%20User%20Behavior%20Through%20EPSB%20in%20Cloud%20Computing.pdf http://umpir.ump.edu.my/id/eprint/16640/6/Application%20Of%20Confidence%20Range%20Algorithm%20In%20Recognizing%20User%20Behavior%20Through%20EPSB%20in%20Cloud%20Computing.pdf |
Similar Items
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
by: Eldow, Abdalla, et al.
Published: (2019)
by: Eldow, Abdalla, et al.
Published: (2019)
Recognizing user activity based on accelerometer data from a mobile phone
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
Human system interaction with confident computing
by: Chang, Elizabeth, et al.
Published: (2008)
by: Chang, Elizabeth, et al.
Published: (2008)
Recognizing culture based religious icons from muslim culture user interface design (MCUID) prototype
by: Nasruddin, Zan Azma, et al.
Published: (2014)
by: Nasruddin, Zan Azma, et al.
Published: (2014)
Recognizing culture based religious icons from Muslim culture user interface design (MCUID) prototype
by: Nasruddin, Zan Azma, et al.
Published: (2015)
by: Nasruddin, Zan Azma, et al.
Published: (2015)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Difficulties and challenges of recognizing Arabic text
by: Abuzaraida, Mustafa Ali, et al.
Published: (2011)
by: Abuzaraida, Mustafa Ali, et al.
Published: (2011)
Another way to recognize human action
by: Abdullah, Lili Nurliyana, et al.
Published: (2007)
by: Abdullah, Lili Nurliyana, et al.
Published: (2007)
Nonfatal Strangulation in a Sample of Domestically Violent Stalkers: The Importance of Recognizing Coercively Controlling Behaviors
by: Bendlin, M., et al.
Published: (2019)
by: Bendlin, M., et al.
Published: (2019)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Quality of service model for software as a service in cloud computing from users' and providers' perspectives
by: Khanjani, Atieh
Published: (2015)
by: Khanjani, Atieh
Published: (2015)
Confidence trick: the interpretation of confidence intervals
by: Foster, Colin
Published: (2014)
by: Foster, Colin
Published: (2014)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Recognizing Faces -- An Approach Based on Gabor Wavelets
by: Shen, Linlin
Published: (2005)
by: Shen, Linlin
Published: (2005)
‘Focal’ Cardiac Concussion – An Under-Recognized Problem?
by: TAN TL.,, et al.
Published: (2015)
by: TAN TL.,, et al.
Published: (2015)
Confident computing - a new paradigm for interactions on the web and internet
by: Chang, Elizabeth
Published: (2007)
by: Chang, Elizabeth
Published: (2007)
Cloud computing in Malaysia Universities
by: Razak, Siti Fatimah Abdul
Published: (2009)
by: Razak, Siti Fatimah Abdul
Published: (2009)
Cloud computing: issues and challenges
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013)
by: Jaber, Aws Naser, et al.
Published: (2013)
The relationship between and the characteristics of computing competence and confidence in undergraduate students of nursing
by: Todhunter, Carole Fern
Published: (2014)
by: Todhunter, Carole Fern
Published: (2014)
Questionnaire Development Process to Measure the SMEs' Continuous Use behavior towards Cloud Computing Services
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
by: Al-Sharafi, Mohammed A., et al.
Published: (2019)
Recognize Hate Speech On Twitter Using Machine Learning
by: Yashaswini, Kini, et al.
Published: (2024)
by: Yashaswini, Kini, et al.
Published: (2024)
Recognizing the presence of hidden visual markers in digital images
by: Xu, Liming, et al.
Published: (2017)
by: Xu, Liming, et al.
Published: (2017)
Analysis of SURF and SIFT representations to recognize food objects
by: Razali, Mohd Norhisham, et al.
Published: (2017)
by: Razali, Mohd Norhisham, et al.
Published: (2017)
Malaysia currency recognizer mobile application for visual impairment
by: Lee, Kyai Lun
Published: (2021)
by: Lee, Kyai Lun
Published: (2021)
High Performance Computing on the Cloud via HPC+Cloud software framework
by: Balakrishnan, S., et al.
Published: (2017)
by: Balakrishnan, S., et al.
Published: (2017)
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)
by: Shah, Asadullah
Published: (2015)
Conceptual SLA Framework for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
Response time for cloud computing providers
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
The impact of Cloud Computing and organizational sustainability
by: Issa, Tomayess, et al.
Published: (2010)
by: Issa, Tomayess, et al.
Published: (2010)
Cloud Computing: Analysis of Various Platforms
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Cloud computing: comparison of various features
by: Khan, Nawsher, et al.
Published: (2011)
by: Khan, Nawsher, et al.
Published: (2011)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Examining the low, high and range measures of muscle activity amplitudes in symptomatic and asymptomatic computer users performing typing and mousing tasks
by: Szeto, G., et al.
Published: (2009)
by: Szeto, G., et al.
Published: (2009)
Computing range skyline query on uncertain dimension
by: Mohd Saad, Nurul Husna, et al.
Published: (2016)
by: Mohd Saad, Nurul Husna, et al.
Published: (2016)
Computing range skyline query on uncertain dimension
by: Mohd Saad, Nurul Husna, et al.
Published: (2016)
by: Mohd Saad, Nurul Husna, et al.
Published: (2016)
Similar Items
-
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016) -
Literature Review Of Authentication Layer For Public Cloud Computing: A Meta-Analysis
by: Eldow, Abdalla, et al.
Published: (2019) -
Recognizing user activity based on accelerometer data from a mobile phone
by: Ayu, Media Anugerah, et al.
Published: (2011) -
Human system interaction with confident computing
by: Chang, Elizabeth, et al.
Published: (2008) -
Recognizing culture based religious icons from muslim culture user interface design (MCUID) prototype
by: Nasruddin, Zan Azma, et al.
Published: (2014)