咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 3 篇 软件工程

主题

  • 1 篇 internet of thin...
  • 1 篇 capacity
  • 1 篇 ethereum
  • 1 篇 distributed syst...
  • 1 篇 access control
  • 1 篇 image steganogra...
  • 1 篇 abac
  • 1 篇 avl tree
  • 1 篇 peak signal-to-n...
  • 1 篇 software archite...
  • 1 篇 iot
  • 1 篇 hierarchical col...
  • 1 篇 blockchain
  • 1 篇 architectural di...
  • 1 篇 imperceptibility
  • 1 篇 model discovery ...
  • 1 篇 pixel random sel...
  • 1 篇 process mining

机构

  • 1 篇 center of cyber ...
  • 1 篇 computer science...
  • 1 篇 centre for cyber...
  • 1 篇 universiti keban...

作者

  • 3 篇 zarina shukur
  • 2 篇 faizan qamar
  • 1 篇 zulkefli mansor
  • 1 篇 hafiz adnan huss...
  • 1 篇 uzma jafar
  • 1 篇 rossilawati sula...
  • 1 篇 murad njoum
  • 1 篇 mahdi sahlabadi
  • 1 篇 syed hussain ali...
  • 1 篇 ravie chandren m...

语言

  • 3 篇 英文
检索条件"作者=Zarina Shukur"
3 条 记 录,以下是1-10 订阅
排序:
Ether-IoT:A Realtime Lightweight and Scalable Blockchain-Enabled Cache Algorithm for IoT Access Control
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3797-3815页
作者: Hafiz Adnan Hussain Zulkefli Mansor zarina shukur Uzma Jafar Universiti Kebangsaan Malaysia Bangi43000Malaysia
Several unique characteristics of Internet of Things(IoT)devices,such as distributed deployment and limited storage,make it challenging for standard centralized access control systems to enable access control in today... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 183-211页
作者: Murad Njoum Rossilawati Sulaiman zarina shukur Faizan Qamar Center of Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangiSelangor43600Malaysia Computer Science and Cyber Security Faculty of Engineering and Information TechnologyBirZeit UniversityBirZeitRamallahP.O.Box 14Palestine
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden *** property makes it difficult for steganalysts’powerful data extraction t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Process Mining Discovery Techniques for Software Architecture Lightweight Evaluation Framework
收藏 引用
Computers, Materials & Continua 2023年 第3期74卷 5777-5797页
作者: Mahdi Sahlabadi Ravie Chandren Muniyandi zarina shukur Faizan Qamar Syed Hussain Ali Kazmi Centre for Cyber Security Faculty of Information Science and Technology(FTSM)Universiti Kebangsaan Malaysia(UKM)Bangi43600SelangorMalaysia
This research recognizes the limitation and challenges of adaptingand applying Process Mining as a powerful tool and technique in theHypothetical Software Architecture (SA) Evaluation Framework with thefeatures and fa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论