Security
Omar Achbarou, My Ahmed El kiram, Salim El Bouanani (2017). "Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 4, issue Special Issue on Advances and Applications in the Internet of Things and Cloud Computing, no. 3, pp. 61-64. https://doi.org/10.9781/ijimai.2017.439 |
Jamal Talbi, Abdelkrim Haqiq (2017). "A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 4, issue Special Issue on Advances and Applications in the Internet of Things and Cloud Computing, no. 3, pp. 65-69. https://doi.org/10.9781/ijimai.2017.4310 |
Nilanjan Dey, Yesmine Ben Amar, Imen Trabelsi, Salim Bouhlel (2016). "Euclidean Distance Distortion Based Robust and Blind Mesh Watermarking", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 4, issue Regular Issue, no. 2, pp. 46-51. https://doi.org/10.9781/ijimai.2016.428 |
ER-RAJY Latifa, My Ahmed EL-KIRAM (2016). "A New Protection for Android Applications", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 3, issue Regular Issue, no. 7, pp. 15-19. https://doi.org/10.9781/ijimai.2016.372 |
K Venkateshwaran, Anu Malviya, Utkarsha Dikshit, S Venkatesan (2015). "Security Framework for Agent-Based Cloud Computing", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 3, issue Regular Issue, no. 3, pp. 35-42. https://doi.org/10.9781/ijimai.2015.334 |
Andrés Castillo-Sanz, Eugenio Gil (2015). "Legal Effects of Link Sharing in Social Networks", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 3, issue Regular Issue, no. 5, pp. 85-88. https://doi.org/10.9781/ijimai.2015.3511 |
Pushkar Dixit, Nishant Singh, Jay Prakash Gupta (2014). "Robust Lossless Semi Fragile Information Protection in Images", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 2, issue Regular Issue, no. 6, pp. 75-88. https://doi.org/10.9781/ijimai.2014.269 |
Jose Miguel Castillo, Rafael Solis-Montes (2013). "An Agent-Based Approach for Data Fusion in Homeland Security", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 2, issue Special Issue on Improvements in Information Systems and Technologies , no. 3, pp. 44-49. https://doi.org/10.9781/ijimai.2013.236 |
M Fraile-Hurtado, M Herrero-Langreo, P Menéndez-Miguel, V Delgado-Villanueva (2010). "Biometry, the safe key", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 1, issue A Direct Path to Intelligent Tools, no. 3, pp. 32-36. https://doi.org/10.9781/ijimai.2010.136 |
Paulo Alonso Gaona-García, Jesús Soto-Carrión (2009). "WoT model for authenticity contents in virtual learning platforms", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 1, issue Special Issue on Business Intelligence and Semantic Web, no. 2, pp. 71-78. https://doi.org/ |