مرور Volume 5, Issue 3 بر اساس تاریخ انتشار
در حال نمایش موارد 1 - 4 از 4
-
A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
(Science and Research Branch,Islamic Azad University, 2019-08-01)Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of ...
-
Detecting Active Bot Networks Based on DNS Traffic Analysis
(Science and Research Branch,Islamic Azad University, 2019-08-01)Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the ...
-
2016 Olympic Games on Twitter: Sentiment Analysis of Sports Fans Tweets using Big Data Framework
(Science and Research Branch,Islamic Azad University, 2019-08-01)Big data analytics is one of the most important subjects in computer science. Today, due to the increasing expansion of Web technology, a large amount of data is available to researchers. Extracting information from these ...
-
IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA
(Science and Research Branch,Islamic Azad University, 2019-08-01)Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking ...



