Security
H. R. Lakshmi, Surekha Borra (In Press). "Reversible Image Watermarking Using Modified Quadratic Difference Expansion and Hybrid Optimization Technique", International Journal of Interactive Multimedia and Artificial Intelligence, vol. In Press, issue 14, no. In Press, pp. 1-14. https://doi.org/10.9781/ijimai.2023.08.002 |
Xudong Zhu, Honggao Deng (2022). "A Security Situation Awareness Approach for IoT Software Chain Based on Markov Game Model", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 7, issue Special Issue on Multimedia Streaming and Processing in Internet of Things with Edge Intelligence, no. 5, pp. 59-65. https://doi.org/10.9781/ijimai.2022.08.002 |
Deepak Choudhary, Roop Pahuja (2022). "Improvement in Quality of Service Against Doppelganger Attacks for Connected Network", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 7, issue Special Issue on Multimedia Streaming and Processing in Internet of Things with Edge Intelligence, no. 5, pp. 51-58. https://doi.org/10.9781/ijimai.2022.08.003 |
Diego M. Jiménez-Bravo, Álvaro Lozano Murciego, André Sales Mendes, Luís Augusto Silva, Daniel H. De La Iglesia (2022). "Edge Face Recognition System Based on One-Shot Augmented Learning", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 7, issue Special Issue on New Trends in Disruptive Technologies, Tech Ethics and Artificial Intelligence, no. 6, pp. 31-44. https://doi.org/10.9781/ijimai.2022.09.001 |
Daniel Amo, Paul Prinsloo, Marc Alier, David Fonseca, Ricardo Torres Kompen, Xavier Canaleta, Javier Herrero-Martín (2021). "Local Technology to Enhance Data Privacy and Security in Educational Technology", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 7, issue Regular Issue, no. 2, pp. 262-273. https://doi.org/10.9781/ijimai.2021.11.006 |
Dawit Dejene, Basant Tiwari, Vivek Tiwari (2020). "TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, issue Regular Issue, no. 4, pp. 146-156. https://doi.org/10.9781/ijimai.2020.10.002 |
Jefferson Rodríguez, Brayan Corredor, César Suárez (2019). "Genetic Operators Applied to Symmetric Cryptography", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 5, issue Regular Issue, no. 7, pp. 39-49. https://doi.org/10.9781/ijimai.2019.07.006 |
Habib Ayad, Mohammed Khalil (2018). "QAM-DWT-SVD Based Watermarking Scheme for Medical Images", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 5, issue Regular Issue, no. 3, pp. 81-89. https://doi.org/10.9781/ijimai.2018.01.001 |
Carlos Enrique Montenegro-Marín, Paulo Alonso Gaona-García, Juan David Prieto, Yuri Vanessa Nieto (2017). "Analysis of Security Mechanisms Based on Clusters IoT Environments", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 4, issue Special Issue on Advances and Applications in the Internet of Things and Cloud Computing, no. 3, pp. 55-60. https://doi.org/10.9781/ijimai.2017.438 |
Omar Achbarou, My Ahmed El kiram, Salim El Bouanani (2017). "Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 4, issue Special Issue on Advances and Applications in the Internet of Things and Cloud Computing, no. 3, pp. 61-64. https://doi.org/10.9781/ijimai.2017.439 |