Security
Jamal Talbi, Abdelkrim Haqiq (2017). "A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 4, issue Special Issue on Advances and Applications in the Internet of Things and Cloud Computing, no. 3, pp. 65-69. https://doi.org/10.9781/ijimai.2017.4310 |
Hicham Toumi, Bouchra Marzak, Amal Talea, Ahmed Eddaoui, Mohamed Talea (2017). "Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 4, issue Special Issue on Advances and Applications in the Internet of Things and Cloud Computing, no. 3, pp. 70-74. https://doi.org/10.9781/ijimai.2017.4311 |
ER-RAJY Latifa, My Ahmed EL-KIRAM (2016). "A New Protection for Android Applications", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 3, issue Regular Issue, no. 7, pp. 15-19. https://doi.org/10.9781/ijimai.2016.372 |
Nilanjan Dey, Yesmine Ben Amar, Imen Trabelsi, Salim Bouhlel (2016). "Euclidean Distance Distortion Based Robust and Blind Mesh Watermarking", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 4, issue Regular Issue, no. 2, pp. 46-51. https://doi.org/10.9781/ijimai.2016.428 |
K Venkateshwaran, Anu Malviya, Utkarsha Dikshit, S Venkatesan (2015). "Security Framework for Agent-Based Cloud Computing", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 3, issue Regular Issue, no. 3, pp. 35-42. https://doi.org/10.9781/ijimai.2015.334 |
Andrés Castillo-Sanz, Eugenio Gil (2015). "Legal Effects of Link Sharing in Social Networks", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 3, issue Regular Issue, no. 5, pp. 85-88. https://doi.org/10.9781/ijimai.2015.3511 |
Pushkar Dixit, Nishant Singh, Jay Prakash Gupta (2014). "Robust Lossless Semi Fragile Information Protection in Images", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 2, issue Regular Issue, no. 6, pp. 75-88. https://doi.org/10.9781/ijimai.2014.269 |
Jose Miguel Castillo, Rafael Solis-Montes (2013). "An Agent-Based Approach for Data Fusion in Homeland Security", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 2, issue Special Issue on Improvements in Information Systems and Technologies , no. 3, pp. 44-49. https://doi.org/10.9781/ijimai.2013.236 |
M Fraile-Hurtado, M Herrero-Langreo, P Menéndez-Miguel, V Delgado-Villanueva (2010). "Biometry, the safe key", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 1, issue A Direct Path to Intelligent Tools, no. 3, pp. 32-36. https://doi.org/10.9781/ijimai.2010.136 |
Paulo Alonso Gaona-García, Jesús Soto-Carrión (2009). "WoT model for authenticity contents in virtual learning platforms", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 1, issue Special Issue on Business Intelligence and Semantic Web, no. 2, pp. 71-78. https://doi.org/ |