Security
Carlos Enrique Montenegro-Marín, Paulo Alonso Gaona-García, Juan David Prieto, Yuri Vanessa Nieto (2017). "Analysis of Security Mechanisms Based on Clusters IoT Environments", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 4, issue Special Issue on Advances and Applications in the Internet of Things and Cloud Computing, no. 3, pp. 55-60. https://doi.org/10.9781/ijimai.2017.438 |
Omar Achbarou, My Ahmed El kiram, Salim El Bouanani (2017). "Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 4, issue Special Issue on Advances and Applications in the Internet of Things and Cloud Computing, no. 3, pp. 61-64. https://doi.org/10.9781/ijimai.2017.439 |
Nilanjan Dey, Yesmine Ben Amar, Imen Trabelsi, Salim Bouhlel (2016). "Euclidean Distance Distortion Based Robust and Blind Mesh Watermarking", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 4, issue Regular Issue, no. 2, pp. 46-51. https://doi.org/10.9781/ijimai.2016.428 |
ER-RAJY Latifa, My Ahmed EL-KIRAM (2016). "A New Protection for Android Applications", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 3, issue Regular Issue, no. 7, pp. 15-19. https://doi.org/10.9781/ijimai.2016.372 |
K Venkateshwaran, Anu Malviya, Utkarsha Dikshit, S Venkatesan (2015). "Security Framework for Agent-Based Cloud Computing", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 3, issue Regular Issue, no. 3, pp. 35-42. https://doi.org/10.9781/ijimai.2015.334 |
Andrés Castillo-Sanz, Eugenio Gil (2015). "Legal Effects of Link Sharing in Social Networks", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 3, issue Regular Issue, no. 5, pp. 85-88. https://doi.org/10.9781/ijimai.2015.3511 |
Pushkar Dixit, Nishant Singh, Jay Prakash Gupta (2014). "Robust Lossless Semi Fragile Information Protection in Images", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 2, issue Regular Issue, no. 6, pp. 75-88. https://doi.org/10.9781/ijimai.2014.269 |
Jose Miguel Castillo, Rafael Solis-Montes (2013). "An Agent-Based Approach for Data Fusion in Homeland Security", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 2, issue Special Issue on Improvements in Information Systems and Technologies , no. 3, pp. 44-49. https://doi.org/10.9781/ijimai.2013.236 |
M Fraile-Hurtado, M Herrero-Langreo, P Menéndez-Miguel, V Delgado-Villanueva (2010). "Biometry, the safe key", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 1, issue A Direct Path to Intelligent Tools, no. 3, pp. 32-36. https://doi.org/10.9781/ijimai.2010.136 |
Paulo Alonso Gaona-García, Jesús Soto-Carrión (2009). "WoT model for authenticity contents in virtual learning platforms", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 1, issue Special Issue on Business Intelligence and Semantic Web, no. 2, pp. 71-78. https://doi.org/ |