Mostrando ítems 1-16 de 16

    • A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers 

      Talbi, Jamal; Haqiq, Abdelkrim (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)
      Cloud computing is becoming a key factor in computer science and an important technology for many organizations to deliver different types of services. The companies which provide services to customers are called as cloud ...
    • A Security Situation Awareness Approach for IoT Software Chain Based on Markov Game Model 

      Zhu, Xudong; Deng, Honggao (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 09/2022)
      Since Internet of Things (IoT) has been widely used in our daily life nowadays, it is regarded as a promising and popular application of the Internet, and has attracted more and more attention. However, IoT is also suffered ...
    • Analysis of Security Mechanisms Based on Clusters IoT Environments 

      Montenegro-Marin, Carlos Enrique; Gaona-García, Paulo Alonso; Prieto, Juan David; Nieto Acevedo, Yuri Vanessa (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)
      Internet of things is based on sensors, communication networks and intelligence that manages the entire process and the generated data. Sensors are the senses of systems, because of this, they can be used in large quantities. ...
    • Biometry, the safe key 

      Fraile Hurtado, María; Herrero Langreo, Miguel; Menéndez de Miguel, Pilar; Delgado Villanueva, Valerio (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2010)
      Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?
    • Edge Face Recognition System Based on One-Shot Augmented Learning 

      Jiménez-Bravo, Diego M.; Lozano Murciego, Álvaro; Sales, A.; Augusto Silva, Luis; De La Iglesia, Daniel H. (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 09/2022)
      There is growing concern among users of computer systems about how their data is handled. In this sense, IT (Information Technology) professionals are not unaware of this problem and are looking for solutions to meet the ...
    • Euclidean Distance Distortion Based Robust and Blind Mesh Watermarking 

      Dey, Nilanjan; Amar, Yesmine Ben; Trabelsi, Imen; Bouhlel, Salim (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2016)
      The three-dimensional (3D) polygonal meshes are recently widely used in several domains, which necessitate the realistic visualization of the objects. Moreover, there is an urgent need to protect the 3D data properties for ...
    • Genetic Operators Applied to Symmetric Cryptography 

      Rodríguez, Jefferson; Corredor, Brayan; Suárez, César (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2019)
      In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic. An experimental methodology is used over a deterministic system, ...
    • Improvement in Quality of Service Against Doppelganger Attacks for Connected Network 

      Choudhary, Deepak; Pahuja, Roop (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 09/2022)
      Because they are in a high-risk location, remote sensors are vulnerable to malicious ambushes. A doppelganger attack, in which a malicious hub impersonates a legitimate network junction and then attempts to take control ...
    • Local Technology to Enhance Data Privacy and Security in Educational Technology 

      Amo, Daniel; Prinsloo, Paul; Alier, Marc; Fonseca, David; Torres Kompen, Ricardo; Canaleta, Xavier; Herrero-Martín, Javier (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2021)
      In educational environments, technological adoption in the last 10 years has enabled a data-driven and decisionmaking paradigm in organizations. The integration of cloud services in schools and universities is a positive ...
    • QAM-DWT-SVD Based Watermarking Scheme for Medical Images 

      Ayad, Habib; Khalil, Mohammed (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2018)
      This paper presents a new semi-blind image watermarking system for medical applications. The new scheme utilizes Singular Value Decomposition (SVD) and Discrete Wavelet Transform (DWT) to embed a textual data into original ...
    • Reversible Image Watermarking Using Modified Quadratic Difference Expansion and Hybrid Optimization Technique 

      Lakshmi, H. R.; Borra, Surekha (International Journal of Interactive Multimedia and Artificial Intelligence, 08/2023)
      With increasing copyright violation cases, watermarking of digital images is a very popular solution for securing online media content. Since some sensitive applications require image recovery after watermark extraction, ...
    • Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems 

      Achbarou, Omar; El kiram, My Ahmed; El Bouanani, Salim (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)
      Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system ...
    • Security Framework for Agent-Based Cloud Computing 

      Venkateshwaran, K.; Malviya, Anu; Dikshit, Utkarsha; Venkatesan, S. (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 06/2015)
      Agent can play a key role in bringing suitable cloud services to the customer based on their requirements. In agent based cloud computing, agent does negotiation, coordination, cooperation and collaboration on behalf of ...
    • TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT 

      Dejene, Dawit; Tiwari, Basant; Tiwari, Vivek (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2020)
      The Internet of Things (IoT) is an emerging technology, which comprises wireless smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart Homes, Smart Cities, Smart Industries, Military, ...
    • Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment 

      Toumi, Hicham; Marzak, Bouchra; Talea, Amal; Eddaoui, Ahmed; Talea, Mohamed (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)
      Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming ...
    • WoT model for authenticity contents in virtual learning platforms 

      Gaona-García, Paulo Alonso; Soto-Carrión, Jesús (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2009)
      The following research proposal seeks to bring a model of security software on virtual learning platforms LCMS under all SCORM specifications to ensure the authenticity of content created under concepts of digital signature ...