| Detecting Malicious URLs: Trends, Challenges and the Role of Browser Extensions |
| Homam Eltaj and Maria Ajaj, Dar Al-Hekma University, Saudi Arabia |
| Volume : 17 volume number : 3 pdf |
| Access Detection System on Web Cameras and Microphones |
| Homam El-Taj, Amena Khoja, Basmah Alsharif, Dana Alsulami and Jumaina Abdulmajed, Dar Al-Hekma University, Saudi Arabia |
| Volume : 17 volume number : 3 pdf |
| Deep Learning Solutions for Source Code Vulnerability Detection |
| Nin Ho Le Viet, Long Phan, Hieu Ngo Van and Tin Trinh Quang, Duy Tan University, Vietnam |
| Volume : 17 volume number : 3 pdf |
| Scalability Analysis of IoT-DAG Distributed Ledgers using Preferential Attachment Topology: A Simulation Approach |
| Peter Kimemiah Mwangi, Stephen T. Njenga and Gabriel Ndung’u Kamau, Murang’a University of Technology, Murang’a, Kenya |
| Volume : 17 volume number : 3 pdf |
| Static Testing Tools Architecture in OpenMP for Exascale Systems |
| Samah Alajmani, Taif University, Saudi Arabia |
| Volume : 17 volume number : 3 pdf |
| A Lightweight Network Intrusion Detection System for SMEs |
| Homam El-Ta, Mawadah Fahhad, Reeman Abumlha, Shadan Showman and Zaina Saab, Dar Al-Hekma University, Saudi Arabia |
| Volume : 17 volume number : 3 pdf |