All Stories

  1. Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1)
  2. Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1)
  3. Using Hadoop Technology to Overcome Big Data Problems by Choosing Proposed Cost-efficient Scheduler Algorithm for Heterogeneous Hadoop System (BD3)
  4. Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2)
  5. Utility-Based Anonymization Using Generalization Boundaries to Protect Sensitive Attributes
  6. Multiple-Published Tables Privacy-Preserving Data Mining: A Survey for Multiple-Published Tables Techniques
  7. Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing