Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Impostor Recognition Based Voice Authentication by Applying Three Machine Learning Algorithms

Ashraf Tahseen Ali; Hasanen Abdullah; Mohammed Natiq Fadhil

Volume 21, Issue 3 , September 2021, , Page 112-124

https://doi.org/https://doi.org/10.33103/uot.ijccce.21.3.10

Abstract
  As compared to other conventional biometrics systems, voice is a unique and important metric, where it is used in many vital fields as the security and communication domains that do not need to be expensive to achieve. The purpose of this article is to see how machine learning (ML) algorithms perform ...  Read More ...

Proposed Integrated Wire/Wireless Network Intrusion Detection System

Soukaena Hassan Hashem

Volume 14, Issue 2 , August 2014, , Page 9-24

Abstract
  Abstract - This research proposes “Integrated Network Intrusion Detection System (INIDS)” which is NIDS for wire/wireless networks. INIDN consider features of the three layers; transport and Internet layers for wire and data link layer for wireless. The proposal is a Data Mining (DM)-based INIDS, ...  Read More ...