Skip to main content

and
  1. Article

    Open Access

    Cloud-based email phishing attack using machine and deep learning algorithm

    Cloud computing refers to the on-demand availability of personal computer system assets, specifically data storage and processing power, without the client's input. Emails are commonly used to send and receive...

    Umer Ahmed Butt, Rashid Amin, Hamza Aldabbas in Complex & Intelligent Systems (2023)

  2. No Access

    Article

    Analyzing the interactions among factors affecting cloud adoption for software testing: a two-stage ISM-ANN approach

    To reduce costs and improve organizational efficiency, the adoption of innovative services such as Cloud services is the current trend in today’s highly competitive global business venture. The aim of the stud...

    Sikandar Ali, Samad Baseer, Irshad Ahmed Abbasi, Bader Alouffi in Soft Computing (2022)