Learn More
This article presents a brief overview on cloud computing security in terms of security considerations, models, threats and precautions. The articles published in recent years were classified and they were then analyzed in terms of problems, solutions and challenges. It should be concluded that standards, measurements and metrics for evaluations of threats(More)
Due to the reasons such as the rapid growth and spread of network services, mobile devices, and online users on the Internet leading to a remarkable increase in the amount of data. Almost every industry is trying to cope with this huge data. Big data phenomenon has begun to gain importance. However, it is not only very difficult to store big data and(More)
In this study, malicious users who cause to resource exhausting are tried to detect in a telecommunication company network. Non-Legitimate users could cause lack of information availability and need countermeasures to prevent threat or limit permissions on the system. For this purpose, ANN based intelligent system is proposed and compared to SVM which is(More)
The rapid growth of the web has caused to availability of data effective if its content is well organized. Despite the fact that Wikipedia is the biggest encyclopedia on the web, its quality is suspect due to its Open Editing Schemas (OES). In this study, zoology and botany pages are selected in English Wikipedia and their html contents are converted to(More)
  • 1