EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: isPartOf:"International Journal of Information System Modeling and Design (IJISMD)"
Narrow search

Narrow search

Year of publication
Subject
All
Genetic Algorithm 3 Ant Colony Optimization 2 Compliance 2 Data Modeling 2 Metamodel 2 Model Transformation 2 Model-Driven Engineering 2 Object-Role Modeling 2 Particle Swarm Optimization 2 Abstract Transition 1 Access Control Lists 1 Actor-Based Adaptations 1 Adaptive Routing 1 Agile Modeling Method Engineering 1 Annotations 1 Anomaly Detection 1 ArchiSurance 1 Artificial Bee Colony 1 Atrial Fibrillation 1 Audio Signal 1 Auditing 1 Authentication 1 Automated Verbalization 1 BGP 1 BGP Confederations 1 BPEL 1 BPMN 1 Basic Reproduction Number 1 Behavioral Models, Interactive Development, Proactive Analysis, Reactive Models 1 Bidirectional Transformations 1 Big Data 1 Bilateral Filter 1 Business 1 Business Model 1 Business Process Management 1 Cancer 1 Card-based Design 1 Case-study 1 Choreography 1 Cloud Computing 1
more ... less ...
Online availability
All
Undetermined 49
Type of publication
All
Article 49
Language
All
English 49
Author
All
Halpin, Terry 2 Mira da Silva, Miguel 2 Singh, Pradeep Kumar 2 Abdelkader, Mostefai 1 Abraham, Cerene Mariam 1 Acheampong, Faustina 1 Alam, Abu Turab 1 Alexopoulou, Nancy 1 Alfredson, Jens 1 Arora, Arushi 1 Arora, Ashima 1 Balsters, Herman 1 Bansal, Neha 1 Bansal, Rohit 1 Bardhan, Meghna 1 Belala, Faiza 1 Benedicenti, Luigi 1 Benhamamouch, Djilali 1 Benyamina, Abou El Hassen 1 Berramla, Karima 1 Borisagar, Komal 1 Bouanaka, Chafia 1 Bradai, Salma 1 Buchmann, Robert Andrei 1 Buchmann, Thomas 1 Ch, Madhava Rao 1 Chauhan, Nilanshi 1 Chhillar, Rajender Singh 1 Chowdhury, Nilabhra Roy 1 Croenertz, Oliver 1 Deba, El Abbassia 1 Debza, Ahmed Amar 1 Delgado, José C. 1 Deshpande, Arvind V. 1 Durand, William 1 Elayidom, M. Sudheep 1 Ferreira, Francisco 1 Franchi, Enrico 1 Fu, Meng-Hsuan 1 Geist, Verena 1
more ... less ...
Published in...
All
International Journal of Information System Modeling and Design (IJISMD) 49
Source
All
Other ZBW resources 49
Showing 1 - 10 of 49
Cover Image
Pre-Vaccination and Quarantine Approach for Defense Against Worms Propagation of Malicious Objects in Wireless Sensor Networks
Ojha, Rudra Pratap; Srivastava, Pramod Kumar; Sanyal, Goutam - In: International Journal of Information System Modeling … 9 (2018) 1, pp. 1-20
Network security poses a challenge to wireless sensor networks (WSNs) achieving its true potential. It is hard to tackle due to operational constraints of networks. Worms have become an emergent threat to the wireless networks. The spread of worms in the network is epidemic in nature. This...
Persistent link: https://www.econbiz.de/10012045656
Saved in:
Cover Image
Smart Device Authentication Based on Online Handwritten Script Identification and Word Recognition in Indic Scripts Using Zone-Wise Features
Ghosh, Rajib; Roy, Partha Pratim; Kumar, Prabhat - In: International Journal of Information System Modeling … 9 (2018) 1, pp. 21-55
Secure authentication is a vital component for device security. The most basic form of authentication is by using passwords. With the evolution of smart devices, selecting stronger and unbreakable passwords have become a challenging task. Such passwords if written in native languages tend to...
Persistent link: https://www.econbiz.de/10012045657
Saved in:
Cover Image
Security Integration in DDoS Attack Mitigation Using Access Control Lists
Sharma, Kavita; Yadav, Sumit Kumar; Arora, Arushi - In: International Journal of Information System Modeling … 9 (2018) 1, pp. 56-76
In this article, the authors propose a DDoS mitigation system through access list-based configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to prohibit DDoS attacks over ISPs' networks traffic. The effectiveness of the proposed system relies heavily on the...
Persistent link: https://www.econbiz.de/10012045658
Saved in:
Cover Image
Model Driven Approach to Secure Optimized Test Paths for Smart Samsung Pay using Hybrid Genetic Tabu Search Algorithm
Rathee, Nisha; Chhillar, Rajender Singh - In: International Journal of Information System Modeling … 9 (2018) 1, pp. 77-91
Smart mobile pay applications on smart devices have been considered as the most efficient and secure mode of contactless payment. To safeguard customer credit/ debit card details, testing of mobile pay solutions like Samsung Pay is most important and critical task for testers. Testing of all the...
Persistent link: https://www.econbiz.de/10012045659
Saved in:
Cover Image
A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach
Kimbahune, Vinod Vijaykumar; Deshpande, Arvind V.; … - In: International Journal of Information System Modeling … 9 (2018) 1, pp. 92-121
The computational complexity of the next generation internet (NGI) is increasing at a faster rate. Due to the large scale of ubiquitous devices, effective and secure communication and addressing mechanism is vulnerable to several threats. Apart from resource constraints of the devices, the...
Persistent link: https://www.econbiz.de/10012045660
Saved in:
Cover Image
Comparison and Evaluation of Organizational Transactions for Continuous Auditing and Business Compliance
Santos, Henrique; Marques, Rui Pedro; Santos, Carlos - In: International Journal of Information System Modeling … 9 (2018) 2, pp. 1-23
This article presents a comparator module which aims to compare, in real time, executions of organizational transactions with patterns of behaviors of these transaction executions, allowing the determination of which execution pattern is being followed by running each transaction. This is...
Persistent link: https://www.econbiz.de/10012045661
Saved in:
Cover Image
Aligning Supply Chain Logistics Costs via ERP Coordination
Muscatello, Joseph R.; Parente, Diane H.; Swinarski, Matthew - In: International Journal of Information System Modeling … 9 (2018) 2, pp. 24-43
Enterprise resource planning (ERP) systems address the problem of disparate information in an organization and coordinates mechanisms to eliminate supply chain sub-optimization. Logistics costs are a substantial part of an operation and this research provides insights into the relationship...
Persistent link: https://www.econbiz.de/10012045662
Saved in:
Cover Image
An Approach Based on Hierarchical Petri Nets for the Verification of Interconnected BPEL Processes
Saida, Boukhedouma; Zaia, Alimazighi - In: International Journal of Information System Modeling … 9 (2018) 2, pp. 44-78
This article describes an MDE approach for transformation from BPEL specifications to WF-nets models for verifying behavioral properties on IOWF (Inter-Organizational Workflow) processes. The authors consider WF processes specified with BPEL and interconnected together according to specific...
Persistent link: https://www.econbiz.de/10012045663
Saved in:
Cover Image
An Analysis in Tissue Classification for Colorectal Cancer Histology Using Convolution Neural Network and Colour Models
Tiwari, Shamik - In: International Journal of Information System Modeling … 9 (2018) 4, pp. 1-19
Computer vision-based identification of different tissue categories in histological images is a critical application of the computer-assisted diagnosis (CAD). Computer-assisted diagnosis systems support to reduce the cost and increase the efficiency of this process. Traditional image...
Persistent link: https://www.econbiz.de/10012045664
Saved in:
Cover Image
Donation Model Development Based on the Methodologies of Blockchain
Fu, Meng-Hsuan - In: International Journal of Information System Modeling … 9 (2018) 4, pp. 20-36
In order to solve the problems occurring in the current donation systems, the methodologies of blockchain include decentralized data storage, transaction hash, digital signature, blocks connection within the chain are adopted to the donation model, called blockchain donation model (BDM). In BDM,...
Persistent link: https://www.econbiz.de/10012045665
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...