Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks NY Conteh, PJ Schmick International Journal of Advanced Computer Research 6 (23), 31, 2016 | 238 | 2016 |
Sentiment Analysis of Movie Reviews using Hybrid Method of Naive Bayes and Genetic Algorithm M Govindarajan International Journal of Advanced Computer Research 3 (13), 139-145, 2013 | 80 | 2013 |
Content Sniffing Attack Detection in Client and Server Side: A Survey BS Thakur, S Chaudhary International Journal of Advanced Computer Research 3 (6), 7-10, 2013 | 77 | 2013 |
A review of multi-class classification for imbalanced data M Sahare, H Gupta International Journal of Advanced Computer Research 2 (5), 163-168, 2012 | 66 | 2012 |
Cryptocurrency adoption: current stage, opportunities, and open challenges R Al-Amri, NH Zakaria, A Habbal, S Hassan International Journal of Advanced Computer Research 9 (44), 293-307, 2019 | 65 | 2019 |
Uses of ICT in Agriculture M Mahant, A Shukla, S Dixit, D Patel International Journal of Advanced Computer Research (IJACR) 2 (3), 46-49, 2012 | 58 | 2012 |
Comparative Study between FPA, BA, MCS, ABC, and PSO Algorithms in Training and Optimizing of LS-SVM for Stock Market Prediction O Hegazy, OS Soliman, MA Salam International Journal of Advanced Computer Research 5 (18), 35-45, 2015 | 56 | 2015 |
Movies recommendation system using collaborative filtering and k-means P Phorasim, L Yu International Journal of Advanced Computer Research 7 (29), 52, 2017 | 55 | 2017 |
Genetic Neural Approach for Heart Disease Prediction NP Waghulde, NP Patil International Journal of Advanced Computer Research 4 (16), 778, 2014 | 54 | 2014 |
Pricing schemes in cloud computing: a review A Soni, M Hasan International Journal of Advanced Computer Research 7 (29), 60, 2017 | 48 | 2017 |
An Overview on Data Mining Approach on Breast Cancer data SS Shrivastava, A Sant, RP Aharwal International Journal of Advanced Computer Research 3 (13), 256-262, 2013 | 48 | 2013 |
Assessing the Quality of M-Learning Systems using ISO/IEC 25010 A Acharya, D Sinha International Journal of Advanced Computer Research 3 (12), 67-75, 2013 | 47 | 2013 |
Intrusion Detection System using Support Vector Machine (SVM) and Particle Swarm Optimization (PSO) V Manekar, K Waghmare International Journal of Advanced Computer Research 4 (16), 808, 2014 | 45 | 2014 |
Predicting E-Business Adoption through Integrating the Constructs of the Rogers’s Diffusion of Innovation Theory Combined with Technology-Organization-Environment Model MI Al-Zoubi International Journal of Advanced Computer Research 3 (13), 63-73, 2013 | 44 | 2013 |
A Review of Density-Based clustering in Spatial Data P Shrivastava, H Gupta International Journal of Advanced Computer Research 2 (5), 210-213, 2012 | 44 | 2012 |
The Correlation among Software Complexity Metrics with Case Study Y Tashtoush, M Al-Maolegi, B Arkok International Journal of Advanced Computer Research 4 (15), 414-419, 2014 | 42 | 2014 |
A Project on Atmospheric Water Generator with the Concept of Peltier Effect A Nandy, S Saha, S Ganguly, S Chattopadhyay International Journal of Advanced Computer Research 4 (15), 481-486, 2014 | 41 | 2014 |
The Effect of Accounting Information Systems in Accounting T Awosejo, O.J, Kekwaletswe, R, M, Pretorius, P and Zuva International Journal of Advanced Computer Research 3 (12), 142-150, 2013 | 40 | 2013 |
Antecedents of software-as-a-service (SaaS) adoption: a structural equation model MB Alotaibi International Journal of Advanced Computer Research 6 (25), 114, 2016 | 39 | 2016 |
Overview of security issues in cloud computing A Singh, M Shrivastava International Journal of Advanced Computer Research 2 (3), 41-45, 2012 | 39 | 2012 |