Ariel M. Sison
According to our database1,
Ariel M. Sison
authored at least 32 papers
between 2011 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Proceedings of the Intelligent Systems and Applications, 2021
2020
Cryptographic Randomness Test of the Modified Hashing Function of SHA256 to Address Length Extension Attack.
Proceedings of the ICCBN 2020: 8th International Conference on Communications and Broadband Networking, 2020
Proceedings of the HPCCT & BDAI 2020: 4th High Performance Computing and Cluster Technologies Conference & 3rd International Conference on Big Data and Artificial Intelligence, 2020
Extended PrefixSpan for Efficient Sequential Pattern Mining in a Game-based Learning Environment.
Proceedings of the APIT 2020: 2nd Asia Pacific Information Technology Conference, 2020
2019
Modifying Bit-Level Data Compression Scheme based on Adaptive Hamming Code Data Compression Algorithm.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2019
Implementation and Performance Assessment of Enhanced RC5 Cryptosystem Applied to Different File Types.
Proceedings of the 9th IEEE International Conference on System Engineering and Technology, 2019
Proceedings of the 8th International Conference on Software and Computer Applications, 2019
Proceedings of the 3rd International Conference on Machine Learning and Soft Computing, 2019
Jumbled passsteps: a hotspot guessing attack resistant graphical password authentication scheme based on the modified passmatrix method.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019
Proceedings of the 2nd International Conference on Computing and Big Data, 2019
A Secure Key Scheduling Operation for International Data Encryption Algorithm using Serpent Key Schedule Operation.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019
GISKOP: A Modified Key Scheduling Operation of International Data Encryption Algorithm using Serpent Key Scheduling.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019
A Modified Least Significant Bit Randomized Embedding Method based on Image Partitioning and Columnar Transposition with Encryption.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019
Proceedings of the 2nd International Conference on Data Science and Information Technology, 2019
Performance Analysis of the Modified Generated S-Box for Advanced Encryption Standards.
Proceedings of the 2nd International Conference on Data Science and Information Technology, 2019
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
An Enhanced Recommendation Algorithm Based on Modified User-Based Collaborative Filtering.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
Application of the Modified Imputation Method to Missing Data to Increase Classification Performance.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
2018
Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks.
Int. J. Commun. Networks Inf. Secur., 2018
Int. J. Commun. Networks Inf. Secur., 2018
A Hybrid Prediction Model Integrating a Modified Genetic Algorithm to K-means Segmentation and C4.5.
Proceedings of the TENCON 2018, 2018
Implementation of GA-Based Feature Selection in the Classification and Mapping of Disaster-Related Tweets.
Proceedings of the 2nd International Conference on Natural Language Processing and Information Retrieval, 2018
A New Advanced Encryption Standard-Butterfly Effect in Protecting Image of Copyright Piracy.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018
Application of enhanced expectation maximization (EnEM) algorithm for image segmentation.
Proceedings of the 2018 International Conference on Data Science and Information Technology, 2018
Proceedings of the 2018 International Conference on Data Science and Information Technology, 2018
2011
Data Extraction Using Preprocessing Compression Based on LZW to Improve DB Performance.
Proceedings of the 9th International Conference on Software Engineering Research, 2011
Proceedings of the 9th International Conference on Software Engineering Research, 2011