The paper introduces the Secure kNN (SkNN) approach to data classification and querying. The approach is founded on the concept of Secure Chain Distance Matrices (SCDMs) whereby the classification…
With the advances in machine learning techniques and the potency of cloud computing there is an increasing adoption of third party cloud services for outsourcing training and prediction of machine…
To study the variation in emotional responses to stimuli, different methods have been developed to elicit emotions in a replicable way. Using video clips has been shown to be the most effective…
by
Nawal Al-Mutairi, Sharifa Alghowinem, Areej Al-Wabil
This course covers fundamentals of digital forensics, cybercrime scene analysis and electronic discovery. Digital forensics uses tools and techniques to collect and preserve evidence of computer…
Students in the non-thesis option will normally complete their project in the last two terms of the program. Students will undertake an independent project in an area of Information Technology.…
Students conduct an independent research project in the field of cybersecurity. The research project can be either a study of a theoretical or a thematic (development) topic. At the end of the…