- DocumentoPrivacy in Medical Data Publishingenviado porIJCSDF
- DocumentoGame Theoryenviado porIJCSDF
- DocumentoA Detailed Strategy for Managing Corporation Cyber War Securityenviado porIJCSDF
- DocumentoA Survey on Malware Propagation, Analysis, and Detectionenviado porIJCSDF
- DocumentoProduct Piracy Preventionenviado porIJCSDF
- DocumentoSecure Model for Virtualization Layer in Cloud Infrastructureenviado porIJCSDF
- DocumentoRationale and Design of the Access Specification Language RASPenviado porIJCSDF
- DocumentoApplication of New Classes of Mersenne Primes for Fast Modular Reduction for Large-Integer Multiplicationenviado porIJCSDF
- DocumentoThe Improved 32nd-Order Differential Attack on 8 Rounds of Misty2 without FL Functionsenviado porIJCSDF
- DocumentoDomain Information Based Blacklisting Method for the Detection of Malicious Webpagesenviado porIJCSDF
- DocumentoOn Enhancing Data Utility in K-Anonymization for Data without Hierarchical Taxonomiesenviado porIJCSDF
- DocumentoAssessing Database and Network Threats in Traditional and Cloud Computingenviado porIJCSDF
- DocumentoA Review on Impacts of Cloud Computing on Digital Forensicsenviado porIJCSDF
- DocumentoDigital Forensic Trends and Futureenviado porIJCSDF
- DocumentoThe Mean Failure Cost Cybersecurity Model toward Security Measures and Associated Mechanismsenviado porIJCSDF
- DocumentoAn Authentication Middleware for Prevention of Information Theftenviado porIJCSDF
- DocumentoProposal and Its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method:Secret Tap with Double Shiftenviado porIJCSDF
- DocumentoAn Analysis of Base Station Location Accuracy within Mobile-Cellular Networksenviado porIJCSDF
- DocumentoAutomating the Generation of Fake Documents to Detect Network Intrudersenviado porIJCSDF
- DocumentoA DRM Scheme Using File Physical Informationenviado porIJCSDF
- DocumentoAn Automated Malware Detection System for Android Using Behavior-Based Analysis AMDAenviado porIJCSDF
- DocumentoAutomated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes)enviado porIJCSDF
- DocumentoA Framework for Good Corporate Governance and Organisational Learning – An Empirical Studyenviado porIJCSDF
- DocumentoInvestigating the Number of Users And Months to Make Tulungan Effective Against Self-Promoting Usersenviado porIJCSDF
- DocumentoA Comparative Study of the Perceptions of End Users in the Eastern, Western, Central, Southern and Northern Regions of Saudi Arabia About Email Spam and Dealing with itenviado porIJCSDF
- DocumentoTowards quantitative measures of Information Securityenviado porIJCSDF
- DocumentoComputer Forensics between the Italian Legislation and Pragmatic Questionsenviado porIJCSDF
- DocumentoA Privacy-Preserving Approach for Collecting Evidence in Forensic Investigationenviado porIJCSDF
- DocumentoEPSILON2enviado porIJCSDF
- DocumentoSecurity Measurement Based On GQM To Improve Application Security During Requirements Stageenviado porIJCSDF
- DocumentoSecure Network Communication Based on Text-to-Image Encryptionenviado porIJCSDF
- DocumentoTechnical Security Metrics Model in Compliance with ISO/IEC 27001 Standardenviado porIJCSDF
- DocumentoThe Problem to Consent to the Collection, Use, and Disclosure of Personal Information in Cyberspaceenviado porIJCSDF
- DocumentoTrusted Document Signing Based on Use of Biometric (Face) Keysenviado porIJCSDF
- DocumentoMitigating Man-In-The-Browser Attacks with Hardware-based Authentication Schemeenviado porIJCSDF
- DocumentoA Survey on Privacy Issues in Digital Forensicsenviado porIJCSDF
- DocumentoModelling Based Approach for Reconstructing Evidence of VOIP Malicious Attacksenviado porIJCSDF
- DocumentoData Leak, Critical Information Infrastructure and the Legal Optionsenviado porIJCSDF
- DocumentoEnhancing Advanced Encryption Standard S-Box Generation Based on Round Keyenviado porIJCSDF
- DocumentoTrust Measurements Yeld Distributed Decision Support in Cloud Computingenviado porIJCSDF
- DocumentoAmalgamation of Cyclic Bit Operation in SD-EI Image Encryption Methodenviado porIJCSDF
- DocumentoEfficient Foreground Extraction Based on Optical Flow and SMED for Road Traffic Analysisenviado porIJCSDF
- DocumentoRuntime Monitoring Technique to handle Tautology based SQL Injection Attacksenviado porIJCSDF
- DocumentoThe Right to Consent and Control Personal Information Processing in Cyberspaceenviado porIJCSDF
- DocumentoCertificate Revocation Management in VANETenviado porIJCSDF
- DocumentoGenetic Algorithm Approach for Risk Reduction of Information Securityenviado porIJCSDF
- DocumentoA New ShiftColumn Transformationenviado porIJCSDF
- DocumentoSophistication Techniques of Fourth Generations in Neoteric Mobile LTE and LTE-Advancedenviado porIJCSDF
- DocumentoFinite Field Arithmetic Architecture Based on Cellular Arrayenviado porIJCSDF