- DocumentoPrivacy in Medical Data Publishingcaricato daIJCSDF
- DocumentoGame Theorycaricato daIJCSDF
- DocumentoA Detailed Strategy for Managing Corporation Cyber War Securitycaricato daIJCSDF
- DocumentoA Survey on Malware Propagation, Analysis, and Detectioncaricato daIJCSDF
- DocumentoApplication of New Classes of Mersenne Primes for Fast Modular Reduction for Large-Integer Multiplicationcaricato daIJCSDF
- DocumentoProduct Piracy Preventioncaricato daIJCSDF
- DocumentoSecure Model for Virtualization Layer in Cloud Infrastructurecaricato daIJCSDF
- DocumentoRationale and Design of the Access Specification Language RASPcaricato daIJCSDF
- DocumentoThe Improved 32nd-Order Differential Attack on 8 Rounds of Misty2 without FL Functionscaricato daIJCSDF
- DocumentoAn Authentication Middleware for Prevention of Information Theftcaricato daIJCSDF
- DocumentoA Review on Impacts of Cloud Computing on Digital Forensicscaricato daIJCSDF
- DocumentoAssessing Database and Network Threats in Traditional and Cloud Computingcaricato daIJCSDF
- DocumentoOn Enhancing Data Utility in K-Anonymization for Data without Hierarchical Taxonomiescaricato daIJCSDF
- DocumentoDomain Information Based Blacklisting Method for the Detection of Malicious Webpagescaricato daIJCSDF
- DocumentoDigital Forensic Trends and Futurecaricato daIJCSDF
- DocumentoThe Mean Failure Cost Cybersecurity Model toward Security Measures and Associated Mechanismscaricato daIJCSDF
- DocumentoAutomating the Generation of Fake Documents to Detect Network Intruderscaricato daIJCSDF
- DocumentoA DRM Scheme Using File Physical Informationcaricato daIJCSDF
- DocumentoAn Analysis of Base Station Location Accuracy within Mobile-Cellular Networkscaricato daIJCSDF
- DocumentoInvestigating the Number of Users And Months to Make Tulungan Effective Against Self-Promoting Userscaricato daIJCSDF
- DocumentoAn Automated Malware Detection System for Android Using Behavior-Based Analysis AMDAcaricato daIJCSDF
- DocumentoProposal and Its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method:Secret Tap with Double Shiftcaricato daIJCSDF
- DocumentoA Framework for Good Corporate Governance and Organisational Learning – An Empirical Studycaricato daIJCSDF
- DocumentoAutomated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes)caricato daIJCSDF
- DocumentoEPSILON2caricato daIJCSDF
- DocumentoA Comparative Study of the Perceptions of End Users in the Eastern, Western, Central, Southern and Northern Regions of Saudi Arabia About Email Spam and Dealing with itcaricato daIJCSDF
- DocumentoA Privacy-Preserving Approach for Collecting Evidence in Forensic Investigationcaricato daIJCSDF
- DocumentoTowards quantitative measures of Information Securitycaricato daIJCSDF
- DocumentoComputer Forensics between the Italian Legislation and Pragmatic Questionscaricato daIJCSDF
- DocumentoTrusted Document Signing Based on Use of Biometric (Face) Keyscaricato daIJCSDF
- DocumentoTechnical Security Metrics Model in Compliance with ISO/IEC 27001 Standardcaricato daIJCSDF
- DocumentoThe Problem to Consent to the Collection, Use, and Disclosure of Personal Information in Cyberspacecaricato daIJCSDF
- DocumentoMitigating Man-In-The-Browser Attacks with Hardware-based Authentication Schemecaricato daIJCSDF
- DocumentoA Survey on Privacy Issues in Digital Forensicscaricato daIJCSDF
- DocumentoData Leak, Critical Information Infrastructure and the Legal Optionscaricato daIJCSDF
- DocumentoSecurity Measurement Based On GQM To Improve Application Security During Requirements Stagecaricato daIJCSDF
- DocumentoSecure Network Communication Based on Text-to-Image Encryptioncaricato daIJCSDF
- DocumentoModelling Based Approach for Reconstructing Evidence of VOIP Malicious Attackscaricato daIJCSDF
- DocumentoThe Right to Consent and Control Personal Information Processing in Cyberspacecaricato daIJCSDF
- DocumentoEfficient Foreground Extraction Based on Optical Flow and SMED for Road Traffic Analysiscaricato daIJCSDF
- DocumentoEnhancing Advanced Encryption Standard S-Box Generation Based on Round Keycaricato daIJCSDF
- DocumentoTrust Measurements Yeld Distributed Decision Support in Cloud Computingcaricato daIJCSDF
- DocumentoAmalgamation of Cyclic Bit Operation in SD-EI Image Encryption Methodcaricato daIJCSDF
- DocumentoRuntime Monitoring Technique to handle Tautology based SQL Injection Attackscaricato daIJCSDF
- DocumentoFinite Field Arithmetic Architecture Based on Cellular Arraycaricato daIJCSDF
- DocumentoA New ShiftColumn Transformationcaricato daIJCSDF
- DocumentoCertificate Revocation Management in VANETcaricato daIJCSDF
- DocumentoGenetic Algorithm Approach for Risk Reduction of Information Securitycaricato daIJCSDF
- DocumentoSophistication Techniques of Fourth Generations in Neoteric Mobile LTE and LTE-Advancedcaricato daIJCSDF