- DocumentoGame Theorycaricato da
IJCSDF
- DocumentoPrivacy in Medical Data Publishingcaricato da
IJCSDF
- DocumentoApplication of New Classes of Mersenne Primes for Fast Modular Reduction for Large-Integer Multiplicationcaricato da
IJCSDF
- DocumentoRationale and Design of the Access Specification Language RASPcaricato da
IJCSDF
- DocumentoSecure Model for Virtualization Layer in Cloud Infrastructurecaricato da
IJCSDF
- DocumentoA Detailed Strategy for Managing Corporation Cyber War Securitycaricato da
IJCSDF
- DocumentoA Survey on Malware Propagation, Analysis, and Detectioncaricato da
IJCSDF
- DocumentoProduct Piracy Preventioncaricato da
IJCSDF
- DocumentoAn Authentication Middleware for Prevention of Information Theftcaricato da
IJCSDF
- DocumentoOn Enhancing Data Utility in K-Anonymization for Data without Hierarchical Taxonomiescaricato da
IJCSDF
- DocumentoDomain Information Based Blacklisting Method for the Detection of Malicious Webpagescaricato da
IJCSDF
- DocumentoThe Mean Failure Cost Cybersecurity Model toward Security Measures and Associated Mechanismscaricato da
IJCSDF
- DocumentoDigital Forensic Trends and Futurecaricato da
IJCSDF
- DocumentoAssessing Database and Network Threats in Traditional and Cloud Computingcaricato da
IJCSDF
- DocumentoA Review on Impacts of Cloud Computing on Digital Forensicscaricato da
IJCSDF
- DocumentoThe Improved 32nd-Order Differential Attack on 8 Rounds of Misty2 without FL Functionscaricato da
IJCSDF
- DocumentoProposal and Its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method:Secret Tap with Double Shiftcaricato da
IJCSDF
- DocumentoInvestigating the Number of Users And Months to Make Tulungan Effective Against Self-Promoting Userscaricato da
IJCSDF
- DocumentoAutomated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes)caricato da
IJCSDF
- DocumentoA Framework for Good Corporate Governance and Organisational Learning – An Empirical Studycaricato da
IJCSDF
- DocumentoAn Analysis of Base Station Location Accuracy within Mobile-Cellular Networkscaricato da
IJCSDF
- DocumentoA DRM Scheme Using File Physical Informationcaricato da
IJCSDF
- DocumentoAutomating the Generation of Fake Documents to Detect Network Intruderscaricato da
IJCSDF
- DocumentoAn Automated Malware Detection System for Android Using Behavior-Based Analysis AMDAcaricato da
IJCSDF
- DocumentoEPSILON2caricato da
IJCSDF
- DocumentoComputer Forensics between the Italian Legislation and Pragmatic Questionscaricato da
IJCSDF
- DocumentoTowards quantitative measures of Information Securitycaricato da
IJCSDF
- DocumentoA Privacy-Preserving Approach for Collecting Evidence in Forensic Investigationcaricato da
IJCSDF
- DocumentoA Comparative Study of the Perceptions of End Users in the Eastern, Western, Central, Southern and Northern Regions of Saudi Arabia About Email Spam and Dealing with itcaricato da
IJCSDF
- DocumentoSecure Network Communication Based on Text-to-Image Encryptioncaricato da
IJCSDF
- DocumentoSecurity Measurement Based On GQM To Improve Application Security During Requirements Stagecaricato da
IJCSDF
- DocumentoModelling Based Approach for Reconstructing Evidence of VOIP Malicious Attackscaricato da
IJCSDF
- DocumentoData Leak, Critical Information Infrastructure and the Legal Optionscaricato da
IJCSDF
- DocumentoTrusted Document Signing Based on Use of Biometric (Face) Keyscaricato da
IJCSDF
- DocumentoTechnical Security Metrics Model in Compliance with ISO/IEC 27001 Standardcaricato da
IJCSDF
- DocumentoThe Problem to Consent to the Collection, Use, and Disclosure of Personal Information in Cyberspacecaricato da
IJCSDF
- DocumentoA Survey on Privacy Issues in Digital Forensicscaricato da
IJCSDF
- DocumentoMitigating Man-In-The-Browser Attacks with Hardware-based Authentication Schemecaricato da
IJCSDF
- DocumentoEnhancing Advanced Encryption Standard S-Box Generation Based on Round Keycaricato da
IJCSDF
- DocumentoThe Right to Consent and Control Personal Information Processing in Cyberspacecaricato da
IJCSDF
- DocumentoTrust Measurements Yeld Distributed Decision Support in Cloud Computingcaricato da
IJCSDF
- DocumentoAmalgamation of Cyclic Bit Operation in SD-EI Image Encryption Methodcaricato da
IJCSDF
- DocumentoRuntime Monitoring Technique to handle Tautology based SQL Injection Attackscaricato da
IJCSDF
- DocumentoEfficient Foreground Extraction Based on Optical Flow and SMED for Road Traffic Analysiscaricato da
IJCSDF
- DocumentoCertificate Revocation Management in VANETcaricato da
IJCSDF
- DocumentoFinite Field Arithmetic Architecture Based on Cellular Arraycaricato da
IJCSDF
- DocumentoGenetic Algorithm Approach for Risk Reduction of Information Securitycaricato da
IJCSDF
- DocumentoSophistication Techniques of Fourth Generations in Neoteric Mobile LTE and LTE-Advancedcaricato da
IJCSDF
- DocumentoA New ShiftColumn Transformationcaricato da
IJCSDF