- DokumentGame Theoryhochgeladen vonIJCSDF
- DokumentPrivacy in Medical Data Publishinghochgeladen vonIJCSDF
- DokumentRationale and Design of the Access Specification Language RASPhochgeladen vonIJCSDF
- DokumentSecure Model for Virtualization Layer in Cloud Infrastructurehochgeladen vonIJCSDF
- DokumentApplication of New Classes of Mersenne Primes for Fast Modular Reduction for Large-Integer Multiplicationhochgeladen vonIJCSDF
- DokumentProduct Piracy Preventionhochgeladen vonIJCSDF
- DokumentA Detailed Strategy for Managing Corporation Cyber War Securityhochgeladen vonIJCSDF
- DokumentA Survey on Malware Propagation, Analysis, and Detectionhochgeladen vonIJCSDF
- DokumentDigital Forensic Trends and Futurehochgeladen vonIJCSDF
- DokumentThe Mean Failure Cost Cybersecurity Model toward Security Measures and Associated Mechanismshochgeladen vonIJCSDF
- DokumentDomain Information Based Blacklisting Method for the Detection of Malicious Webpageshochgeladen vonIJCSDF
- DokumentOn Enhancing Data Utility in K-Anonymization for Data without Hierarchical Taxonomieshochgeladen vonIJCSDF
- DokumentA Review on Impacts of Cloud Computing on Digital Forensicshochgeladen vonIJCSDF
- DokumentAssessing Database and Network Threats in Traditional and Cloud Computinghochgeladen vonIJCSDF
- DokumentAn Authentication Middleware for Prevention of Information Thefthochgeladen vonIJCSDF
- DokumentThe Improved 32nd-Order Differential Attack on 8 Rounds of Misty2 without FL Functionshochgeladen vonIJCSDF
- DokumentProposal and Its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method:Secret Tap with Double Shifthochgeladen vonIJCSDF
- DokumentAutomated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes)hochgeladen vonIJCSDF
- DokumentA Framework for Good Corporate Governance and Organisational Learning – An Empirical Studyhochgeladen vonIJCSDF
- DokumentInvestigating the Number of Users And Months to Make Tulungan Effective Against Self-Promoting Usershochgeladen vonIJCSDF
- DokumentAn Automated Malware Detection System for Android Using Behavior-Based Analysis AMDAhochgeladen vonIJCSDF
- DokumentAn Analysis of Base Station Location Accuracy within Mobile-Cellular Networkshochgeladen vonIJCSDF
- DokumentA DRM Scheme Using File Physical Informationhochgeladen vonIJCSDF
- DokumentAutomating the Generation of Fake Documents to Detect Network Intrudershochgeladen vonIJCSDF
- DokumentComputer Forensics between the Italian Legislation and Pragmatic Questionshochgeladen vonIJCSDF
- DokumentTowards quantitative measures of Information Securityhochgeladen vonIJCSDF
- DokumentA Privacy-Preserving Approach for Collecting Evidence in Forensic Investigationhochgeladen vonIJCSDF
- DokumentEPSILON2hochgeladen vonIJCSDF
- DokumentA Comparative Study of the Perceptions of End Users in the Eastern, Western, Central, Southern and Northern Regions of Saudi Arabia About Email Spam and Dealing with ithochgeladen vonIJCSDF
- DokumentSecure Network Communication Based on Text-to-Image Encryptionhochgeladen vonIJCSDF
- DokumentSecurity Measurement Based On GQM To Improve Application Security During Requirements Stagehochgeladen vonIJCSDF
- DokumentModelling Based Approach for Reconstructing Evidence of VOIP Malicious Attackshochgeladen vonIJCSDF
- DokumentData Leak, Critical Information Infrastructure and the Legal Optionshochgeladen vonIJCSDF
- DokumentA Survey on Privacy Issues in Digital Forensicshochgeladen vonIJCSDF
- DokumentMitigating Man-In-The-Browser Attacks with Hardware-based Authentication Schemehochgeladen vonIJCSDF
- DokumentTrusted Document Signing Based on Use of Biometric (Face) Keyshochgeladen vonIJCSDF
- DokumentTechnical Security Metrics Model in Compliance with ISO/IEC 27001 Standardhochgeladen vonIJCSDF
- DokumentThe Problem to Consent to the Collection, Use, and Disclosure of Personal Information in Cyberspacehochgeladen vonIJCSDF
- DokumentRuntime Monitoring Technique to handle Tautology based SQL Injection Attackshochgeladen vonIJCSDF
- DokumentEnhancing Advanced Encryption Standard S-Box Generation Based on Round Keyhochgeladen vonIJCSDF
- DokumentTrust Measurements Yeld Distributed Decision Support in Cloud Computinghochgeladen vonIJCSDF
- DokumentAmalgamation of Cyclic Bit Operation in SD-EI Image Encryption Methodhochgeladen vonIJCSDF
- DokumentEfficient Foreground Extraction Based on Optical Flow and SMED for Road Traffic Analysishochgeladen vonIJCSDF
- DokumentThe Right to Consent and Control Personal Information Processing in Cyberspacehochgeladen vonIJCSDF
- DokumentSophistication Techniques of Fourth Generations in Neoteric Mobile LTE and LTE-Advancedhochgeladen vonIJCSDF
- DokumentCertificate Revocation Management in VANEThochgeladen vonIJCSDF
- DokumentGenetic Algorithm Approach for Risk Reduction of Information Securityhochgeladen vonIJCSDF
- DokumentA New ShiftColumn Transformationhochgeladen vonIJCSDF
- DokumentFinite Field Arithmetic Architecture Based on Cellular Arrayhochgeladen vonIJCSDF