Cs-Cr
Privacy Shielding against Mass Surveillance
Using Neural Network to Propose Solutions to Threats in Attack Patterns
A Review Study of NIST Statistical Test Suite: Development of an indigenous Computer Package
Towards Steganography Detection Through Network Traffic Visualisation
Self Authentication of image through Daubechies Transform technique (SADT)
Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses
A Utility-Theoretic Approach to Privacy in Online Services
Hasq Hash Chains
Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design
Reaction to New Security Threat Class
Authentication Mechanism for Resistance to Password Stealing and Reuse Attack
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities
A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies
Design and Implementation of Hierarchical Visual cryptography with Expansion less Shares
Proactive Web Server Protocol for Complaint Assessment
Secure and Image Retrieval based on Multipurpose Watermarking for Mammography Images Database
Analysis of Attacks on Hybrid DWT-DCT Algorithm for Digital Image Watermarking With MATLAB
Security Threats in MANETS : A Review
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics
Two Novel Defenses against Motion-Based Keystroke Inference Attacks
Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms
A Robust Biometric-Based Three-factor Remote User Authentication Scheme