×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents of aircc-ijnsa
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
6 views
A N A NN A PPROACH FOR N ETWORK I NTRUSION D ETECTION U SING E NTROPY B ASED F EATURE SELECTION
3 views
A NEW DNA BASED APPROACH OF GENERATING KEY-DEPENDENT SHIFT ROWS TRANSFORMATION
4 views
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security
215 views
Personal Safety Triggering System on Android Mobile Platform
214 views
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION AND HYBRID ADAPTIVE NEURAL NETWORKS WITH MODIFIED ANT COLONY OPTIMIZATION
218 views
A Machine Learning Approach To
216 views
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
218 views
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
215 views
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
216 views
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
222 views
AN INTERACTIVE VISUALIZATION TOOL FOR ANIMATING BEHAVIOR OF CRYPTOGRAPHIC PROTOCOLS
223 views
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNAMICS TIMERS
219 views
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERROR CONCEALMENT
221 views
Image Encryption Based On Diffusion And Multiple Chaotic Maps
238 views
Integrating Identity-Based Cryptography in IMS Service Authentication
227 views
E-Voting Protocol Based On Public-Key Cryptography
229 views
Tools and Techniques for Network Forensics
222 views
Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security
513 views
LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs
224 views
Next >