Article Title |
View |
Download |
Toward a New Cloud-Based Approach to preserve the Privacy for Detecting Suspicious Cases of Money Laundering |
View |
Download |
State-of-The-Art in Block based Copy Move Forgery Detection |
View |
Download |
Conception of Ontology for Security in Health Care Systems |
View |
Download |
User Online Information Security Practices: The South African Context |
View |
Download |
Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications |
View |
Download |
Securing Image Data's Using Cellular Automata Techniques |
View |
Download |
Sanskrit Character Recognition with Improved feed forward BPNN and LSB Matching Patterns |
View |
Download |
Identification of Suspicious Region in Secured Stegno-Mammograms with Two Dimensional Wavelets and Genetic Operators |
View |
Download |
Internet Worm Detection based on Traffic Behavior Monitoring with Improved C4.5 |
View |
Download |
Detection of Replica Node Attack Based on Hybrid Artificial Immune System Technique |
View |
Download |
Secure Data Transmission through Trusted Node in Mantes using AODV Routing Algorithm: SATEM |
View |
Download |