| Article Title |
View |
Download |
| Toward a New Cloud-Based Approach to preserve the Privacy for Detecting Suspicious Cases of Money Laundering |
View |
Download |
| State-of-The-Art in Block based Copy Move Forgery Detection |
View |
Download |
| Conception of Ontology for Security in Health Care Systems |
View |
Download |
| User Online Information Security Practices: The South African Context |
View |
Download |
| Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications |
View |
Download |
| Securing Image Data's Using Cellular Automata Techniques |
View |
Download |
| Sanskrit Character Recognition with Improved feed forward BPNN and LSB Matching Patterns |
View |
Download |
| Identification of Suspicious Region in Secured Stegno-Mammograms with Two Dimensional Wavelets and Genetic Operators |
View |
Download |
| Internet Worm Detection based on Traffic Behavior Monitoring with Improved C4.5 |
View |
Download |
| Detection of Replica Node Attack Based on Hybrid Artificial Immune System Technique |
View |
Download |
| Secure Data Transmission through Trusted Node in Mantes using AODV Routing Algorithm: SATEM |
View |
Download |