- DocumentGame Theoryuploaded by
IJCSDF
- DocumentPrivacy in Medical Data Publishinguploaded by
IJCSDF
- DocumentProduct Piracy Preventionuploaded by
IJCSDF
- DocumentRationale and Design of the Access Specification Language RASPuploaded by
IJCSDF
- DocumentSecure Model for Virtualization Layer in Cloud Infrastructureuploaded by
IJCSDF
- DocumentApplication of New Classes of Mersenne Primes for Fast Modular Reduction for Large-Integer Multiplicationuploaded by
IJCSDF
- DocumentA Detailed Strategy for Managing Corporation Cyber War Securityuploaded by
IJCSDF
- DocumentA Survey on Malware Propagation, Analysis, and Detectionuploaded by
IJCSDF
- DocumentDomain Information Based Blacklisting Method for the Detection of Malicious Webpagesuploaded by
IJCSDF
- DocumentOn Enhancing Data Utility in K-Anonymization for Data without Hierarchical Taxonomiesuploaded by
IJCSDF
- DocumentDigital Forensic Trends and Futureuploaded by
IJCSDF
- DocumentThe Mean Failure Cost Cybersecurity Model toward Security Measures and Associated Mechanismsuploaded by
IJCSDF
- DocumentAssessing Database and Network Threats in Traditional and Cloud Computinguploaded by
IJCSDF
- DocumentA Review on Impacts of Cloud Computing on Digital Forensicsuploaded by
IJCSDF
- DocumentAn Authentication Middleware for Prevention of Information Theftuploaded by
IJCSDF
- DocumentThe Improved 32nd-Order Differential Attack on 8 Rounds of Misty2 without FL Functionsuploaded by
IJCSDF
- DocumentAn Automated Malware Detection System for Android Using Behavior-Based Analysis AMDAuploaded by
IJCSDF
- DocumentAutomated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes)uploaded by
IJCSDF
- DocumentA Framework for Good Corporate Governance and Organisational Learning – An Empirical Studyuploaded by
IJCSDF
- DocumentInvestigating the Number of Users And Months to Make Tulungan Effective Against Self-Promoting Usersuploaded by
IJCSDF
- DocumentAn Analysis of Base Station Location Accuracy within Mobile-Cellular Networksuploaded by
IJCSDF
- DocumentAutomating the Generation of Fake Documents to Detect Network Intrudersuploaded by
IJCSDF
- DocumentA DRM Scheme Using File Physical Informationuploaded by
IJCSDF
- DocumentProposal and Its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method:Secret Tap with Double Shiftuploaded by
IJCSDF
- DocumentA Comparative Study of the Perceptions of End Users in the Eastern, Western, Central, Southern and Northern Regions of Saudi Arabia About Email Spam and Dealing with ituploaded by
IJCSDF
- DocumentTowards quantitative measures of Information Securityuploaded by
IJCSDF
- DocumentComputer Forensics between the Italian Legislation and Pragmatic Questionsuploaded by
IJCSDF
- DocumentA Privacy-Preserving Approach for Collecting Evidence in Forensic Investigationuploaded by
IJCSDF
- DocumentEPSILON2uploaded by
IJCSDF
- DocumentMitigating Man-In-The-Browser Attacks with Hardware-based Authentication Schemeuploaded by
IJCSDF
- DocumentA Survey on Privacy Issues in Digital Forensicsuploaded by
IJCSDF
- DocumentModelling Based Approach for Reconstructing Evidence of VOIP Malicious Attacksuploaded by
IJCSDF
- DocumentData Leak, Critical Information Infrastructure and the Legal Optionsuploaded by
IJCSDF
- DocumentTechnical Security Metrics Model in Compliance with ISO/IEC 27001 Standarduploaded by
IJCSDF
- DocumentThe Problem to Consent to the Collection, Use, and Disclosure of Personal Information in Cyberspaceuploaded by
IJCSDF
- DocumentTrusted Document Signing Based on Use of Biometric (Face) Keysuploaded by
IJCSDF
- DocumentSecurity Measurement Based On GQM To Improve Application Security During Requirements Stageuploaded by
IJCSDF
- DocumentSecure Network Communication Based on Text-to-Image Encryptionuploaded by
IJCSDF
- DocumentTrust Measurements Yeld Distributed Decision Support in Cloud Computinguploaded by
IJCSDF
- DocumentAmalgamation of Cyclic Bit Operation in SD-EI Image Encryption Methoduploaded by
IJCSDF
- DocumentRuntime Monitoring Technique to handle Tautology based SQL Injection Attacksuploaded by
IJCSDF
- DocumentEfficient Foreground Extraction Based on Optical Flow and SMED for Road Traffic Analysisuploaded by
IJCSDF
- DocumentThe Right to Consent and Control Personal Information Processing in Cyberspaceuploaded by
IJCSDF
- DocumentEnhancing Advanced Encryption Standard S-Box Generation Based on Round Keyuploaded by
IJCSDF
- DocumentGenetic Algorithm Approach for Risk Reduction of Information Securityuploaded by
IJCSDF
- DocumentSophistication Techniques of Fourth Generations in Neoteric Mobile LTE and LTE-Advanceduploaded by
IJCSDF
- DocumentA New ShiftColumn Transformationuploaded by
IJCSDF
- DocumentFinite Field Arithmetic Architecture Based on Cellular Arrayuploaded by
IJCSDF
- DocumentA Formal Semantic Model for the Access Specification Language RASPuploaded by
IJCSDF