Printer Friendly

Browse Data security topic

Methods subtopic

Articles

1-300 out of 600 article(s) nextnext page
Title Author Type Date Words
FaceApp face gender-swapping activity you can't resist. Jun 19, 2020 559
TECHNOLOGY AND BUSINESS CONTINUITY: Organizations must be prepared to leverage technology to enable recovery from the unexpected and unavoidable. Jiles, Loreal; Nathan, Barry Jun 1, 2020 1244
5 Ways to Protect your Data when Working from Home. May 19, 2020 785
COVID-19: How to secure your home network for remote working. Huda Tabrez, Senior News Editor May 18, 2020 1484
A Hybrid Trust-Modeling Approach for IoT Security. Bahtiyar, Serif Report May 2, 2020 7072
Surviving a Pandemic in an Era of Cybercrime. Wertheim, Steven May 1, 2020 1218
How To Stay Safe Online. Gopal, Deepa; K., Christina Apr 7, 2020 653
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing. Su, Xin; Gong, Qingbo; Zheng, Yi; Liu, Xuchong; Li, Kuan-Ching Mar 31, 2020 7517
Tips for Fighting Off Cybercrime in 2020. Wertheim, Steven Column Mar 1, 2020 944
BLOCKCHAIN: POST-QUANTUM SECURITY & LEGAL ECONOMICS. Haney, Brian Seamus Mar 1, 2020 15234
Data Privacy and the Financial Services Industry: A Federal Approach to Consumer Protection. Soubouti, Fara Mar 1, 2020 11129
Turn to e-Services for secure access to taxpayer information, key tools. Schreiber, Gerard H., Jr.; Young, Marilyn Jan 1, 2020 1394
CREATING CYBERSECURITY AWARENESS. Brands, Kristine Jan 1, 2020 1053
Five ways to strengthen employee cybersecurity awareness. Nov 17, 2019 632
Criminals thrive on data abundance - here's how we'll catch them. Duguin, Stephane Nov 3, 2019 1151
How to Create an Incident Response Plan. Wertheim, Steven Nov 1, 2019 1100
Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs. Pan, Jiaye; Zhuang, Yi; Sun, Binglin Nov 1, 2019 14802
How to protect companies from 3rd party data breaches. Sep 1, 2019 817
Housekeeping tips to mitigate data security risk. Yoo, Jamie Sep 1, 2019 1230
Don't let your guard down when gaming. Aug 7, 2019 558
What solution does DEVCON offer to help efficiently protect against harmful cyber attacks? Louie, Maggie Aug 1, 2019 339
How to Know Where Critical Data Reside. Wertheim, Steven Column Jul 1, 2019 837
A quick look at how you can keep your phone safe from attackers looking to steal your data. Jun 20, 2019 1020
Accounting firm data breaches: One state's records; Find out the most common types of breaches and how to guard against them all. Cheng, Christine; Flasher, Renee; Higgins, James P. Jun 1, 2019 3050
Challenging Outdated Technology. Cherry, Michael; Imwinkelried, Edward J.; Riley, Elven; Epstein, Jules; Switzer, Mark; King, Jack Jun 1, 2019 760
A Critical Approach to Digital Citizenship. Roquet, Mark May 1, 2019 1405
Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices. Liu, Weiwei; Liu, Guangjie; Ji, Xiaopeng; Zhai, Jiangtao; Dai, Yuewei Report Apr 1, 2019 7906
A Cooperative Jamming Based Joint Transceiver Design for Secure Communications in MIMO Interference Channels. Huang, Boyang; Kong, Zhengmin; Fang, Yanjun; Jin, Xin Report Apr 1, 2019 6567
The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle. Zeng, Qian; Zhang, Zhongshan Report Apr 1, 2019 5748
DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network. Chen, Tieming; Mao, Qingyu; Lv, Mingqi; Li, Yinglong Report Apr 1, 2019 6740
The Security DV-Hop Algorithm against Multiple-Wormhole-Node-Link in WSN. Li, Jianpo; Wang, Dong Report Apr 1, 2019 9246
PROTECT YOURSELF FROM ONLINE IDENTITY THEFT. Apr 1, 2019 499
How to Stay Safe on Public WiFi. Apr 1, 2019 426
How To Protect Your Social Security Number From Data Breaches. Mar 25, 2019 974
Future tense. Vieth, Peter Mar 25, 2019 1044
Identity Theft: Protect Your /Medicare account. Mar 22, 2019 354
Costly Crisis Management. Helms, Karla Jo Mar 1, 2019 679
A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model. Lu, Yang; Li, Jiguo Report Mar 1, 2019 10509
Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service. Chen, Liqing; Li, Jiguo; Zhang, Yichen Report Mar 1, 2019 11957
Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates. Braeken, A. Report Mar 1, 2019 9107
A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service. Kim, Heeyoul Report Mar 1, 2019 6049
Advanced insider threat detection model to apply periodic work atmosphere. Oh, Junhyoung; Kim, Tae Ho; Lee, Kyung Ho Report Mar 1, 2019 5510
A Secured and Energy Efficient Wireless Sensor Networks (WSN) Utilizing CRT-Based Forwarding Technique. Raji, Kamaldeen Ayodele; Gbolagade, Kazeem Alagbe Report Mar 1, 2019 5676
Kaspersky Lab: Sing Your Way to Security: Unique, Memorable Passwords Stronger Than Constant Change. Feb 5, 2019 769
A Relay-assisted Secure Handover Mechanism for High-speed Trains. Zhao, Yue; Tian, Bo; Chen, Zhouguo; Yang, Jin; Li, Saifei Report Feb 1, 2019 6364
Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor. Ali, Zahid; Park, Unsang Report Feb 1, 2019 9289
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography. Qiu, Shuming; Xu, Guosheng; Ahmad, Haseeb; Xu, Guoai; Qiu, Xinping; Xu, Hong Report Feb 1, 2019 11720
Lattice-based Threshold Ring Signature with Message Block Sharing. Chen, Jiangshan; Hu, Yupu; Gao, Wen; Liang, Hongmei Report Feb 1, 2019 8129
Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy. Shiu, Chih-Wei; Chen, Yu-Chi; Hong, Wien Report Feb 1, 2019 7028
Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing. Zha, Jiningo; Xu, Chunxiang; Chen, Kefei Report Feb 1, 2019 11288
Image Encryption with The Cross Diffusion of Two Chaotic Maps. Jiao, Ge; Peng, Xiaojiang; Duan, Kaiwen Report Feb 1, 2019 5512
Robust Image Watermarking via Perceptual Structural Regularity-based JND Model. Wang, Chunxing; Xu, Meiling; Wan, Wenbo; Wang, Jian; Meng, Lili; Li, Jing; Sun, Jiande Report Feb 1, 2019 7842
Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code. Han, Mu; Wang, Yunwen; Ma, Shidian; Wan, Ailan; Liu, Shuai Report Feb 1, 2019 8884
Optimization-based Image Watermarking Algorithm Using a Maximum-Likelihood Decoding Scheme in the Complex Wavelet Domain. Liu, Jinhua; Rao, Yunbo Report Jan 1, 2019 7336
Improvement of Mitigation Techniques against SYN Flood Attack for Free and Open Source Firewalls. Kapis, Kosmas; Nico Kyando, Davis Jan 1, 2019 7359
A Behaviour Profiling Based Technique for Network Access Control Systems. Muhammad, Musa Abubakar; Ayesh, Aladdin Jan 1, 2019 5090
CoMP Transmission for Safeguarding Dense Heterogeneous Networks with Imperfect CSI. Yunjia, Xu; Kaizhi, Huang; Xin, Hu; Yi, Zou; Yajun, Chen; Wenyu, Jiang Report Jan 1, 2019 8414
Agent Based Information Security Framework for Hybrid Cloud Computing. Tariq, Muhammad Imran Report Jan 1, 2019 10931
A FACE RECOGNITION AND GRAPHICAL PASSWORD BASED HYBRID TECHNIQUE OF INFORMATION SECURITY. Dec 31, 2018 3106
Experts warn of cyber attacks on smart cities and buildings. Dec 19, 2018 393
Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing. Lin, Te-Yuan; Fuh, Chiou-Shann Report Dec 1, 2018 5176
Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs. Zhou, Weiwei; Yu, Bin Report Dec 1, 2018 9607
Private Blockchain-Based Secure Access Control for Smart Home Systems. Xue, Jingting; Xu, Chunxiang; Zhang, Yuan Report Dec 1, 2018 9431
CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks. Yang, Chao; Guo, Yunfei; Hu, Hongchao; Liu, Wenyan Report Dec 1, 2018 10733
A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking. Zhu, Yi; Kang, Haohao; Huang, Ruhui Report Dec 1, 2018 6668
Medical Image Watermarking Based on Visual Secret Sharing and Cellular Automata Transform for Copyright Protection. Fan, Tzuo-Yau; Chao, Her-Chang; Chieu, Bin-Chang Report Dec 1, 2018 9725
Security based Partner Selection in Inter-Organizational Workflow Systems. Kandoussi, Asmaa El; Elbakkali, Hanan Report Dec 1, 2018 6704
State of the Art Intrusion Detection System for Cloud Computing. Ahmad, Azuan; Zainudin, Wan Shafiuddin; Kama, Mohd Nazri; Idris, Norbik Bashah; Saudi, Madihah Mohd; Report Dec 1, 2018 11606
Modified Multi-Level Steganography to Enhance Data Security. Elshare, Shadi; El-Emam, Nameer N. Report Dec 1, 2018 10417
Mobility of Internet of Things and Fog Computing: Concerns and Future Directions. Ahanger, Tariq Ahamed; Tariq, Usman; Nusir, Muneer Report Dec 1, 2018 3830
Energy Efficient Secured Cluster based Distributed Fault Diagnosis Protocol for IoT. Ara, Tabassum; Prabhkar, M.; Shah, Pritam Gajkumar Report Dec 1, 2018 5498
Node Activities Learning (NAL)Approach to Build Secure and Privacy-Preserving Routing in Wireless Sensor Networks. Rao, K. Ramesh; Rao, S.N. Tirumala; Reddy, P. Chenna Report Dec 1, 2018 4745
Seven-Step Cybersecurity Checklist. Nov 28, 2018 658
Intrusion Detection System Modeling Based on Learning from Network Traffic Data. Midzic, Admir; Avdagic, Zikrija; Omanovic, Samir Report Nov 1, 2018 8286
A Multi-level Perception Security Model Using Virtualization. Lou, Rui; Jiang, Liehui; Chang, Rui; Wang, Yisen Report Nov 1, 2018 9814
Pharming Out Data: A Proposal for Promoting Innovation and Public Health through a Hybrid Clinical Data Protection Scheme. Gulotta, Lea M. Nov 1, 2018 18405
Why cyberdefenses are worth the cost: These tips can help not-for-profits and other organizations minimize the risk of potentially devastating data breaches. Shelhart, Mark Nov 1, 2018 2101
An Improved Image Scrambling Algorithm Using {[2.sup.n] -1, [2.sup.n], [2.sup.n] +1}. Oyinloye, Damilare Peter; Gbolagade, Kazeem Alagbe Report Oct 1, 2018 3112
Development of Iris Biometric Template Security Using Steganography. Kayode, Saheed Y.; Olaniyi, Abdulsalam S.; Olaolu, Arowolo M.; Babatunde, Akinbowale N. Report Oct 1, 2018 1939
Considerations Before Converting From an RDBMS to Cloud-Native Services. Pane, Simon Oct 1, 2018 1245
Advanced approach to information security management system utilizing maturity models in critical infrastructure. You, Youngin; Oh, Junhyoung; Kim, Sooheon; Lee, Kyungho Report Oct 1, 2018 8834
Feature Selection Algorithms in Intrusion Detection System: A Survey. Maza, Sofiane; Touahria, Mohamed Report Oct 1, 2018 9685
Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption. Hu, Shengzhou; Li, Jiguo; Zhang, Yichen Report Oct 1, 2018 9193
Using weighted Support Vector Machine to address the imbalanced classes problem of Intrusion Detection System. Alabdallah, Alaeddin; Awad, Mohammed Report Oct 1, 2018 6808
Enhanced Network Intrusion Detection using Deep Convolutional Neural Networks. Naseer, Sheraz; Saleem, Yasir Report Oct 1, 2018 7928
Strengthening Patron Engagement While Protecting Privacy. Breeding, Marshall Oct 1, 2018 1565
Practical IT security: Implementing a customer-centric approach to preventing and addressing network vulnerabilities. Nicefaro, Melissa Oct 1, 2018 583
WhiteHat Security: Using AI to Enable Better SEO Results. Cramer, Theresa Case study Sep 22, 2018 1167
Industrial Cyber Threats Assessed. Sep 10, 2018 1022
FTC: FIVE KEY PRINCIPLES TO A SOUND DATA SECURITY PROGRAM. Sep 1, 2018 104
Survey and Analysis of Regional Characteristics of Unmanaged Stray IoT devices. Nakazawa, Yuki; Sasaki, Ryoichi; Inomata, Atsuo Report Sep 1, 2018 4058
Cloud Computing Service Level Agreement Issues and Challenges: A Bibliographic Review. Khan, Sohail Razi; Gouveia, Luis Borges Report Sep 1, 2018 10230
Application of RC4 Cryptography Method to Support XML Security on Digital Chain of Custody Data Storage. Widatama, Krisna; Prayudi, Yudi; Sugiantoro, Bambang Report Sep 1, 2018 3271
Data Mining Classification Approaches for Malicious Executable File Detection. Najadat, Hassan; Alhawari, Assem; Al_Rushdan, Huthifh Report Sep 1, 2018 2547
Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks. Nyangaresi, Vincent Omollo; Abeka, Silvance O.; Rodgrigues, Anthony Report Sep 1, 2018 8017
Encryption and Tokenization-Based System for Credit Card Information Security. Iwasokun, Gabriel Babatunde; Omomule, Taiwo Gabriel; Akinyede, Raphael Olufemi Report Sep 1, 2018 5239
Identity-Based Encryption Technique with Ranking for Multi-Keywords Search in Cloud (IDERMKS). Turkson, Regina Esi; Liao, Yongjian; Baagyere, Edward Yeallakuor Report Sep 1, 2018 9146
Cancelable Fingerprint Features Using Chaff Points Encapsulation. Al-Tarawneh, Mokhled S. Report Sep 1, 2018 2936
Efficient Trajectory Data Privacy Protection Scheme Based on Laplace's Differential Privacy. Gut, Ke; Yang, Lihao; Liu, Yongzhi; Yin, Bo Report Sep 1, 2018 6803
Cybersecurity Q&A. Finn, David Sep 1, 2018 1514
Energy Efficiency Enhancement of TICK --based Fuzzy Logic for Selecting Forwarding Nodes in WSNs. Ashraf, Muhammad; Ho, Cho Tae Technical report Sep 1, 2018 8406
Disparity-based Error Concealment for Stereoscopic Images with Superpixel Segmentation. Zhang, Yizhang; Tang, Guijin; Liu, Xiaohua; Sun, Changming Technical report Sep 1, 2018 5207
Novel Robust High Dynamic Range Image Watermarking Algorithm Against Tone Mapping. Bai, Yongqiang; Jiang, Gangyi; Jiang, Hao; Yu, Mei; Chen, Fen; Zhu, Zhongjie Technical report Sep 1, 2018 10086
Copy-move Forgery Detection Robust to Various Transformation and Degradation Attacks. Deng, Jiehang; Yang, Jixiang; Weng, Shaowei; Gu, Guosheng; Li, Zheng Technical report Sep 1, 2018 7611
The fast image encryption algorithm based on substitution and diffusion. Zhang, Yong; Jia, Xiaoyang Technical report Sep 1, 2018 10251
HoneyThing: A New Honeypot Design for CPE Devices. Erdem, Omer; Pektas, Abdurrahman; Kara, Mehmet Technical report Sep 1, 2018 5912
Improved Conditional Differential Attacks on Round-Reduced Grain v1. Li, Jun-Zhi; Guan, Jie Technical report Sep 1, 2018 5739
Enhanced Knock Code Authentication with High Security and Improved Convenience. Jang, Yun-Hwan; Park, Yongsu Technical report Sep 1, 2018 6395
A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage. Zhao, Jining; Xu, Chunxiang; Chen, Kefei Technical report Sep 1, 2018 11089
Updated SSDP Scheme for DDoS Attack Defense. Huang, Haiou; Hu, Liang; Chu, Jianfeng Technical report Sep 1, 2018 5605
Adaptive LSB Steganography Based on Chaos Theory and Random Distortion. Tutuncu, Kemal; Demirci, Baris Technical report Aug 1, 2018 7682
Defending Non-control-data Attacks using Influence Domain Monitoring. Zhang, Guimin; Li, Qingbao; Chen, Zhifeng; Zhang, Ping Technical report Aug 1, 2018 10311
Constructive Steganography by Tangles. Qian, Zhenxing; Pan, Lin; Huang, Nannan; Zhang, Xinpeng Technical report Aug 1, 2018 4842
A Moving Window Principal Components Analysis Based Anomaly Detection and Mitigation Approach in SDN Network. Wang, Mingxin; Zhou, Huachun; Chen, Jia Technical report Aug 1, 2018 8156
Developing an Intrusion Detection Framework for High-Speed Big Data Networks: A Comprehensive Approach. Siddique, Kamran; Akhtar, Zahid; Khan, Muhammad Ashfaq; Jung, Yong-Hwan; Kim, Yangwoo Technical report Aug 1, 2018 7250
Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System. Wahyudi, Bisyron; Ramli, Kalamullah; Murfi, Hendri Report Aug 1, 2018 7562
Functional Safety Engineers Responsible for Plant Security Need Help to Understand Cyber Security Regulations. Method Cyber Security Provides Specific Training.. Jul 31, 2018 242
QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing. Liu, Guoxiu; Yang, Geng; Wang, Haiwei; Dai, Hua; Zhou, Qiang Report Jul 1, 2018 7171
Robust Digital Watermarking for High-definition Video using Steerable Pyramid Transform, Two Dimensional Fast Fourier Transform and Ensemble Position-based Error Correcting. Jin, Xun; Kim, JongWeon Report Jul 1, 2018 5119
Storage Feature-Based Watermarking Algorithm with Coordinate Values Preservation for Vector Line Data. Zhou, Qifei; Ren, Na; Zhu, Changqing; Tong, Deyu Report Jul 1, 2018 5694
Adaptive Gaussian Mechanism Based on Expected Data Utility under Conditional Filtering Noise. Liu, Hai; Wu, Zhenqiang; Peng, Changgen; Tian, Feng; Lu, Laifeng Report Jul 1, 2018 8183
A Comprehensive Survey of Security Related Challenges in Internet of Things. Ezema, E.; Abdullah, A.; Sani, N.F.M. Report Jul 1, 2018 3613
Personal Encryption 101: A BEGINNER'S GUIDE TO PROTECTING YOUR MESSAGES, MASKING ONLINE MOVEMENTS, AND STEERING CLEAR OF DIGITAL SNOOPS. Brown, Elizabeth Nolan Jul 1, 2018 2578
THE ENEMY WITHIN. Brief article Jul 1, 2018 218
Clone of CAPTCHAs: The Human-Robot Test. Jun 29, 2018 470
How Our Institution Went From Most Hacked to Zero Breaches. Denzer, Juan Jun 1, 2018 2429
REMOTE ACCESS SECURITY: Proxy by Hostname to the Rescue! Bruno, Robert Jun 1, 2018 2182
A Pairing Free Secure Identity-based Aggregate Signature Scheme under Random Oracle. Abouelkheir, Eman; Tromp, Jolanda G. Report Jun 1, 2018 6208
Method of Early Staged Cyber Attacks Detection in IT and Telecommunication Networks. Japertas, Saulius; Baksys, Tautvydas Report Jun 1, 2018 7299
Application of Local Outlier Factor Algorithm to Detect Anomalies in Computer Network. Auskalnis, Juozas; Paulauskas, Nerijus; Baskys, Algirdas Report Jun 1, 2018 2994
THE FINE LINE BETWEEN IDENTIFIERS CAPABLE OF IDENTIFYING AND "IDENTIFIABLE INFORMATION". Popova, Aleksandra Jun 1, 2018 12200
How CFOs Can Mitigate the Risk of Ransomware. Mehlman, Marc May 1, 2018 1407
Get a Handle on Network Security: School districts can boost network security using the micro-segmentation capabilities of VMware NSX. May 1, 2018 538
Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction. Huang, Peng-Cheng; Li, Yung-Hui; Chang, Chin-Chen; Liu, Yanjun Report May 1, 2018 6451
A Robust and Adaptive Trust Management System for Guaranteeing the Availability in the Internet of Things Environments. Wu, Xu Report May 1, 2018 7519
Network Security Situation Assessment Method Based on Markov Game Model. Li, Xi; Lu, Yu; Liu, Sen; Nie, Wei Report May 1, 2018 4654
HACKS CAN WREAK HAVOC, CYBER EXPERTS WARN. Dobrian, Joseph May 1, 2018 2124
ORGANIZATIONS REPLACE ANTIVIRUS W/ BARKLY SOLUTION. May 1, 2018 437
How to insure against cyber attack at work; How can insurance help with the new data protection regulations? Lynne Noble, of Wilby Ltd, offers some advice. Apr 12, 2018 350
How to Address Medical Device Cyber Attacks. Apr 11, 2018 778
How to protect your data in a connected world. Apr 8, 2018 346
What Is the Eye in the Sky Actually Looking at and Who is Controlling It? An International Comparative Analysis on How to Fill the Cybersecurity and Privacy Gaps to Strengthen Existing U.S. Drone Laws. Urban, Jennifer Apr 1, 2018 20837
S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks. Almomani, Iman; Saadeh, Maha Report Apr 1, 2018 7528
Secure and Fine-grained Electricity Consumption Aggregation Scheme for Smart Grid. Shen, Gang; Su, Yixin; Zhang, Danhong; Zhang, Huajun; Xiong, Binyu; Zhang, Mingwu Report Apr 1, 2018 7519
Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services. Sija, Baraka D.; Shim, Kyu-Seok; Kim, Myung-Sup Report Apr 1, 2018 8238
A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks. Chen, Ying; Ge, Yangming; Wang, Wenyuan; Yang, Fengyu Report Apr 1, 2018 9052
A Secure Encryption-Based Malware Detection System. Lin, Zhaowen; Xiao, Fei; Sun, Yi; Ma, Yan; Xing, Cong-Cong; Huang, Jun Report Apr 1, 2018 7347
Compression Method for IPSec over 6LoWPAN. Wang, Huqing; Sun, Zhixin Report Apr 1, 2018 4293
A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability. Lin, Guofeng; You, Lirong; Hu, Bing; Hong, Hanshu; Sun, Zhixin Report Apr 1, 2018 10313
Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies. Thakur, Kutub; Shan, Juan; Pathan, Al-Sakib Khan Report Apr 1, 2018 7654
An Adaptive FLV Steganography Approach Using Simulated Annealing. Bawaneh, Mohammed J.; Obeidat, Atef Ahmed; Al-kofahi, Majd M. Report Apr 1, 2018 6774
Performance Analysis of SAP-NFC Protocol. Al-Fayoumi, Mustafa; Nashwan, Shadi Report Apr 1, 2018 4676
Private and Mobile Inter-Network Routing for Wireless Sensor Networks and Internet of Things. Saberi, Mohsen Report Apr 1, 2018 5932
A Novel and Low Processing Time ECG Security Method Suitable for Sensor Node Platforms. Jusak, Jusak; Mahmoud, Seedahmed S. Report Apr 1, 2018 7335
6 Steps to GDPR Implementation. Bauer, Danielle Apr 1, 2018 737
Protecting Personal Data When Traveling. Apr 1, 2018 382
Cybercriminals Switch to Impersonation Attacks. Apr 1, 2018 300
A research study: Usage of RC4 stream cipher in SSL configurations of web servers used by Sri Lankan Financial Institutes. Weerasinghe, T.D.B; Disanayake, Chamara Case study Apr 1, 2018 3753
Utilization of Statistical Control Charts for DoS Network Intrusion Detection. Sklavounos, Dimitris; Edoh, Aloysius; Paraskevopoulos, George Report Apr 1, 2018 4874
A New Scheme to Secure Communication and Data, based on the Integration of Cryptography and Steganography. Dehkordi, Massoud Hadian; Asgari, Amin; Moradian, Ali Report Apr 1, 2018 2951
A Naive Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack. Olalere, Morufu; Egigogo, Raji Abdullahi; Joseph, A. Ojeniyi; Idris, Ismaila; Jimoh, Rasheed Gbenga Report Apr 1, 2018 4839
The Cloud and the Many Questions We Need to Ask. Mar 22, 2018 1205
Data Governance Danger: Five Warning Signs of Imminent Failure. Mar 22, 2018 1212
Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks. Farooq, Muhammad Umar; Wang, Xingfu; Sajjad, Moizza; Qaisar, Sara Report Mar 1, 2018 6227
OC RELEASES DATA PROTECTION GUIDELINES. Brief article Feb 1, 2018 198
A New Fine-grain SMS Corpus and Its Corresponding Classifier Using Probabilistic Topic Model. Ma, Jialin; Zhang, Yongjun; Wang, Zhijian; Chen, Bolun Report Feb 1, 2018 7556
Structure and Challenges of a Security Policy on Small and Medium Enterprises. Almeida, Fernando; Carvalho, Ines; Cruz, Fabio Report Feb 1, 2018 7294
New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems. Zhu, Huijun; Wang, Licheng; Qiu, Shuming; Niu, Xinxin Report Feb 1, 2018 6930
Auto-configurable Security Mechanism for NFV. Kim, HyunJin; Park, PyungKoo; Ryou, Jaecheol Report Feb 1, 2018 3904
A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments. Ra, Gyeong-Jin; Lee, Im-Yeong Report Feb 1, 2018 5047
System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats. Choi, Seul-Ki; Yang, Chung-Huang; Kwak, Jin Report Feb 1, 2018 3649
Secure Multicast using Proxy Re-Encryption in an IoT Environment. Kim, SuHyun; Hwang, YongWoon; Seo, JungTaek Report Feb 1, 2018 3895
A Reliable Secure Storage Cloud and Data Migration Based on Erasure Code. Mugisha, Emmy; Zhang, Gongxuan Report Jan 1, 2018 7413
Android malicious code Classification using Deep Belief Network. Shiqi, Luo; Shengwei, Tian; Long, Yu; Jiong, Yu; Hua, Sun Report Jan 1, 2018 7432
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network. Li, Wei; Liao, Linfeng; Gu, Dawu; Ge, Chenyu; Gao, Zhiyong; Zhou, Zhihong; Guo, Zheng; Liu, Ya; Liu, Report Jan 1, 2018 9123
Fully Homomorphic Encryption Based On the Parallel Computing. Tan, Delin; Wang, Huajun Report Jan 1, 2018 8591
Cyber Security for Internet Connected HVAC/R Components. Ellwein, Christian; Steinhart, Heinrich Report Jan 1, 2018 3855
Cyber Autoimmune Disease When the Virtual Life Imitates the Real Life. Winter, Rogerio; Ruiz, Rodrigo Report Jan 1, 2018 4077
Empirical Survey on Advances of Network Forensics in the Emerging Networks. Jayakrishnan, A.R.; Vasanthi, V. Report Jan 1, 2018 4963
Improvement the Wireless Network Security by Requiring the News Cryptographic Primitives. Asimi, Younes; Asimi, Ahmed; Tbatou, Zakariae; Guezzaz, Azidine; Sadqi, Yassine Report Jan 1, 2018 3328
Cyber Intelligence & OSINT: Developing Mitigation Techniques Against Cybercrime Threats on Social Media A Systematic Review July 2017. Yeboah-Ofori, Abel; Brimicombe, Allan Report Jan 1, 2018 5585
Host Feasibility Investigation to Improve Robustness in Hybrid DWT+SVD Based Image Watermarking Schemes. Araghi, Tanya Koohpayeh; Manaf, Azizah Abd; Alarood, Ala; Zainol, Azida Binti Report Jan 1, 2018 5874
Image Hashing for Tamper Detection with Multiview Embedding and Perceptual Saliency. Du, Ling; Chen, Zhen; Ke, Yongzhen Report Jan 1, 2018 6405
Digital Image Steganography Using Eight-Directional PVD against RS Analysis and PDH Analysis. Swain, Gandharba Report Jan 1, 2018 5353
An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks. Alouneh, Sahel; Al-Hawari, Feras; Hababeh, Ismail; Ghinea, Gheorghita Jan 1, 2018 5534
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis. Hu, Hao; Liu, Yuling; Zhang, Hongqi; Zhang, Yuchen Jan 1, 2018 8505
An Approach for Internal Network Security Metric Based on Attack Probability. Shan, Chun; Jiang, Benfu; Xue, Jingfeng; Guan, Fang; Xiao, Na Jan 1, 2018 6394
Double Cache Approach with Wireless Technology for Preserving User Privacy. Sen, Adnan A. Abi; Eassa, Fathy B.; Yamin, Mohammad; Jambi, Kamal Jan 1, 2018 7141
A Security Monitoring Method Based on Autonomic Computing for the Cloud Platform. Zhang, Jingjie; Wu, Qingtao; Zheng, Ruijuan; Zhu, Junlong; Zhang, Mingchuan; Liu, Ruoshui Jan 1, 2018 6079
A New Mining and Protection Method Based on Sensitive Data. Zheng, Xiaoyao; Liu, Yuqing; You, Hao; Guo, Liangmin; Zhao, Chuanxin Report Jan 1, 2018 4542
A New Cooperative Anomaly Detection Method for Stacker Running Track of Automated Storage and Retrieval System in Industrial Environment. Huang, Darong; Lin, Mengting; Ke, Lanyan; Deng, Zhenping Report Jan 1, 2018 7180
Combining Cryptography with EEG Biometrics. Damasevicius, Robertas; Maskeliunas, Rytis; Kazanavicius, Egidijus; Wozniak, Marcin Report Jan 1, 2018 7811
Overcoming the Cyber Weapons Paradox. Goines, Maj Timothy M. Essay Dec 22, 2017 9376
How to Best Protect Member Data During the Holidays. Dec 14, 2017 932
The Impact of Individuals. O'Rourke, Morgan Dec 1, 2017 351
How to Manage Personal Device Risk. Guerra, Domingo Dec 1, 2017 838
WHERE DO WE START WITH CYBERSECURITY? Enterprise cybersecurity requires public buy-in, collaboration across sectors, and a much broader and earlier education and training effort. Rohrer, Karter K.; Hom, Nate Dec 1, 2017 1014
Non-square colour image scrambling based on two-dimensional Sine-Logistic and Henon map. Zhou, Siqi; Xu, Feng; Ping, Ping; Xie, Zaipeng; Lyu, Xin Report Dec 1, 2017 5157
A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS. Behrens, Reinhard; Ahmed, Ali Report Dec 1, 2017 8225
An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin Report Dec 1, 2017 9891
A Novel Two-party Scheme against Off-line Password Guessing Attacks using New Theorem of Chaotic maps. Zhu, Hongfeng Report Dec 1, 2017 7088
Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with Hopfield Neural Network. Obeidat, Atef Ahmed Report Dec 1, 2017 6490
State of the Art in Biometric Key Binding and Key Generation Schemes. Jegede, Abayomi; Udzir, Nur Izura; Abdullah, Azizol; Mahmod, Ramlan Report Dec 1, 2017 10433
A Game Theoretic approach based virtual machine migration for cloud environment security. Mir, Iman El; Kandoussi, El Mehdi; Hanini, Mohamed; Haqiq, Abdelkrim; Kim, Dong Seong Report Dec 1, 2017 7633
SE-H: Secure and Efficient Hash Protocol for RFID System. Nashwan, Shadi Report Dec 1, 2017 6418
Integrating and Securing Video, Audio and Text Using Quaternion Fourier Transform. Khalil, M.I. Report Dec 1, 2017 5118
Economic Denial of Sustainability Attacks Mitigation in the Cloud. Alosaimi, Wael; Zak, Michal; Al-Begain, Khalid; Alroobaea, Roobaea; Masud, Mehedi Report Dec 1, 2017 9521
A new approach for DDoS attacks to discriminate the attack level and provide security for DDoS nodes in MANET. Swain, Jhum; Pattanayak, Binod Kumar; Pati, Bibudhendu Report Dec 1, 2017 5133
Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment. Yuliana, Mike; Wirawan; Suwadi Report Dec 1, 2017 6416
Revealing Influenced Selected Feature for P2P Botnet Detection. Wan, Ahmad Ramzi W.Y.; Faizal M.A.; Rudy, Fadhlee M.D.; Nur, Hidayah M.S. Report Dec 1, 2017 5969
Cybersecurity and Insight into Attacker's Methods. Dec 1, 2017 175
New Nanoscale Security Method May Be Best Hacking Prevention. Nov 29, 2017 545
A Novel Secure and Robust Image Watermarking Method Based on Decorrelation of Channels, Singular Vectors, and Values. Imran, Muhammad; Harvey, Bruce A. Report Nov 1, 2017 6292
k-Degree Anonymity Model for Social Network Data Publishing. Macwan, Kamalkumar R.; Patel, Sankita J. Report Nov 1, 2017 6188
DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP. Guo, Weipeng; Chen, Yonghong; Cai, Yiqiao; Wang, Tian; Tian, Hui Report Nov 1, 2017 6942
Physical Layer Security Scheme Based on Polarization Modulation and WFRFT Processing for Dual-polarized Satellite Systems. Luo, Zhangkai; Wang, Huali; Zhou, Kaijie Report Nov 1, 2017 5548
THE NEW WORLD OF SECURITY: "The goal is to thwart intellectual property theft, such as a stolen formula or customer list; to comply with government and industry regulations on protecting data; and to enforce end-user computing policies to avoid expensive lawsuits, such as sexual harassment.". Miller, Brad Nov 1, 2017 900
MAKING PROTECTION PARAMOUNT: "Threats are everywhere and hackers are more determined than ever to get at your data.". Hohman, Robert Nov 1, 2017 623
Beware data hijackers: Five steps to take to prevent a critical loss of security. Benton, Mark Oct 27, 2017 677
Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy. Yu, Haiyang; Cai, Yongquan; Kong, Shanshan; Ning, Zhenhu; Xue, Fei; Zhong, Han Report Oct 1, 2017 9318
Indicator-based Behavior Ontology for Detecting Insider Threats in Network Systems. Kauh, Janghyuk; Lim, Wongi; Kwon, Koohyung; Lee, Jong-Eon; Kim, Jung-Jae; Ryu, Minwoo; Cha, Si-Ho Report Oct 1, 2017 5599
A New Low-BMR Quantization Method for Wireless Channel Characteristics-based Secret Key Generation. Wang, Qiuhua; Lyu, Qiuyun; Wang, Xiaojun; Bao, Jianrong Report Oct 1, 2017 5925
A New Method of Image Steganography: StegBlender. Leinecker, Richard C. Report Oct 1, 2017 2728
Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition. Isah, A.O.; Alhassan, J.K.; Olanrewaju, S.S.; Aminu, Enesi Femi Report Oct 1, 2017 6156
Deception in Web Application Honeypots: Case of Glastopf. Mphago, Banyatsang; Mpoeleng, Dimane; Masupe, Shedden Case study Oct 1, 2017 4699
Preserving Confidentiality and Privacy of Sensitive Data in e-Procurement System. Narang, Rajesh; Narang, Tanmay Report Oct 1, 2017 4568
Preventing Identity Theft and Strengthening the American Health Care System. Hyde, Justin Oct 1, 2017 946
A Duty to Warn: How to Help America Fight Back Against Russian Disinformation. Giannetti, William Sep 22, 2017 5156
McAfee VP Talks Cybersecurity, Tips On How To Be Safe Online. Sep 13, 2017 529
Can Someone Steal Your Identity? Sep 10, 2017 581
Supermajors Move to Secure Oil Rigs. Sep 8, 2017 761
Fuzzy Preferences based STRIDE Threat Model for Network Intrusion Detection. Khan, Salman A. Report Sep 1, 2017 2679
Design and Implementation of a Mechanism to Secure the Access in Cloud Computing. Sulaiman, Adeeb Hamdoon; Bayati, Hilal Al; Bayounilor, Ahmed Report Sep 1, 2017 6103
Decision Tree Based Data Reconstruction for Privacy Preserving Classification Rule Mining. Kalyani, G.; Rao, Chandra Sekhara; Janakiramaiah, B. Report Sep 1, 2017 8629
Manual Analysis Phase for (PIFPM): Platform Independent Forensics Process Model for Smartphones. Thomas Dancer, F. Chevonne Report Sep 1, 2017 4324
A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction. Xia, Yunhao; Hong, Hanshu; Lin, Guofeng; Sun, Zhixin Report Sep 1, 2017 7342
Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors. Zhang, Zhi; Wang, Dongyan; Wang, Chengyou; Zhou, Xiao Report Sep 1, 2017 7678
A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management. Sun, Bangyi; Chu, Jianfeng; Hu, Liang; Li, Hongtu; Shi, Guangkun Report Sep 1, 2017 5891
A Secure and Efficient E-Medical Record System via Searchable Encryption in Public Platform. Xu, Lei; Xu, Chungen; Zhang, Xing Report Sep 1, 2017 7190
Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking. Wang, Kai; Bao, Wei; Wang, Yingjie; Tong, Xiangrong Report Sep 1, 2017 6116
Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection. Xu, Yanping; Wu, Chunhua; Zheng, Kangfeng; Niu, Xinxin; Lu, Tianling Report Sep 1, 2017 9943
A mobile-based phishing detector app for e-mails. Orunsolu, Abdul A.; Alaran, Misturah A.; Kareem, Sakiru O.; Oke, Ayobami G.; Adejonwo, Eniola I. Report Aug 9, 2017 3404
Protect yourself from digital attacks. Anderson-Minshall, Jacob Aug 1, 2017 291
Location authentication based on wireless access point information to prevent wormhole attack in Samsung pay. Ryu, Gwonsang; Seo, Changho; Choi, Daeseon Report Aug 1, 2017 4347
A Novel Multi-link Integrated Factor Algorithm Considering Node Trust Degree for Blockchain-based Communication. Li, Jiao; Liang, Gongqian; Liu, Tianshi Report Aug 1, 2017 10462
Towards Designing Efficient Lightweight Ciphers for Internet of Things. Tausif, Muhammad; Ferzund, Javed; Jabbar, Sohail; Shahzadi, Raheela Report Aug 1, 2017 6960
A Novel Kernel SVM Algorithm with Game Theory for Network Intrusion Detection. Liu, Yufei; Pi, Dechang Report Aug 1, 2017 7349
Discrete R-Contiguous bit matching mechanism appropriateness for anomaly detection in wireless sensor networks. Zeeshan, M.; Javed, Huma; Ullah, Sifat Report Aug 1, 2017 4642
Detection of illegal traffic pattern using hybrid improved CART and multiple extreme learning machine approach. Lekha, J.; Ganapathi, Padmavathi Report Aug 1, 2017 4720
Quantum phase shift for energy conserved secured data communication in MANET. Selvi, E.; Shashidhara, M.S. Report Aug 1, 2017 6828
Black hole attack detection using fuzzy based IDS. Abdel-Azim, Mohammed; Salah, Hossam El-Din; Ibrahim, Menas Report Aug 1, 2017 6042
Quaternion-based encryption/decryption of audio signal using digital image as a variable key. Khalil, M.I. Report Aug 1, 2017 3975
A comprehensive cloud security model with enhanced key management, access control and data anonymization features. Mini, G. Venifa; Viji, K.S. Angel Report Aug 1, 2017 6966
Revealing the feature influence in HTTP botnet detection. M. S, Nur Hidayah; M. A, Faizal; Selamat, Siti Rahayu; M. D, Rudy Fadhlee; W. Y, Wan Ahmad Ramzi Report Aug 1, 2017 6374
Digital copyright protection: Focus on some relevant solutions. Frattolillo, Franco Report Aug 1, 2017 9395
3 Biggest Cyber Security Mistakes By Employees, How To Protect Against Them. Jul 25, 2017 1544
Healthcare cybersecurity is due for a checkup: the digitization of information has enhanced delivery of care, but it has also made data more vulnerable to attack. Dunlap, Sabrina E.; Pliakos, Laurie Beth Jul 21, 2017 766
Arming your organization with cybersecurity: an information security policy is a crucial layer of security defense. Victor, Adam Jul 21, 2017 683
How to Password Protect Your USB Sticks in 3 Easy Ways. Jul 10, 2017 936
Cryptolog: A new approach to provide log security for digital forensics. Baykara, Muhammet; Das, Resul; Tuna, Gurkan Report Jul 1, 2017 5282
SPCBC: A Secure Parallel Cipher Block Chaining mode of operation based on logistic chaotic map. El-Semary, Aly M.; Azim, Mohamed Mostafa A.; Diab, Hossam Report Jul 1, 2017 9448
New construction of short certificate-based signature against existential forgery attacks. Lu, Yang; Wang, Gang; Li, Jiguo; Shen, Jian Report Jul 1, 2017 11901
Visual quality optimization for privacy protection bar-based secure image display technique. Park, Sanghyun; Kang, Sang-ug Report Jul 1, 2017 5759
Novel multi-user conjunctive keyword search against keyword guessing attacks under simple assumptions. Zhao, Zhiyuan; Wang, Jianhua Report Jul 1, 2017 12041
Robust biometric-based anonymous user authenticated key agreement scheme for Telecare Medicine Information Systems. Jung, Jaewook; Moon, Jongho; Won, Dongho Report Jul 1, 2017 16049
AKA-PLA: Enhanced AKA based on physical layer authentication. Yang, Jing; Ji, Xinsheng; Huang, Kaizhi; Yi, Ming; Chen, Yajun Report Jul 1, 2017 6883
Driver's licenses pose new data security risks. Brunsman, Joseph; Hudson, Dan; Patrick, Byron Jul 1, 2017 986
Social media and the DOD: benefits, risks, and mitigation. Waldvogel, Dieter A. Report Jun 22, 2017 2912
Current Approaches of Diplomacy in the Cyberspace. Muresan, Radu Constantin Essay Jun 1, 2017 4045
HS-Sign: A security enhanced UOV signature scheme based on hyper-sphere. Chen, Jiahui; Tang, Shaohua; Zhang, Xinglin Report Jun 1, 2017 10327
Verifiable outsourced ciphertext-policy attribute-based encryption for mobile cloud computing. Zhao, Zhiyuan; Wang, Jianhua Report Jun 1, 2017 9576
The chief information security officer: the new CFO of information security. Lanz, Joel Jun 1, 2017 2972
Defense strategies against byzantine attacks in a consensus-based network intrusion detection system. Toulouse, Michel; Le, Hai; Phung, Cao Vien; Hock, Denis Report Jun 1, 2017 10984
The single factor of most concern in the cloud: with vendors inconsistently offering multifactor authentication, the JofAs annual technology roundtable identifies single sign-on as a possible solution. Drew, Jeff Jun 1, 2017 2590
Using contracts to curb cyberrisks. Travis, Fred; Schwartz, Matt May 1, 2017 994
Cyber confidence. Brief article May 1, 2017 239
Keeping client information safe in an age of scams and security threats: a look at the dirty dozen tax scams and ways to protect taxpayer information. May 1, 2017 2494
Hybrid solution for privacy-preserving access control for healthcare data. Smithamol, Mukalel Bhaskaran; Rajeswari, Sridhar Report May 1, 2017 7499
Real-time scheduling for preventing information leakage with preemption overheads. Baek, Hyeongboo; Lee, Jinkyu; Lee, Jaewoo; Kim, Pyung; Kang, Brent Byunghoon Report May 1, 2017 10029
SPIMN Stateful Packet Inspection for Multi Gigabits Networks. Ibrahim, Amr Report May 1, 2017 5234
Software engineering consideration in the design and implementation of electronic patients information management system (E-PIMS) for University of Calabar Teaching Hospital (UCTH). Ele, Sylvester I.; Adesola, W.A.; Umoh, E.E.; Akinola, Olatunji Alani Report May 1, 2017 2385
A survival study of security attacks, security mechanisms and security challenges in network security. Jayasmruthi, A.; Parthasarathi, P.; Sathishkumar Report Apr 15, 2017 3948
Personal & workplace IDs are converging. Apr 1, 2017 483
Vulnerable path attack and its detection. Tong, Ying; Shen, Yuehong; Gao, Bin; Sun, Fenggang; Chen, Rui; Xu, Yefeng Report Apr 1, 2017 8080
An SDN based hopping multicast communication against DoS attack. Zhao, Zheng; Liu, Fenlin; Gong, Daofu Report Apr 1, 2017 9601
Provably-secure public auditing with deduplication. Kim, Dongmin; Jeong, Ik Rae Report Apr 1, 2017 8438
An improved cancelable fingerprint template encryption system research. Wang, Feng; Han, Bo; Niu, Lei; Wang, Ya Report Apr 1, 2017 5732
Efficient and secure certificateless proxy re-encryption. Liu, Ya; Wang, Hongbing; Wang, Chunlu Report Apr 1, 2017 13369
UTrustDisk: An efficient data protection scheme for building trusted USB flash disk. Cheng, Yong; Ma, Jun; Ren, Jiangchun; Mei, Songzhu; Wang, Zhiying Report Apr 1, 2017 6560
Shoring up cyber defences. McDonald, Grant; Hanley, Paul Apr 1, 2017 777
A Novel Framework for Secure E-Commerce Transactions. Mlelwa, Kenneth L.; Yonah, Zaipuna O. Report Apr 1, 2017 3874
Protecting electronic data in an unsecure world. Ohanesian, Michael V. Mar 1, 2017 1317
A hybrid wavelet-shearlet approach to robust digital image watermarking. Hassanat, Ahmad B.A.; Prasath, V.B. Surya; Mseidein, Khalil I.; awadi, Mouhammd Al-; Hammouri, Awni Report Mar 1, 2017 15269
Identity-based signcryption groupkey agreement protocol using bilinear pairing. Reddi, Sivaranjani; Borra, Surekha Report Mar 1, 2017 5253
Combined zernike moment and multiscale analysis for tamper detection in digital images. Le-Tien, Thuong; Huynh-Kha, Tu; Pham-Cong-Hoan, Long; Tran-Hong, An; Dey, Nilanjan; Luong, Marie Report Mar 1, 2017 7983
Smart contracts: legal agreements for the blockchain. O'Shields, Reggie Mar 1, 2017 6864
DTCF: A distributed trust computing framework for vehicular ad hoc networks. Gazdar, Tahani; Belghith, Abdelfettah; AlMogren, Ahmad Report Mar 1, 2017 11362
Lightweight intrusion detection of rootkit with VMI-based driver separation mechanism. Cui, Chaoyuan; Wu, Yun; Li, Yonggang; Sun, Bingyu Report Mar 1, 2017 8170
Adaptive reversible image watermarking algorithm based on DE. Zhang, Zhengwei; Wu, Lifa; Yan, Yunyang; Xiao, Shaozhang; Gao, Shangbing Report Mar 1, 2017 8510
An efficient chaotic image encryption algorithm based on self-adaptive model and feedback mechanism. Zhang, Xiao; Wang, Chengqi; Zheng, Zhiming Report Mar 1, 2017 6744

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters