Printer Friendly

Browse Data security topic

Methods subtopic

Articles

1-300 out of 600 article(s) nextnext page
Title Author Type Date Words
GCash ramps up user data protection. Sep 8, 2022 621
How to create a strong password and secure your account. Aug 2, 2022 383
A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization. Chen, Lu; Tang, Hongbo; Zhao, Yu; You, Wei; Wang, Kai Report Aug 1, 2022 6076
An Entropy-based Method for Social Apps Privacy Assessment Using the Android Permissions Architecture. Sandor, Andrei; Simion, Eduard Report Aug 1, 2022 6743
Secure Communication Schemes over ISO/IEEE 11073-20601 for Smart Healthcare Service. Kim, Sang Kon; Kim, Tae Kon Report Jul 1, 2022 5386
Cyber threats: taxonomy, impact, policies, and way forward. Malik, Annas W.; Abid, Adnan; Farooq, Shoaib; Abid, Irfan; Nawaz, Naeem A.; Ishaq, Kashif Report Jul 1, 2022 14319
How to invest as cybersecurity grows in importance. Jun 30, 2022 1035
How to invest as cybersecurity grows in importance. Richard Woodard Jun 30, 2022 1028
AIM develops cybersecurity program for businesses. Jun 16, 2022 642
Federated Multitask Learning with Manifold Regularization for Face Spoof Attack Detection[sup.?]. Chen, Yingyue; Chen, Liang; Hong, Chaoqun; Wang, Xiaodong Report Jun 6, 2022 5245
The True Value of Firewall Controls. Barlow, Eleanor Jun 1, 2022 334
How the MITRE ATT&CK Framework Has Revolutionised Cyber Security. Jun 1, 2022 623
A Novel Dynamic Optimization Technique for Finding Optimal Trust Weights in Cloud. Prasad, Aluri V.H. Sai; Rajkumar, Ganapavarapu V.S. Report Jun 1, 2022 4842
The Improved Estimation of the Least Upper Bound to Search for RSA's Private key. Somsuk, Kritsanapong Report Jun 1, 2022 8762
Physical Layer Security for Two-Way Relay NOMA Systems with Energy Harvesting. Li, Hui; Chen, Yaping; Zou, Borong Report Jun 1, 2022 7607
Efficient Illegal Contents Detection and Attacker Profiling in Real Environments. Kim, Jin-gang; Lim, Sueng-bum; Lee, Tae-jin Report Jun 1, 2022 6362
Methods to Protect Your Documents in a Electronic Data Area. May 31, 2022 274
A Novel Intelligent-Based Intrusion Detection System Approach Using Deep Multilayer Classification. Ugendhar, A.; Illuri, Babu; Vulapula, Sridhar Reddy; Radha, Marepalli; K, Sukanya; Alenezi, Fayadh; Report May 6, 2022 6270
Frequency Domain Horizontal Cross Correlation Analysis of RSA. Kuzu, Ebru Akalp; Tangel, Ali; Yalcin, Siddika Berna Ors Report May 1, 2022 6802
A New BISON-like Construction Block Cipher: DBISON. Zhao, Haixia; Wei, Yongzhuang; Liu, Zhenghong Report May 1, 2022 9095
BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment. Zhang, Lejun; Zou, Yanfei; Yousuf, Muhammad Hassam.; Wang, Weizheng; Jin, Zilong; Su, Yansen; Seokho Report May 1, 2022 7426
Enhancing Location Privacy through P2P Network and Caching in Anonymizer. Liu, Peiqian; Xie, Shangchen; Shen, Zihao; Wang, Hui Report May 1, 2022 7553
Cascaded-Hop For DeepFake Videos Detection. Zhang, Dengyong; Wu, Pengjie; Li, Feng; Zhu, Wenjie; Sheng, Victor S. Report May 1, 2022 7078
A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks. Ren, Huimin; Kim, Suhyun; Seo, Daehee; Lee, Imyeong Report May 1, 2022 9007
Application Research of Fake News and Rumors Detection in Complex Network Environment. Huang, Meng-Zhe; Yin, Rong-Wang Report Apr 22, 2022 3728
An Efficient and Secure Data Sharing Method Using Asymmetric Pairing with Shorter Ciphertext to Enable Rapid Learning in Healthcare. Yadav, Snehlata; Tiwari, Namita Apr 20, 2022 7622
Double-Blind Compact E-cash from Bilinear Map. Chen, Jiyang; Lian, Bin; Li, Yongjie; Cui, Jialin; Yu, Ping; Shu, Zhenyu; Tao, Jili Report Apr 1, 2022 9029
An Improved Pseudorandom Sequence Generator and its Application to Image Encryption. Sinha, Keshav; Paul, Partha; Amritanjali Report Apr 1, 2022 9906
PH urged to strengthen IT security. Mar 29, 2022 586
Design Scheme of a Docker Container File Isolation against Computer Virus Spreading. Ju, Hanji; Wang, Jie; Zhu, Enguo; Zhang, Xiaoli; Zheng, Feng Report Mar 28, 2022 3506
Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming. Sun, Ling; Gao, Dali Report Mar 25, 2022 8314
"Our Biggest Nightmare Is Here": Cyberattacks are targeting school districts. How can schools respond to keep data and systems secure? Belastock, Eileen Mar 22, 2022 2802
It takes a village to empower young minds to tackle modern digital ecosystems. Mar 10, 2022 720
Secured Different Disciplinaries in Electronic Medical Record based on Watermarking and Consortium Blockchain Technology. Mohananthini, N.; Ananth, C.; Parvees, M.Y. Mohamed Report Mar 1, 2022 7409
Research on the Security Level of [[micro].sup.2] against Impossible Differential cryptanalysis. Zhang, Kai; Lai, Xuejia; Guan, Jie; Hu, Bin Report Mar 1, 2022 4808
A Differential Privacy Approach to Preserve GWAS Data Sharing based on A Game Theoretic Perspective. Yan, Jun; Han, Ziwei; Zhou, Yihui; Lu, Laifeng Report Mar 1, 2022 8236
CKGS: A Way Of Compressed Key Guessing Space to Reduce Ghost Peaks. Li, Di; Li, Lang; Ou, Yu Report Mar 1, 2022 5335
SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation. Kang, Ki-Wan; Seo, Jung Taek; Baek, Sung Hoon; Kim, Chul Woo; Park, Ki-Woong Report Mar 1, 2022 5024
What Facebook and Tiktok know about you. Feb 11, 2022 692
Unpacking Cybersecurity: Examining Its Gears With Today's CISOs. Feb 10, 2022 1095
A Safer Internet Day with Facebook and Google? Feb 8, 2022 556
A Hybrid Deep Learning Approach for Intrusion Detection in IoT Networks. Emec, Murat; Ozcanhan, Mehmet Hilal Report Feb 1, 2022 7218
Cybersecurity Is Not A One-Stop-Shop. Hancock, Rob; Murray, Kelvin Feb 1, 2022 955
High Assurance Delivers SD-WANs for All. German, Paul Feb 1, 2022 920
A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT. Deng, Yinjuan; Wang, Shangping; Zhang, Qian; Zhang, Duo Report Feb 1, 2022 10364
Verification Control Algorithm of Data Integrity Verification in Remote Data sharing. Xu, Guangwei; Li, Shan; Lai, Miaolin; Gan, Yanglan; Feng, Xiangyang; Huang, Qiubo; Li, Li; Li, Wei Report Feb 1, 2022 9877
Blockchain-Assisted Trust Management Scheme for Securing VANETs. Ahmed, Waheeb; Wu, Di; Mukathie, Daniel Report Feb 1, 2022 8514
Analysis of Malware Detection and Signature Generation Using a Novel Hybrid Approach. Dugyala, Raman; Reddy, N. Hanuman; Maheswari, V. Uma; Mohammad, Gouse Baig; Alenezi, Fayadh; Polat, Report Jan 19, 2022 8455
Privacy-Preserving Key-Updatable Public Key Encryption with Keyword Search Supporting Ciphertext Sharing Function. Wang, Fen; Lu, Yang; Wang, Zhongqi; Tian, Jinmei Report Jan 1, 2022 11547
Ring Signature Scheme Based on Lattice and Its Application on Anonymous Electronic Voting. Zhou, Yihua; Dong, Songshou; Yang, Yuguang Report Jan 1, 2022 8499
Disbursal of Text Steganography in the Space of Double-Secure Algorithm. Khan, Yahya; Algarni, Ali; Fayomi, Aisha; Almarashi, Abdullah M. Report Dec 29, 2021 4854
'Trust is a currency,' says Globe's Chief Information Security Officer. Dec 13, 2021 544
BDO to reimburse affected clients soon; bankers group call for vigilance against cyber crimes. Dec 12, 2021 901
How ethical hackers counter cybercriminal attacks. Dec 10, 2021 1016
Study on Machine Learning Techniques for Malware Classification and Detection. Moon, Jaewoong; Kim, Subin; Song, Jaeseung; Kim, Kyungshin Report Dec 1, 2021 8026
Is your business protected? Dec 1, 2021 915
Privacy-preserving and Communication-efficient Convolutional Neural Network Prediction Framework in Mobile Cloud Computing. Bai, Yanan; Feng, Yong; Wu, Wenyuan Report Dec 1, 2021 8523
Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server. Sinha, Keshav; Paul, Partha; Amritanjali Report Dec 1, 2021 9881
A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data. Lin, Weiwei; Yang, Chaofan; Zhang, Zeqing; Xue, Xingsi; Haga, Reiko Report Dec 1, 2021 4491
Cybercriminals can steal your data thru your printer. Nov 29, 2021 846
Security services warn 'skimming' scam is targeting online shoppers in the run up to Christmas; National Cyber Security Centre has advice on how to avoid becoming a victim. By, Emma Munbodh & Daniel Smith Nov 23, 2021 368
Security services warn 'skimming' scam is targeting online shoppers in the run up to Christmas; National Cyber Security Centre has advice on how to avoid becoming a victim. By, Emma Munbodh & Daniel Smith Nov 23, 2021 368
Security services warn 'skimming' scam is targeting online shoppers in the run up to Christmas; National Cyber Security Centre has advice on how to avoid becoming a victim. By, Emma Munbodh & Daniel Smith Nov 23, 2021 368
How to avoid phishing scams in times of COVID-19. Nov 18, 2021 549
Outage Constraint Robust Cooperative Beamforming and Jamming Design for Secure AF Relay Networks. Zhu, Jinxin; Shao, Jun Report Nov 5, 2021 3685
Machine Learning Enhanced Entropy-Based Network Anomaly Detection. Timcenko, Valentina; Gajin, Slavko Report Nov 1, 2021 8567
Quantum Steganography Using Two Hidden Thresholds. Tudorache, Alexandru-Gabriel; Manta, Vasile; Caraiman, Simona Report Nov 1, 2021 6405
An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm. Ponnuviji, N.P.; Prem, M. Vigilson Report Nov 1, 2021 5106
Resilience against Adversarial Examples: Data-Augmentation Exploiting Generative Adversarial Networks. Kang, Mingu; Kim, HyeungKyeom; Lee, Suchul; Han, Seokmin Report Nov 1, 2021 6527
LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications. Roy, Siddhartha; Roy, Saptarshi; Biswas, Arpita; Baishnab, Krishna Lal Report Nov 1, 2021 10413
A Generation-based Text Steganography by Maintaining Consistency of Probability Distribution. Yang, Boya; Peng, Wanli; Xue, Yiming; Zhong, Ping Report Nov 1, 2021 7153
Throughput and Interference for Cooperative Spectrum Sensing: A Malicious Perspective. Gan, Jipeng; Wu, Jun; Zhang, Jia; Chen, Zehao; Chen, Ze Report Nov 1, 2021 7948
Cybercrime everywhere (paralyzing businesses). Oct 19, 2021 927
Cybercrime everywhere (paralyzing businesses). Oct 18, 2021 928
Protecting the elderly from online scams. Editorial Oct 15, 2021 792
How to fix your Google Gmail password on your mobile device. Oct 15, 2021 644
A Decision Making Model Proposal for Firewall Selection. Akturk, Cemal; Cubukcu, Ceren Report Oct 1, 2021 9189
Flow based Sequential Grouping System for Malicious Traffic Detection. Park, Jee-Tae; Baek, Ui-Jun; Lee, Min-Seong; Goo, Young-Hoon; Lee, Sung-Ho; Kim, Myung-Sup Report Oct 1, 2021 9931
Binomial Distribution Based Reputation for WSNs: A Comprehensive Survey. Wei, Zhe; Yu, Shuyan Report Oct 1, 2021 10677
Impossible Differential Cryptanalysis on ESF Algorithm with Simplified MILP Model. Wu, Xiaonian; Yan, Jiaxu; Li, Lingchen; Zhang, Runlian; Yuan, Pinghai; Wang, Yujue Report Oct 1, 2021 6993
A New Approach to Finally Stop the Hackers: Increased Risks Require New Solutions. Cherry, Michael; Imwinkelried, Edward J.; Riley, Elven; Epstein, Jules; King, Jack Oct 1, 2021 903
Cybersecurity--How Confident (Complacent?) Are You? German, Paul Oct 1, 2021 954
A Zero-trust Future for a Hybrid Working World: Why a holistic approach to security is the best way forward. Mabilia, Michele Oct 1, 2021 712
It Experts Share Top Tech and Tips to Help Businesses Tackle Cyber Risks Posed by Hybrid Working Models: Totality Services, Explains Cyber Risks and How Businesses with Hybrid Working Set-ups Can Handle Them. Oct 1, 2021 671
Simple ways to enhance website security. Sep 17, 2021 545
Cybercriminals target mobile banking in PH, SEA, threat surges 60%. Sep 15, 2021 721
Online Privacy Guide for Students. Sep 10, 2021 569
COVID-19 AND POTENTIAL TAX FRAUD. Nickell, Erin; Chambers, Valrie Sep 1, 2021 1098
Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers. Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon Report Sep 1, 2021 6045
Malware Detection with Directed Cyclic Graph and Weight Merging. Li, Shanxi; Zhou, Qingguo; Wei, Wei Report Sep 1, 2021 5839
A Two-Layer Steganography for Mosaic Images. Horng, Ji-Hwei; Chang, Chin-Chen; Sun, Kun-Sheng Report Sep 1, 2021 6656
Adaptive data hiding scheme based on magic matrix of flexible dimension. Wu, Hua; Horng, Ji-Hwei; Chang, Chin-Chen Report Sep 1, 2021 7451
Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption. Wang, Guangbo; Li, Feng; Wang, Pengcheng; Hu, Yixiao Report Sep 1, 2021 7428
Copyright Protection of E-books by Data Hiding Based on Integer Factorization. Wu, Da-Chun; Hsieh, Ping-Yu Report Sep 1, 2021 10008
Simple and Ingenious Mobile Botnet Covert Network Based on Adjustable Unit (SIMBAIDU). Wu, Min-Hao; Lee, Chia-Hao; Hsu, Fu-Hau; Chang, Kai-Wei; Huang, Tsung-Huang; Chang, Ting-Cheng; Yi, Report Aug 4, 2021 3879
Cost Benefit Analysis of Incorporating Security and Evaluation of Its Effects on Various Phases of Agile Software Development. Kumar, Sushil; Kaur, Avinash; Jolly, Ashish; Baz, Mohammed; Cheikhrouhou, Omar Report Aug 3, 2021 5541
Polymorphic Path Transferring for Secure Flow Delivery. Zhang, Rongbo; Li, Xin; Zhan, Yan Report Aug 1, 2021 11207
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing. Dai, Yingling; Weng, Jian; Yang, Anjia; Yu, Shui; Deng, Robert H. Report Aug 1, 2021 9944
Deep Learning Based DNS Tunneling Detection and Blocking System. Altuncu, Mehmet Ali; Gulagiz, Fidan Kaya; Ozcan, Hikmetcan; Bayir, Omer Faruk; Gezgin, Alperen; Niya Report Aug 1, 2021 7003
Cyber Risks No Longer Science-Fiction for Libraries. Regan, Kevin Jul 19, 2021 919
Beware, it's a scam! Editorial Jul 9, 2021 802
Cyber Insurance Industry in Crosshairs of Ransomware Criminals. Bajak, Frank Jul 7, 2021 1313
Leading by Example: How Insurers Can Manage Cyber Risk Within Their Own Operations. Blosfield, Elizabeth Jul 7, 2021 624
The Cybercrime Challenge for Agents. Wetzel, Tom Jul 5, 2021 652
A Message from a Cybersecurity Expert. Sfoglia, Pete Jul 5, 2021 660
Cryptomining still threatens SMBs in PH. Jun 22, 2021 536
Application of High-Dimensional Outlier Mining Based on the Maximum Frequent Pattern Factor in Intrusion Detection. Shen, Limin; Sun, Zhongkui; Chen, Lei; Feng, Jiayin Report Jun 22, 2021 6666
Forgotten Your Passwords? They Soon May Be Lost Altogether ? with Insurers' Help. Patterson, James Jun 21, 2021 1279
Experts Call Colonial Pipeline Attack a Wake-Up Call, Say Bigger Attacks Could Be Ahead. Blosfield, Elizabeth Jun 9, 2021 686
Secrecy Capacity Analysis of an Underlay Cognitive Radio Network in the Presence of Co-channel and Primary Network Interference. Bayat, Emre; Colak, Sultan Aldirmaz Report Jun 1, 2021 4790
Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks. Shin, Tran Song Dat; Shin, Yong-Hyeon; Lee, Changhoon Report Jun 1, 2021 5758
Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid. Prasanna, Srinivasan. V.; Balasubadra, K.; Saravanan, K.; Arjun, V.S.; Malarkodi, S. Report Jun 1, 2021 8151
LSTM Android Malicious Behavior Analysis Based on Feature Weighting. Yang, Qing; Wang, Xiaoliang; Zheng, Jing; Ge, Wenqi; Bai, Ming; Jiang, Frank Report Jun 1, 2021 6455
Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers. Liu, Xiaochen; Gao, Yuanyuan; Sha, Nan; Zang, Guozhen; Wang, Shijie. Report Jun 1, 2021 6718
On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks. Wang, Qiuhua; Kang, Mingyang; Yuan, Lifeng; Wang, Yunlu; Miao, Gongxun; Choo, Kim-Kwang Raymond Report Jun 1, 2021 9600
Node Location Privacy Protection in Unattended Wireless Sensor Networks. Zhou, ZhiGang; Wang, Yu; Li, PanPan; Chang, XinGong; Luo, JiWei Report May 31, 2021 9257
Cyber Security Is a Conversation Agents Need to Have with Clients. Holmes, Jeff May 17, 2021 1018
More government sites are vulnerable to cyber attacks. May 6, 2021 729
Efficient Proxy Re-encryption Scheme for E-Voting System. Xiong, Hu Report May 1, 2021 10925
State of the Art of Anti-Screen Capture Protection Techniques. Lee, Young; Hahn, SangGeun Report May 1, 2021 7656
EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception. Li, Huanruo; Guo, Yunfei; Huo, Shumin; Ding, Yuehang Report May 1, 2021 7192
Methodology for Computer Security Incident Response Teams into IoT Strategy. Bernal, Alejandro Enciso; Monterrubio, Sergio Mauricio Martinez; Fuente, Javier Parra; Crespo, Ruben Report May 1, 2021 8320
Random Number Generator and Secure Communication Applications Based on Infinitely Many Coexisting Chaotic Attractors. Noor, Abdullah; Taskiran, Zehra Gulru Cam Report May 1, 2021 4074
'Ask App Not To Track'. Apr 30, 2021 549
Cybersecurity is everyone's responsibility. Apr 25, 2021 698
Why healthcare and cybersecurity must go hand in hand to protect the Covid-19 vaccine supply chain. Apr 24, 2021 626
Survey on Botnet Detection Techniques: Classification, Methods, and Evaluation. Xing, Ying; Shu, Hui; Zhao, Hao; Li, Dannong; Guo, Li Report Apr 15, 2021 15759
Med Tech Report: Change is hard: Lessons from an EHR conversion. Notte, Chris; Skolnik, Neil Apr 1, 2021 1072
Image Deduplication Based on Hashing and Clustering in Cloud Storage. Chen, Lu; Xiang, Feng; Sun, Zhixin Report Apr 1, 2021 5969
High Capacity Information Hiding Method Based on Pixel-value Adjustment with Modulus Operation. Li, Teng; Zhang, Yu; Wang, Sha; Sun, Jun-Jie Report Apr 1, 2021 4984
Defending and Detecting Audio Adversarial Example using Frame Offsets. Gong, Yongkang; Yan, Diqun; Mao, Terui; Wang, Donghua; Wang, Rangding Report Apr 1, 2021 4969
Safe and secure; that is how it should be. Mar 29, 2021 594
The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems. Einy, Sajad; Oz, Cemil; Navaei, Yahya Dorostkar Report Mar 13, 2021 6486
Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching. Hamza, Ali; Shehzad, Danish; Sarfraz, Muhammad Shahzad; Habib, Usman; Shafi, Numan Report Mar 1, 2021 11511
Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance. Liu, Qiang; Xiang, Xuyu; Qin, Jiaohua; Tan, Yun; Zhang, Qin Report Mar 1, 2021 8004
Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System. Khosravy, Mahdi; Nakamura, Kazuaki; Hirose, Yuki; Nitta, Naoko; Babaguchi, Noboru Report Mar 1, 2021 6947
Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey. Montes, F.; Bermejo, J.; Sanchez, L.E.; Bermejo, J.R.; Sicilia, J.A. Report Mar 1, 2021 10559
Civil Service Commission data breach, thousands of user details exposed. Feb 28, 2021 541
Philippine government data leaks remain unplugged. Feb 23, 2021 722
Fundamentals in bridging the cybersecurity skills gap. Feb 16, 2021 840
Privacy Protection Method for Sensitive Weighted Edges in Social Networks. Gong, Weihua; Jin, Rong; Li, Yanjun; Yang, Lianghuai; Mei, Jianping Report Feb 1, 2021 7054
Verification Algorithm for the Duplicate Verification Data with Multiple Verifiers and Multiple Verification Challenges. Xu, Guangwei; Lai, Miaolin; Feng, Xiangyang; Huang, Qiubo; Luo, Xin; Li, Li; Li, Shan Report Feb 1, 2021 8116
A Systematic Treat Model for Software-Defined Networking. Zhang, Wenbin; Wu, Zehui; Wei, Qiang; Yuan, Huijie Report Feb 1, 2021 9173
A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid. Zhang, Yueyu; Chen, Jie; Zhou, Hua; Dang, Lanjun Report Feb 1, 2021 7187
Lockdown fraud! How to avoid becoming a victim; Falling prey to money scams and data breaches can set anxiety levels soaring. These tips will help you keep control of your cash and stay safe online. Jan 31, 2021 806
HOW TO AVOID BECOMING A VICTIM; Falling prey to money scams and data breaches can set anxiety levels soaring. These tips will help you keep control of your cash and stay safe online. Jan 31, 2021 857
Lockdown fraud! HOW TO AVOID BECOMING A VICTIM; Falling prey to money scams and data breaches can set anxiety levels soaring. These tips will help you keep control of your cash and stay safe online. Jan 31, 2021 806
Safeguard your personal information. Editorial Jan 11, 2021 553
Cybersecurity Attacks during a Pandemic: It Is Not Just IT's Job! Middaugh, Donna J. Report Jan 1, 2021 1381
A "Hack" of a Close Vote. Markuson, Daniel Jan 1, 2021 914
UDP-Based Active Scan for IoT Security (UAIS). Jung, Hyun-Chul; Jo, Hyun-geun; Lee, Heejo Report Jan 1, 2021 5246
FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN. Lian, Weichen; Li, Zhaobin; Guo, Chao; Wei, Zhanzhen; Peng, Xingyuan Report Jan 1, 2021 8845
Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System. Zhang, Wei; Wu, Yi; Xiong, Hu; Qin, Zhiguang Report Jan 1, 2021 7753
Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption. Liu, Zhenhua; Ji, Jiaqi; Yin, Fangfang; Wang, Baocang Report Jan 1, 2021 8090
Blockchain-Based Authentication with Optional Privacy Preservation for Internet of Vehicles. Zhang, Jinxin; Wu, Meng Report Jan 1, 2021 7997
Cost Benefit Analysis of Incorporating Security and Evaluation of Its Effects on Various Phases of Agile Software Development. Kumar, Sushil; Kaur, Avinash; Jolly, Ashish; Baz, Mohammed; Cheikhrouhou, Omar Report Jan 1, 2021 5541
Simple and Ingenious Mobile Botnet Covert Network Based on Adjustable Unit (SIMBAIDU). Wu, Min-Hao; Lee, Chia-Hao; Hsu, Fu-Hau; Chang, Kai-Wei; Huang, Tsung-Huang; Chang, Ting-Cheng; Yi, Report Jan 1, 2021 3879
Design of a Cryptographic System for Communication Security using Chaotic Signals. Leu, Jai-Houng; Sun, Jung-Kang; Chen, Ho-Sheng; Huang, Chong-Lin; Qiao, Dong-Kai; Lan, Tian-Syung; C Report Jan 1, 2021 3152
The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems. Einy, Sajad; Oz, Cemil; Navaei, Yahya Dorostkar Report Jan 1, 2021 6485
A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application. Sharma, Chirag; Bagga, Amandeep; Singh, Bhupesh Kumar; Shabaz, Mohammad Report Jan 1, 2021 10189
Cloud-Based Fusion of Residual Exploitation-Based Convolutional Neural Network Models for Image Tampering Detection in Bioinformatics. Doegar, Amit; Hiriyannaiah, Srinidhi; Siddesh, G. M.; Srinivasa, K. G.; Dutta, Maitreyee Report Jan 1, 2021 6604
Application of Blockchain for Internet of Things: A Bibliometric Analysis. Duan, Ruijun; Guo, Li Report Jan 1, 2021 9703
Survey on Botnet Detection Techniques: Classification, Methods, and Evaluation. Xing, Ying; Shu, Hui; Zhao, Hao; Li, Dannong; Guo, Li Report Jan 1, 2021 15761
Fastening data security with a remote working environment. Dec 29, 2020 556
Teach children about data privacy and fake news through these books. Dec 21, 2020 506
Ensuring Security and Privacy While Remote Working. Dec 18, 2020 693
Madayn organises awareness lectures on investment methods, labour law and cybersecurity. By: Times News Service Dec 5, 2020 299
Kabataang Digital. Dec 2, 2020 747
Fortinet Expands Network Security Expert Training Institute. Dec 2, 2020 800
Generative Adversarial Networks: A Literature Review. Cheng, Jieren; Yang, Yue; Tang, Xiangyan; Xiong, Naixue; Lei, Feifei Report Dec 1, 2020 11172
Semi-supervised based Unknown Attack Detection in EDR Environment. Hwang, Chanwoong; Kim, Doyeon; Lee, Taejin Report Dec 1, 2020 6856
Kaspersky and Siemens Underscore the Importance of Securing Industry 4.0 Apps. Nov 13, 2020 798
How to reclaim a hacked YouTube account. Nov 3, 2020 601
Lightweight Data Security Protection Method for AMI in Power Internet of Things. Jiang, Wenqian; Yang, Zhou; Zhou, Zhenglei; Chen, Jueyu Report Nov 2, 2020 6178
Elevate Cyberdefenders' Skills Amid a Transforming World. Nov 1, 2020 551
Network Traffic Classification Based on Deep Learning. Li, Junwei; Pan, Zhisong Report Nov 1, 2020 8694
Two-Pathway Model for Enhancement of Protocol Reverse Engineering. Goo, Young-Hoon; Shim, Kyu-Seok; Baek, Ui-Jun; Kim, Myung-Sup Report Nov 1, 2020 7569
A Reversible Data Hiding Method for AMBTC Compressed Image without Expansion inside Stego Format. Hui, Zheng; Zhou, Quan Report Nov 1, 2020 7628
Integral Attacks on Some Lightweight Block Ciphers. Zhu, Shiqiang; Wang, Gaoli; He, Yu; Qian, Haifeng Report Nov 1, 2020 8976
Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme. vedaraj, M.; Ezhumalai, P. Report Nov 1, 2020 4924
Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles. Amir, Nur Afiqah Suzelan; Malip, Amizah; Othman, Wan Ainun Mior Report Nov 1, 2020 9800
Majority of Pinoys prefer digital IDs - survey. Oct 28, 2020 747
Working from home: How to manage data protection risk. Oct 7, 2020 619
DOF orders GFIs and agencies to boost cybersecurity capability. Oct 7, 2020 511
Network Security: How to Create a Secure WiFi Network. Oct 1, 2020 1183
Optimization of 3D Triangular Mesh Watermarking Using ACO-Weber's Law. Narendra, Modigarl; Valarmathi, M.L.; Anbarasi, L. Jani Report Oct 1, 2020 5525
CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud. Hwang, Yong-Woon; Lee, Im-Yeong Report Oct 1, 2020 8373
B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis. Hostiadi, Dandy Pramana; Wibisono, Waskitho; Ahmad, Tohari Report Oct 1, 2020 8690
Searchable Encrypted String for Query Support on Different Encrypted Data Types. Azizi, Shahrzad; Mohammadpur, Davud Report Oct 1, 2020 6010
USING CYBERSECURITY FAILURES TO CRITIQUE THE SEC'S APPROACH TO CRYPTO REGULATION. Goforth, Carol R. Sep 22, 2020 20333
SPOILING FOR A FIGHT: HACKING BACK WITH THE ACTIVE CYBER DEFENSE CERTAINTY ACT. Porch, Alice M. Sep 22, 2020 10339
A JOP GADGET DISCOVERY AND ANALYSIS TOOL. Brizendine, Bramwell; Stroschein, Josh Sep 22, 2020 6403
ALERT PRIORITIZATION AND STRENGTHENING: TOWARDS AN INDUSTRY STANDARD PRIORITY SCORING SYSTEM FOR IDS ANALYSTS USING OPEN SOURCE TOOLS AND MODELS OF MACHINE LEARNING. Dangi, Bikram; Gamet, Jeremy; Kulm, Arica; Nelson, Tj; O'Brien, Austin; Pauli, Wayne E. Sep 22, 2020 6662
IDENTIFYING A PSYCHOMETRIC PROFILE FOR VULNERABILITY ASSESSMENT PROFESSIONALS: TALENT IDENTIFICATION TO SUPPORT CAREER ASSESSMENT. Crosby, Martha; Ikehara, Curtis; Neidert, Gregory P.M.; Zantua, Morgan A. Sep 22, 2020 3597
Teachers and Students, Protect your Digital Life by Following these Tips. Sep 20, 2020 599
Parent consent needed to record online classes. Sep 16, 2020 708
Stymie hackers with these 6 steps. Patrick, Byron Sep 1, 2020 1223
Policy-Based Composition and Embedding of Extended Virtual Networks and SFCs for IIoT. Mandarawi, Waseem; Rottmeier, Jurgen; Rezaeighale, Milad; de Meer, Hermann Report Sep 1, 2020 10941
A Heterogeneous IoT Node Authentication Scheme Based on Hybrid Blockchain and Trust Value. Zhang, Shiqiang; Cao, Yang; Ning, Zhenhu; Xue, Fei; Cao, Dongzhi; Yang, Yongli Sep 1, 2020 9817
A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge. Nirmala, E.; Muthurajkumar, S. Sep 1, 2020 6491
Information Security and Knowledge Sharing: A Blockchain Perspective. Huang, Kai-Ping Report Sep 1, 2020 5561
Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks. Liu, Xueyan; Luo, Yukun; Yang, Xiaotao Report Aug 31, 2020 7793
Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN). Ullah, Zahid; Zeb, Asim; Ullah, Insaf; Awan, Khalid Mahmood; Saeed, Yousaf; Uddin, M. Irfan; Khasawn Report Aug 31, 2020 9180
A Tool-Based Perspective on Software Code Maintainability Metrics: A Systematic Literature Review. Ardito, Luca; Coppola, Riccardo; Barbato, Luca; Verga, Diego Report Aug 31, 2020 18330
Modified Decision Tree Technique for Ransomware Detection at Runtime through API Calls. Ullah, Faizan; Javaid, Qaisar; Salam, Abdu; Ahmad, Masood; Sarwar, Nadeem; Shah, Dilawar; Abrar, Muh Report Aug 31, 2020 6068
Analysis of Digital Image Watermarking Techniques through Hybrid Methods. Begum, Mahbuba; Uddin, Mohammad Shorif Aug 31, 2020 7341
TikTok Strengthens its Commitment to Safer Online Self-Expression. Aug 31, 2020 744
Bridging the Cybersecurity Skills Gap Through Artificial Intelligence. Aug 26, 2020 604
Protecting your home network from iOS 14's Private Address feature. Feria, Rom Aug 19, 2020 602
How to Avoid the Ransomware Onslaught. Kitchen, David E.; Valach, Anthony P. Aug 1, 2020 1776
A Dual Privacy Preserving Algorithm in Spatial Crowdsourcing. Wang, Shengxiang; Jia, Xiaofan; Sang, Qianqian Report Jul 31, 2020 3871
Power Allocation for Reducing PAPR of Artificial-Noise-Aided Secure Communication System. Hong, Tao; Zhang, Geng-xin Report Jul 31, 2020 8898
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption. Khan, Muhammad Asghar; Ullah, Insaf; Nisar, Shibli; Noor, Fazal; Qureshi, Ijaz Mansoor; Khanzada, Fa Report Jul 31, 2020 9437
Flow Chart Generation-Based Source Code Similarity Detection Using Process Mining. Zhang, Feng; Li, Lulu; Liu, Cong; Zeng, Qingtian Report Jul 31, 2020 8930
QuPiD Attack: Machine Learning-Based Privacy Quantification Mechanism for PIR Protocols in Health-Related Web Search. Khan, Rafiullah; Ahmad, Arshad; Alsayed, Alhuseen Omar; Binsawad, Muhammad; Islam, Arshad; Ullah, Mo Report Jul 31, 2020 6801
Three-Dimensional Head-Pose Estimation for Smart Iris Recognition from a Calibrated Camera. Akrout, Belhassen; Fakhfakh, Sana Report Jul 31, 2020 6613
How to make your Google Drive or Microsoft OneDrive private. Feria , Rom Jul 27, 2020 743
A Lightweight Cryptography Algorithm for Secure Smart Cities and IOT. Abed, Ahmed Mohsin; Boyaci, Ali Report Jul 14, 2020 3746
Globe shares tips to keep passwords and accounts secure. Jul 10, 2020 583
WARNING: Use .gov.ph at your own risk. Jul 4, 2020 557
Cybersecurity Resources for a Remote Workforce. Anders, Susan B. Column Jul 1, 2020 1340
Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices. Sassani, Bahman A.; Alkorbi, Mohammed; Jamil, Noreen; Naeem, M. Asif; Mirza, Farhaan Report Jun 30, 2020 5134
Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications. Shen, Limin; Li, Hui; Wang, Hongyi; Wang, Yihuan Report Jun 30, 2020 9509
FaceApp face gender-swapping activity you can't resist. Jun 19, 2020 559
TECHNOLOGY AND BUSINESS CONTINUITY: Organizations must be prepared to leverage technology to enable recovery from the unexpected and unavoidable. Jiles, Loreal; Nathan, Barry Jun 1, 2020 1244
A world without passwords? Patrick, Byron Jun 1, 2020 934
5 Ways to Protect your Data when Working from Home. May 19, 2020 785
COVID-19: How to secure your home network for remote working. Huda Tabrez, Senior News Editor May 18, 2020 1484
A Hybrid Trust-Modeling Approach for IoT Security. Bahtiyar, Serif Report May 2, 2020 7072
Surviving a Pandemic in an Era of Cybercrime. Wertheim, Steven May 1, 2020 1218
DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective. Kim, Jiyeon; Kim, Hyung-Jong May 1, 2020 5706
Data security tips to help weather a pandemic. Yoo, Jamie May 1, 2020 1285
How To Stay Safe Online. Gopal, Deepa; K., Christina Apr 7, 2020 653
Federal Telework During the COVID-19 Pandemic: Cybersecurity Issues in Brief. Report Apr 1, 2020 4458
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing. Su, Xin; Gong, Qingbo; Zheng, Yi; Liu, Xuchong; Li, Kuan-Ching Mar 31, 2020 7517
An Approach Based on Customized Robust Cloaked Region for Geographic Location Information Privacy Protection. Shen, Zhidong; Lu, Siyuan; Huang, Huijuan; Yuan, Meng; Tang, Guoming; Chen, Weiying; Zhang, Taige; Z Technical report Mar 1, 2020 5896
Tips for Fighting Off Cybercrime in 2020. Wertheim, Steven Column Mar 1, 2020 944
BLOCKCHAIN: POST-QUANTUM SECURITY & LEGAL ECONOMICS. Haney, Brian Seamus Mar 1, 2020 15234
Data Privacy and the Financial Services Industry: A Federal Approach to Consumer Protection. Soubouti, Fara Mar 1, 2020 11129
Turn to e-Services for secure access to taxpayer information, key tools. Schreiber, Gerard H., Jr.; Young, Marilyn Jan 1, 2020 1394
CREATING CYBERSECURITY AWARENESS. Brands, Kristine Jan 1, 2020 1053
Cybersecurity of Online Proctoring Systems. Slusky, Ludwig Report Jan 1, 2020 8362
A Survey of Artificial Intelligence Techniques for Cybersecurity Improvement. Alrajhi, Athari M. Jan 1, 2020 3983
Joint Trajectories and Power Allocation Design for Dual UAV-Enabled Secrecy SWIPT Networks. Zhou, Feng; Wang, Rugang; Bian, Jinhong Report Dec 1, 2019 3736
Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs. Pan, Jiaye; Zhuang, Yi; Sun, Binglin Nov 30, 2019 14802
Five ways to strengthen employee cybersecurity awareness. Nov 17, 2019 632
Criminals thrive on data abundance - here's how we'll catch them. Duguin, Stephane Nov 3, 2019 1151
How to Create an Incident Response Plan. Wertheim, Steven Nov 1, 2019 1100
How to protect companies from 3rd party data breaches. Sep 1, 2019 817
Housekeeping tips to mitigate data security risk. Yoo, Jamie Sep 1, 2019 1230
Don't let your guard down when gaming. Aug 7, 2019 558
What solution does DEVCON offer to help efficiently protect against harmful cyber attacks? Louie, Maggie Aug 1, 2019 339
How to Know Where Critical Data Reside. Wertheim, Steven Column Jul 1, 2019 837
A quick look at how you can keep your phone safe from attackers looking to steal your data. Jun 20, 2019 1020
Accounting firm data breaches: One state's records; Find out the most common types of breaches and how to guard against them all. Cheng, Christine; Flasher, Renee; Higgins, James P. Jun 1, 2019 3050
Challenging Outdated Technology. Cherry, Michael; Imwinkelried, Edward J.; Riley, Elven; Epstein, Jules; Switzer, Mark; King, Jack Jun 1, 2019 760
Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices. Liu, Weiwei; Liu, Guangjie; Ji, Xiaopeng; Zhai, Jiangtao; Dai, Yuewei Report Apr 1, 2019 7906
A Cooperative Jamming Based Joint Transceiver Design for Secure Communications in MIMO Interference Channels. Huang, Boyang; Kong, Zhengmin; Fang, Yanjun; Jin, Xin Report Apr 1, 2019 6567
The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle. Zeng, Qian; Zhang, Zhongshan Report Apr 1, 2019 5748
DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network. Chen, Tieming; Mao, Qingyu; Lv, Mingqi; Li, Yinglong Report Apr 1, 2019 6740
The Security DV-Hop Algorithm against Multiple-Wormhole-Node-Link in WSN. Li, Jianpo; Wang, Dong Report Apr 1, 2019 9246
PROTECT YOURSELF FROM ONLINE IDENTITY THEFT. Apr 1, 2019 499
How to Stay Safe on Public WiFi. Apr 1, 2019 426
How To Protect Your Social Security Number From Data Breaches. Mar 25, 2019 974
Future tense. Vieth, Peter Mar 25, 2019 1044
Identity Theft: Protect Your /Medicare account. Mar 22, 2019 354
Costly Crisis Management. Helms, Karla Jo Mar 1, 2019 679
A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model. Lu, Yang; Li, Jiguo Report Mar 1, 2019 10509
Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service. Chen, Liqing; Li, Jiguo; Zhang, Yichen Report Mar 1, 2019 11957
Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates. Braeken, A. Report Mar 1, 2019 9107
A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service. Kim, Heeyoul Report Mar 1, 2019 6049
Advanced insider threat detection model to apply periodic work atmosphere. Oh, Junhyoung; Kim, Tae Ho; Lee, Kyung Ho Report Mar 1, 2019 5510
A Secured and Energy Efficient Wireless Sensor Networks (WSN) Utilizing CRT-Based Forwarding Technique. Raji, Kamaldeen Ayodele; Gbolagade, Kazeem Alagbe Report Mar 1, 2019 5676
Kaspersky Lab: Sing Your Way to Security: Unique, Memorable Passwords Stronger Than Constant Change. Feb 5, 2019 769
A Relay-assisted Secure Handover Mechanism for High-speed Trains. Zhao, Yue; Tian, Bo; Chen, Zhouguo; Yang, Jin; Li, Saifei Report Feb 1, 2019 6364
Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor. Ali, Zahid; Park, Unsang Report Feb 1, 2019 9289
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography. Qiu, Shuming; Xu, Guosheng; Ahmad, Haseeb; Xu, Guoai; Qiu, Xinping; Xu, Hong Report Feb 1, 2019 11720
Lattice-based Threshold Ring Signature with Message Block Sharing. Chen, Jiangshan; Hu, Yupu; Gao, Wen; Liang, Hongmei Report Feb 1, 2019 8129
Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy. Shiu, Chih-Wei; Chen, Yu-Chi; Hong, Wien Report Feb 1, 2019 7028
Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing. Zha, Jiningo; Xu, Chunxiang; Chen, Kefei Report Feb 1, 2019 11288
Image Encryption with The Cross Diffusion of Two Chaotic Maps. Jiao, Ge; Peng, Xiaojiang; Duan, Kaiwen Report Feb 1, 2019 5512
Robust Image Watermarking via Perceptual Structural Regularity-based JND Model. Wang, Chunxing; Xu, Meiling; Wan, Wenbo; Wang, Jian; Meng, Lili; Li, Jing; Sun, Jiande Report Feb 1, 2019 7842
Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code. Han, Mu; Wang, Yunwen; Ma, Shidian; Wan, Ailan; Liu, Shuai Report Feb 1, 2019 8884
CoMP Transmission for Safeguarding Dense Heterogeneous Networks with Imperfect CSI. Yunjia, Xu; Kaizhi, Huang; Xin, Hu; Yi, Zou; Yajun, Chen; Wenyu, Jiang Report Jan 1, 2019 8414
Agent Based Information Security Framework for Hybrid Cloud Computing. Tariq, Muhammad Imran Report Jan 1, 2019 10931
Optimization-based Image Watermarking Algorithm Using a Maximum-Likelihood Decoding Scheme in the Complex Wavelet Domain. Liu, Jinhua; Rao, Yunbo Report Jan 1, 2019 7336
Improvement of Mitigation Techniques against SYN Flood Attack for Free and Open Source Firewalls. Kapis, Kosmas; Nico Kyando, Davis Jan 1, 2019 7359
A Behaviour Profiling Based Technique for Network Access Control Systems. Muhammad, Musa Abubakar; Ayesh, Aladdin Jan 1, 2019 5090
A FACE RECOGNITION AND GRAPHICAL PASSWORD BASED HYBRID TECHNIQUE OF INFORMATION SECURITY. Dec 31, 2018 3106
Experts warn of cyber attacks on smart cities and buildings. Dec 19, 2018 393
Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing. Lin, Te-Yuan; Fuh, Chiou-Shann Report Dec 1, 2018 5176
Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs. Zhou, Weiwei; Yu, Bin Report Dec 1, 2018 9607
Private Blockchain-Based Secure Access Control for Smart Home Systems. Xue, Jingting; Xu, Chunxiang; Zhang, Yuan Report Dec 1, 2018 9431
CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks. Yang, Chao; Guo, Yunfei; Hu, Hongchao; Liu, Wenyan Report Dec 1, 2018 10733
A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking. Zhu, Yi; Kang, Haohao; Huang, Ruhui Report Dec 1, 2018 6668
Medical Image Watermarking Based on Visual Secret Sharing and Cellular Automata Transform for Copyright Protection. Fan, Tzuo-Yau; Chao, Her-Chang; Chieu, Bin-Chang Report Dec 1, 2018 9725
Security based Partner Selection in Inter-Organizational Workflow Systems. Kandoussi, Asmaa El; Elbakkali, Hanan Report Dec 1, 2018 6704
State of the Art Intrusion Detection System for Cloud Computing. Ahmad, Azuan; Zainudin, Wan Shafiuddin; Kama, Mohd Nazri; Idris, Norbik Bashah; Saudi, Madihah Mohd; Report Dec 1, 2018 11606
Modified Multi-Level Steganography to Enhance Data Security. Elshare, Shadi; El-Emam, Nameer N. Report Dec 1, 2018 10417
Mobility of Internet of Things and Fog Computing: Concerns and Future Directions. Ahanger, Tariq Ahamed; Tariq, Usman; Nusir, Muneer Report Dec 1, 2018 3830

Terms of use | Privacy policy | Copyright © 2022 Farlex, Inc. | Feedback | For webmasters |