A Framework for Security Components Anomalies Severity Evaluation and Classification
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOMETRIC RECOGNITION SYSTEM
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
Ijnsa050209
Self protection mechanism for wireless sensor networks
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A novel (k,n) secret sharing scheme from
Selective jamming attack prevention based on packet hiding methods and wormholes
Analysis of rsa algorithm using gpu
Analysis and comparison of symmetric key
Privacy protection for role based access control in service oriented architecture
Role of integrated virtual e learning system for distance learning students
The impact of management information systems(mis) technologies on the quality of services provided at the university of tabuk
Attack graph based risk assessment and optimisation approach
A new hybrid algorithm for business intelligence recommender system
A novel paradigm in authentication system
Design and implementation of hierarchical visual
A survey of trends in massive ddos attacks and cloud based mitigations
Survey of manet misbehaviour detection approaches
An iac approach for detecting profile cloning