Hash Based Least Significant Bit Technique for Video Steganography(HLSB)
Credit Card Fraud Detection Based on Ontology Graph
The relationship between organizational space of offices and corporate identity (case study general offices in azerbaijan)
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
A novel secure image steganography method based on chaos theory in spatial domain
Security system with face recognition, sms alert and embedded network video monitoring terminal
Malicious pdf document detection based on feature extraction and entropy
Error performance of jpeg and watermark
The conceptual idea of online social media
Performance Evaluation of Message Security Using Fractal Sieve with MMD
Analysis and improvement of pairing free certificate-less two-party authenticated key agreement protocol for grid computing
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense Mobile Ad Hoc Networks
AN EVALUATION OF ENERGY EFFICIENT SOURCE AUTHENTICATION METHODS FOR FALSE DATA FILTERING IN WSN
MANAGING THE INTERTWINING AMONG USERS, ROLES, PERMISSIONS, AND USER RELATIONSHIPS IN AN INFORMATION FLOW CONTROL MODEL
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA CHAOTIC RULES BEHAVIOR
A novel multifactor authentication system ensuring usability and security
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
IJSPTM 010602
Towards Pervasive Computing Environments With Cloud Services
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Networks Using Trigger Identification Service