To search, Click below search items.
All Published Papers Search Service
Title
Enhanced Analysis Method for Suspicious PDF Files
Author
Suleiman J. Khitan, Ali Hadi, Jalal Atoum
Vol. 15 No. 5 pp. 32-38
Keywords
Malware analysis, PDF documents, Malicious PDF, Suspicious PDF, Structure Scan.
Exploiting Omega Networks to Hide Text-in-Text Messages
Ala Hamarsheh
Vol. 15 No. 5 pp. 39-43
Steganography, watermarking, encryption, secret message, cover message, secret key.
Partially Interleaved Modular Karatsuba-Ofman Multiplication
Gokay Saldamli, YoJin Baek, Levent Ertaul
Vol. 15 No. 5 pp. 44-49
Modular multiplication Karatsuba-Ofman multiplication Bipartite reduction.
An Avoid Unwanted Messages from OSN User Wall: Content Based Filtering Approach
Dipali D. Vidhate, Ajay P. Thakare
Vol. 15 No. 5 pp. 50-54
OSN, filtering