To search, Click below search items.
All Published Papers Search Service
Title
Identification Security at Unauthorized Use of Information System
Author
Navpreet Kaur and Dhawaleswar Rao,
Vol. 16 No. 1 pp. 72-76
Keywords
Network Security, Honeypots, Firewall, Intrusion analysis, Attacks.
A Novel CT Scan Images Watermarking Scheme in DWT Transform Coefficients
Muath AlShaikh, Lamri Laouamer, Laurent Nana, Anca Pascu
Vol. 16 No. 1 pp. 62-71
Wavelets, Watermarking, Robustness, Attacks, Medical Images.
Measurement of Course Learning Outcomes for Data Structure Using the Combination Approach
Loay Alzubaidi
Vol. 16 No. 1 pp. 57-61
ABET, Data Structures, Assessment tool, Course Learning Outcomes, Faculty Course Assessment Report, Key Performance Indicators, Program Learning Outcomes.
Secure Hybrid DFCMT scheme for Dynamic Routing in Wireless Sensor Networks
Ram Pradheep Manohar and E Baburaj
Vol. 16 No. 1 pp. 51-56
Security, WSN Security, resource constrained device, RC4, Encryption