Browse Title Index


 
Issue Title
 
Vol 28, No 3: December 2022 Securing data using deep hiding selected least significant bit and adaptive swarm algorithm Abstract   PDF
Bashar Izzeddin Issa Aljidi, Sundresan Perumal, Sakinah Ali Pitchay
 
Vol 11, No 4: April 2013 Securing Personal Health Records in the Cloud by Enforcing Sticky Policies Abstract   PDF
Chunxia Leng, Huiqun Yu, Jingming Wang, Jianhua Huang
 
Vol 13, No 1: January 2019 Securing SAAS service under cloud computing based multi-tenancy systems Abstract   PDF
Trinathbasu Miriyala, JKR Sastry
 
Vol 22, No 1: April 2021 Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device Abstract   PDF
Seniman Seniman, Baihaqi Siregar, Rani Masyithah Pelle, Fahmi Fahmi
 
Vol 18, No 2: May 2020 Securing speech signals by watermarking binary images in the wavelet domain Abstract   PDF
Rakan Saadallah Rashid, Jafar Ramadhan Mohammed
 
Vol 26, No 2: May 2022 Security approach for instant messaging applications: viber as a case study Abstract   PDF
Mohammed Falih Kadhim, Adel Al-Janabi, Ahmed Hazim Alhilali, Nabeel Salih Ali
 
Vol 16, No 2: November 2019 Security assessment of four open source software systems Abstract   PDF
Faraz Idris Khan, Yasir Javed, Mamdouh Alenezi
 
Vol 11, No 1: July 2018 Security Authentication for Student Cards’ Biometric Recognition Using Viola-Jones Algorithm Abstract   PDF
S. Ibrahim, K.R. Jamaluddin, K.A.F.A. Samah
 
Vol 39, No 3: September 2025 Security challenges and strategies for CNN-based intrusion detection model for IoT networks Abstract   PDF
Wan Fariza Wan Abdul Rahman, Nurul Taqiah Ab Aziz
 
Vol 33, No 2: February 2024 Security enhancement of cyber-physical system using modified encryption AESGNRSA technique Abstract   PDF
Kundankumar Rameshwar Saraf, P. Malathi
 
Vol 12, No 6: June 2014 Security Evaluation for RFID System: Security Evaluation Index Architecture and Evaluation Model Abstract   PDF
Hengfeng Luo, Ruiqi Liu, Yingkai Wang, Jinghao Chen
 
Vol 15, No 2: August 2015 Security for Mobile Agents: Trust Estimate for Platforms Abstract   PDF
Razouki Hassan, Hair Abdellatif
 
Vol 6, No 2: May 2017 Security for Virtualization in Cloud Services using Duplication Method Abstract   PDF
N.L. Udaya Kumar, M. Siddappa
 
Vol 15, No 3: September 2015 Security in Wireless sensor network: Approaches and Issues Abstract   PDF
Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal, Kashif Naseer Qureshi
 
Vol 12, No 4: April 2014 Security Interaction of Web Services in Heterogeneous Platforms Abstract   PDF
Tao Xu, Xin Hu, Jiwen Xie, Shujuan Sun
 
7486 - 7500 of 8918 Items << < 495 496 497 498 499 500 501 502 503 504 > >>