Browse Title Index


 
Issue Title
 
Vol 35, No 3: September 2024 Secured web application based on CapsuleNet and OWASP in the cloud Abstract   PDF
Rohith Vallabhaneni, Sanjaikanth E. Vadakkethil Somanathan Pillai, Srinivas A. Vaddadi, Santosh Reddy Addula, Bhuvanesh Ananthan
 
Vol 16, No 2: November 2015 SecureDBaaS Model for Accessing Encrypted Cloud Databases Abstract   PDF
Palle Jagadeeswaraiah, M.R. Pavan Kumar
 
Vol 22, No 3: June 2021 Securing audio transmission based on encoding and steganography Abstract   PDF
Enas Wahab Abood, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Mohammed Abdulridha Hussain, Zaid Alaa Hussien
 
Vol 10, No 2: May 2018 Securing Data Communication for Data Driven Applications Using End to End Encryption Abstract   PDF
Subhi Almohtasib, Alaa H Al-Hamami
 
Vol 28, No 3: December 2022 Securing data using deep hiding selected least significant bit and adaptive swarm algorithm Abstract   PDF
Bashar Izzeddin Issa Aljidi, Sundresan Perumal, Sakinah Ali Pitchay
 
Vol 11, No 4: April 2013 Securing Personal Health Records in the Cloud by Enforcing Sticky Policies Abstract   PDF
Chunxia Leng, Huiqun Yu, Jingming Wang, Jianhua Huang
 
Vol 13, No 1: January 2019 Securing SAAS service under cloud computing based multi-tenancy systems Abstract   PDF
Trinathbasu Miriyala, JKR Sastry
 
Vol 22, No 1: April 2021 Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device Abstract   PDF
Seniman Seniman, Baihaqi Siregar, Rani Masyithah Pelle, Fahmi Fahmi
 
Vol 18, No 2: May 2020 Securing speech signals by watermarking binary images in the wavelet domain Abstract   PDF
Rakan Saadallah Rashid, Jafar Ramadhan Mohammed
 
Vol 26, No 2: May 2022 Security approach for instant messaging applications: viber as a case study Abstract   PDF
Mohammed Falih Kadhim, Adel Al-Janabi, Ahmed Hazim Alhilali, Nabeel Salih Ali
 
Vol 16, No 2: November 2019 Security assessment of four open source software systems Abstract   PDF
Faraz Idris Khan, Yasir Javed, Mamdouh Alenezi
 
Vol 11, No 1: July 2018 Security Authentication for Student Cards’ Biometric Recognition Using Viola-Jones Algorithm Abstract   PDF
S. Ibrahim, K.R. Jamaluddin, K.A.F.A. Samah
 
Vol 39, No 3: September 2025 Security challenges and strategies for CNN-based intrusion detection model for IoT networks Abstract   PDF
Wan Fariza Wan Abdul Rahman, Nurul Taqiah Ab Aziz
 
Vol 33, No 2: February 2024 Security enhancement of cyber-physical system using modified encryption AESGNRSA technique Abstract   PDF
Kundankumar Rameshwar Saraf, P. Malathi
 
Vol 12, No 6: June 2014 Security Evaluation for RFID System: Security Evaluation Index Architecture and Evaluation Model Abstract   PDF
Hengfeng Luo, Ruiqi Liu, Yingkai Wang, Jinghao Chen
 
7621 - 7635 of 9072 Items << < 504 505 506 507 508 509 510 511 512 513 > >>