Loading…
Face Recognition Using Neural Network : A Review
Kasar, Manisha M., Bhattacharyya, Debnath, Kim, Tai-hoon
Published in International Journal of Security and Its Applications (31.03.2016)
Published in International Journal of Security and Its Applications (31.03.2016)
Get full text
Journal Article
Loading…
A Review and Comparative Analysis of Various Encryption Algorithms
Bhanot, Rajdeep, Hans, Rahul
Published in International Journal of Security and Its Applications (30.04.2015)
Published in International Journal of Security and Its Applications (30.04.2015)
Get full text
Journal Article
Loading…
Security Analysis of Vehicular Ad Hoc Networks (VANETs) : A Comprehensive Study
Chaubey, Nirbhay Kumar
Published in International Journal of Security and Its Applications (31.05.2016)
Published in International Journal of Security and Its Applications (31.05.2016)
Get full text
Journal Article
Loading…
Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
Putera, Andysah, Siahaan, Utama, Rahim, Robbi
Published in International Journal of Security and Its Applications (31.08.2016)
Published in International Journal of Security and Its Applications (31.08.2016)
Get full text
Journal Article
Loading…
International Journal of Security and Its Applications
Year of Publication 2007
Get full text
eJournal
Loading…
Loading…
Loading…
Phishing Attacks and Defenses
Chaudhry, Junaid Ahsenali, Chaudhry, Shafique Ahmad, Rittenhouse, Robert G.
Published in International Journal of Security and Its Applications (01.01.2016)
Published in International Journal of Security and Its Applications (01.01.2016)
Get full text
Journal Article
Loading…
EACO: An Enhanced Ant Colony Optimization Algorithm for Task Scheduling in Cloud Computing
Sharma, Surabhi, Jain, Richa
Published in International Journal of Security and Its Applications (31.12.2019)
Published in International Journal of Security and Its Applications (31.12.2019)
Get full text
Journal Article
Loading…
Does Darker Hide More Knowledge? The Relationship between Machiavellianism and Knowledge Hiding
Pan, Wei, Zhou, Yang, Zhang, Qingpu
Published in International Journal of Security and Its Applications (30.11.2016)
Published in International Journal of Security and Its Applications (30.11.2016)
Get full text
Journal Article
Loading…
Loading…
Mitigation of Wireless Body Area Networks Challenges using Cooperation
Haider, Zeeshan, Jamal, Tauseef, Asam, Muhammad, Butt, Shariq, Ajaz, Aleena
Published in International Journal of Security and Its Applications (31.03.2020)
Published in International Journal of Security and Its Applications (31.03.2020)
Get full text
Journal Article
Loading…
Loading…
Loading…
Coverless Multi-keywords Information Hiding Method Based on Text
Zhou, Zhili, Mu, Yan, Yang, Ching-Nung, Zhao, Ningsheng
Published in International Journal of Security and Its Applications (30.09.2016)
Published in International Journal of Security and Its Applications (30.09.2016)
Get full text
Journal Article
Loading…
Financial Fraud Detection using Bio-Inspired Key Optimization and Machine Learning Technique
Singh, Ajeet, Jain, Anurag
Published in International Journal of Security and Its Applications (31.12.2019)
Published in International Journal of Security and Its Applications (31.12.2019)
Get full text
Journal Article
Loading…
Loading…
A Fingerprint Feature Extraction Algorithm based on Optimal Decision for Text Copy Detection
Wu, Guohua, Zhao, Mengmeng, Han, Lin
Published in International Journal of Security and Its Applications (30.11.2016)
Published in International Journal of Security and Its Applications (30.11.2016)
Get full text
Journal Article
Loading…
A Hybrid Malicious Code Detection Method based on Deep Learning
Li, Yuancheng, Ma, Rong, Jiao, Runhai
Published in International Journal of Security and Its Applications (31.05.2015)
Published in International Journal of Security and Its Applications (31.05.2015)
Get full text
Journal Article
Loading…