- Exposing WPA2 security protocol vulnerabilities
- Context and semantics for detection of cyber attacks
- Genetic algorithms based data hiding scheme for digital images with LSBMR
- Extracting the system call identifier from within VFS: a kernel stack parsing-based approach
- Low power high throughput reconfigurable stream cipher hardware VLSI architectures
8 May 2015
Free sample articles newly available from Int. Journal of Information and Computer Security
The following sample articles from the International Journal of Information and Computer Security are now available here for free:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment