- Botnet detection based on DNS traffic similarity
- Fingerprinting violating machines with in-memory protocol artefacts
- Enhancement of 3D-Playfair algorithm using dual key
- A knowledgebase insider threat mitigation model in the cloud: a proactive approach
- Digital video forensics: a comprehensive survey
No comments:
Post a Comment