- Botnet detection based on DNS traffic similarity
- Fingerprinting violating machines with in-memory protocol artefacts
- Enhancement of 3D-Playfair algorithm using dual key
- A knowledgebase insider threat mitigation model in the cloud: a proactive approach
- Digital video forensics: a comprehensive survey
No comments:
Post a Comment
Note: only a member of this blog may post a comment.