Computers and Networks
Security
ID |
Title |
Author |
Country |
Using genetic
algorithms to break a simple transposition cipher. |
A. S. Al-khalid, S. S. Omran, dalal. A. Hammood |
Iraq |
|
Efficient undeniable threshold proxy
signature schem. |
Sattar J Aboud and Sufian Yousef |
UK |
|
Comparison
study between classic-lsb, slsb and dslsb image steganography. |
Mohammed
Abbas Fadhil Al-Husainy |
Jordan |
|
Methods to test web application scanners. |
Fernando Román Muñoz, Luis
Javier García Villalba |
Spain |
|
Evolutions of
evasion techniques against network intrusion detection systems. |
Jorge Maestre
Vidal, Jaime Daniel Mejía Castro, Luis Javier García Villalba |
Spain |
|
Techniques for source camera
identification. |
Ana Lucila Sandoval Orozco, Jocelin
Rosales Corripio, David Manuel Arenas González, Luis Javier
García Villalba, Julio César Hernández Castro |
UK |
|
Taxonomy of
network intrusion detection system based on anomalies. |
Jaime
Daniel Mejía Castro, Jorge Maestre Vidal, Lucila Sandoval Orozco, Luis Javier
García Villalba |
Spain |
|
Derivations of traffic data analysis. |
Alejandra Guadalupe Silva Trujillo, Javier
Portela García-Migue, Luis Javier García Villalba |
Spain |
|
Contextual
adaptation of a security framework. |
Anthony Ijeh,
Ahmad Al Dahoud , Babatunde Ali Alao,Stephen .A. Reames |
Oman |
|
Optimization of davidson model based on
recent rf measurement conducted in uhf/vhf bands. |
Nasir Faruk, Yunusa. A. Adediran, Adeseko
A. Ayeni |
Nigeria |
|
A new
approach for resolving cyber crime in network forensics based on generic
process model. |
Mohammad
Rasmi, Aman Jantan, Hani Al-Mimi |
Malaysia |