Found: 5
Select item for more details and to access through your institution.
iPhone Forensics: Recovering Investigative Evidence using Chip-off Method.
- Published in:
- International Journal of Information Security & Privacy, 2016, v. 10, n. 3, p. 10, doi. 10.4018/IJISP.2016070102
- By:
- Publication type:
- Article
Metamorphic malware detection using opcode frequency rate and decision tree.
- Published in:
- International Journal of Information Security & Privacy, 2016, v. 10, n. 3, p. 67, doi. 10.4018/IJISP.2016070105
- By:
- Publication type:
- Article
IPHDBCM: Inspired Pseudo Hybrid DNA Based Cryptographic Mechanism to Prevent Against Collabrative Black Hole Attack in Wireless Ad hoc Networks.
- Published in:
- International Journal of Information Security & Privacy, 2016, v. 10, n. 3, p. 42, doi. 10.4018/IJISP.2016070104
- By:
- Publication type:
- Article
Preventing Identity Disclosure in Social Networks Using Intersected Node.
- Published in:
- International Journal of Information Security & Privacy, 2016, v. 10, n. 3, p. 25, doi. 10.4018/IJISP.2016070103
- By:
- Publication type:
- Article
Threshold Secret Sharing Scheme for Compartmented Access Structures.
- Published in:
- International Journal of Information Security & Privacy, 2016, v. 10, n. 3, p. 1, doi. 10.4018/IJISP.2016070101
- By:
- Publication type:
- Article