Found: 8
Select item for more details and to access through your institution.
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code.
- Published in:
- ISeCure, 2022, v. 14, n. 2, p. 147, doi. 10.22042/ISECURE.2022.284952.670
- By:
- Publication type:
- Article
Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS.
- Published in:
- ISeCure, 2022, v. 14, n. 2, p. 193, doi. 10.22042/ISECURE.2022.266258.602
- By:
- Publication type:
- Article
Ransomware Detection Based on PE Header Using Convolutional Neural Networks.
- Published in:
- ISeCure, 2022, v. 14, n. 2, p. 181, doi. 10.22042/ISECURE.2021.262846.595
- By:
- Publication type:
- Article
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm.
- Published in:
- ISeCure, 2022, v. 14, n. 2, p. 167, doi. 10.22042/ISECURE.2022.274305.641
- By:
- Publication type:
- Article
Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols.
- Published in:
- ISeCure, 2022, v. 14, n. 2, p. 157, doi. 10.22042/ISECURE.2022.275064.645
- By:
- Publication type:
- Article
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network.
- Published in:
- ISeCure, 2022, v. 14, n. 2, p. 215, doi. 10.22042/ISECURE.2022.243102.568
- By:
- Publication type:
- Article
Bypassing Web Application Firewalls Using Deep Reinforcement Learning.
- Published in:
- ISeCure, 2022, v. 14, n. 2, p. 131, doi. 10.22042/ISECURE.2022.323140.744
- By:
- Publication type:
- Article
A Graph-based Online Feature Selection to Improve Detection of New Attacks.
- Published in:
- ISeCure, 2022, v. 14, n. 2, p. 115, doi. 10.22042/ISECURE.2022.262485.590
- By:
- Publication type:
- Article