Issue | Title | |
Vol 1, No 1 | A simple realization of the computer virus | Abstract PDF |
Qinghong Liang, Shangying Cao, Zhengan Qi | ||
Vol 1, No 1 | Analysis of Network Security in Daily Life | Abstract PDF |
Jinliang Shen, Shiming Gong, Wencong Bao | ||
Vol 1, No 1 | Analysis on Network Security and Its Countermeasures | Abstract PDF |
Qinghua Jiang, Lilin Lin, Yanhong He | ||
Vol 1, No 1 | Computer Network Attack and Defense Technology | Abstract PDF |
Xinyue Yang, Shujun Zhou, Guanghui Ren, Yaling Liu | ||
Vol 1, No 1 | Facial Authentication as A Possible Solution to the Challenges in User’s Security and Privacy in Web Applications | Abstract PDF PDF |
Francisco D. Guillén-Gámez1, Iván García-Magariño2,3 | ||
Vol 1, No 1 | Hiding image into another meaningful images using Richardson-Lucy algorithm with data authentication | Abstract PDF PDF |
Ali Sheidaee, Leyli Mohammad Khanli | ||
Vol 1, No 1 | Multi-Agent System for an Image Steganalysis | Abstract PDF |
Akram Boukhamla | ||
Vol 1, No 1 | Quantitative Methods for IT Risk Management - A Roadmap | Abstract PDF |
Volker Frehe1, Dominik Kopp2, Frank Teuteberg2 | ||
Vol 1, No 1 | Research on Data Encryption Technology | Abstract PDF |
Hongjiang Duan, Weilong Huang, Guangxu Zhu | ||
Vol 1, No 1 | The method of false vortices in designation problems of targets, road signs, facial features and real vortices in space images | Abstract PDF |
Evgeni Nikolaevich Terentiev1, I. García-Magariño2, N. E. Shilin-Terentyev3, I. N. Prikhodko1, I. I. Farshakova1 | ||
1 - 10 of 10 Items |