1 | -- | 11 | R. Sakthivel, M. Vanitha, Harish M. Kittur. Low power high throughput reconfigurable stream cipher hardware VLSI architectures |
12 | -- | 50 | Suvrojit Das, Debayan Chatterjee, Debidas Ghosh, Narayan C. Debnath. Extracting the system call identifier from within VFS: a kernel stack parsing-based approach |
51 | -- | 62 | P. M. Siva Raja, E. Baburaj. Genetic algorithms based data hiding scheme for digital images with LSBMR |
63 | -- | 92 | Ahmed AlEroud, George Karabatis, Prayank Sharma, Peng He. Context and semantics for detection of cyber attacks |
93 | -- | 107 | Achilleas Tsitroulis, Dimitris Lampoudis, Emmanuel Tsekleves. Exposing WPA2 security protocol vulnerabilities |