1 | -- | 19 | Khundrakpam Johnson Singh, Janggunlun Haokip, Usham Sanjota Chanu. A Novel Approach to Develop and Deploy Preventive Measures for Different Types of DDoS Attacks |
20 | -- | 40 | Rui Silva, Raul Barbosa, Jorge Bernardino. Intrusion Detection Systems for Mitigating SQL Injection Attacks: Review and State-of-Practice |
41 | -- | 61 | Hania Gadouche, Farah Zoubeyr, Abdelkamel Tari. A Valid and Correct-by-Construction Formal Specification of RBAC |
62 | -- | 82 | Dhruti Sharma, Devesh C. Jinwala. Aggregate Searchable Encryption With Result Privacy |
83 | -- | 101 | Giridhar Maji, Sharmistha Mandal, Soumya Sen. Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain |
102 | -- | 115 | Kouraogo Yacouba, Ghizlane Orhanou, Said Elhajji 0001. Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem |
116 | -- | 142 | Shelendra Kumar Jain, Nishtha Kesswani. IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment |