1 | -- | 28 | Manisha Duevedi, Sunil Kumar Muttoo. An Improved Separable and Reversible Steganography in Encrypted Grayscale Images |
29 | -- | 52 | Shweta Kaushik, Charu Gandhi. Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud |
53 | -- | 67 | Abhishek Bansal, Vinay Kumar. Steganography Technique Inspired by Rook |
68 | -- | 86 | Sowmyarani C. N., Veena Gadad, Dayananda P.. (p+, α, t)-Anonymity Technique Against Privacy Attacks |
87 | -- | 112 | Randhir Kumar, Rakesh Tripathi. Data Provenance and Access Control Rules for Ownership Transfer Using Blockchain |
113 | -- | 130 | V. Sandeep, Saravanan Kondappan, A. Amir Anton Jone, S. Raj Barath. Anomaly Intrusion Detection Using SVM and C4.5 Classification With an Improved Particle Swarm Optimization (I-PSO) |
131 | -- | 144 | Redha Taguelmimt, Rachid Beghdad. DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors |
145 | -- | 180 | Yasmine Labiod, Abdelaziz Amara Korba, Nacira Ghoualmi-zine. Detecting DDoS Attacks in IoT Environment |
181 | -- | 195 | Hossain Shahriar, Hisham M. Haddad, Maryam Farhadi. Assessing HIPAA Compliance of Open Source Electronic Health Record Applications |
196 | -- | 216 | Suhas Bhagate, Prakash Jayanth Kulkarni. Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization |