|
Issue |
Title |
|
Vol 1, No 1 |
A simple realization of the computer virus |
Abstract
PDF
|
Qinghong Liang, Shangying Cao, Zhengan Qi |
|
Vol 1, No 1 |
Analysis of Network Security in Daily Life |
Abstract
PDF
|
Jinliang Shen, Shiming Gong, Wencong Bao |
|
Vol 1, No 1 |
Analysis on Network Security and Its Countermeasures |
Abstract
PDF
|
Qinghua Jiang, Lilin Lin, Yanhong He |
|
Vol 1, No 1 |
Computer Network Attack and Defense Technology |
Abstract
PDF
|
Xinyue Yang, Shujun Zhou, Guanghui Ren, Yaling Liu |
|
Vol 1, No 1 |
Facial Authentication as A Possible Solution to the Challenges in User’s Security and Privacy in Web Applications |
Abstract
PDF
|
Francisco D. Guillén-Gámez1, Iván García-Magariño2,3 |
|
Vol 1, No 1 |
Hiding image into another meaningful images using Richardson-Lucy algorithm with data authentication |
Abstract
PDF
|
Ali Sheidaee, Leyli Mohammad Khanli |
|
Vol 1, No 1 |
Multi-Agent System for an Image Steganalysis |
Abstract
PDF
|
Akram Boukhamla |
|
Vol 1, No 1 |
Research on Data Encryption Technology |
Abstract
PDF
|
Hongjiang Duan, Weilong Huang, Guangxu Zhu |
|
Vol 1, No 1 |
The method of false vortices in designation problems of targets, road signs, facial features and real vortices in space images |
Abstract
PDF
|
Evgeni Nikolaevich Terentiev1, I. García-Magariño2, N. E. Shilin-Terentyev3, I. N. Prikhodko1, I. I. Farshakova1 |
|
1 - 9 of 9 Items |
|