Comparative analysis of classification algorithms for email spam detection
Shafi’i Muhammad Abdulhamid,
Maryam Shuaib,
Oluwafemi Osho,
Idris Ismaila,
John K. Alhassan
The method of hidden terminal transmission of network attack signatures
Igor Ruban,
Nataliia Lukova-Chuiko,
Vadym Mukhin,
Yaroslav Kornaga,
Igor Grishko,
Anton Smirnov
Security evaluation of cellular networks handover techniques
Vincent Omollo Nyangaresi,
Silvance O. Abeka,
Anthony Rodgrigues
Performance comparison of steganography techniques
Rinku Sharma,
Reema Ganotra,
Sangeeta Dhall,
Shailender Gupta