A Bespoke Technique for Secret Messaging
Mahimn Pandya,
Hiren Joshi,
Ashish Jani
Social Networking for Botnet Command and Control
Ashutosh Singh,
Annie H. Toderici,
Kevin Ross,
Mark Stamp
Analysis of the SYN Flood DoS Attack
Mitko Bogdanoski,
Tomislav Shuminoski,
Aleksandar Risteski
Fuzzy Membership Function in a Trust Based AODV for MANET
Partha Sarathi Banerjee,
J. Paulchoudhury,
S. R. Bhadra Chaudhuri
Study and Analysis of Text Steganography Tools
Indradip Banerjee,
Souvik Bhattacharyya,
Gautam Sanyal
Textual Manipulation for SQL Injection Attacks
Hussein AlNabulsi,
Izzat Alsmadi,
Mohammad Al-Jarrah