Technology, policy, privacy and freedom

4 years ago 62 Views

Survey of file protection techniques

4 years ago 395 Views

Protection models

4 years ago 1748 Views

Data explosion

4 years ago 156 Views

Data Privacy Introduction

4 years ago 6946 Views

Ransomware

4 years ago 130 Views

Incentive based DDoS defense

4 years ago 53 Views

Cyberspace

4 years ago 1432 Views

Cuckoo search

4 years ago 286 Views

Policies to mitigate cyber risk

4 years ago 197 Views

Master's Thesis

4 years ago 33 Views

Anomaly based PoW Defense

4 years ago 37 Views

Cooperative mitigation DDoS

4 years ago 31 Views

Authentication service security

4 years ago 4569 Views