ITHEA Classification Structure > D. Software > D.4 OPERATING SYSTEMS > D.4.6 Security and Protection
ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ...
By: Dimitrina Polimirova, Eugene Nickolov (3544 reads)
Rating:
(1.00/10)
article:
IMPROVING OF EXISTING PERMISSION SYSTEM IN ANDROID OS
· PASSIVE STEGANALYSIS OF MULTIDOMAIN EMBEDDING METHODS
· CORRELATION-BASED PASSWORD GENERATION FROM FINGERPRINTS
· КОСВЕННАЯ СТЕГАНОГРАФИЯ
· ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ENVIRONMENT
· INVESTIGATION ON COMPRESSION METHODS USED AS A PROTECTION INSTRUMENT ...
· ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ...
· ANALYSIS OF INFORMATION SECURITY OF OBJECTS UNDER ATTACKS
· CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES ...
· INVESTIGATING THE RELATIONS OF ATTACKS, METHODS AND OBJECTS ...
· RESEARCH OF THE INFLUENCE OF METHODS OF COMPRESSION ON ...
· VERIFICATION AND APPLICATION OF CONCEPTUAL MODEL AND SECURITY ...
· APPLICATION OF METHODS OF MULTI-CRITERIA EVALUATION IN CHOOSING A METHOD ...
· THREAT MODEL FOR USER SECURITY IN E-LEARNING SYSTEMS
· EXAMINATION OF PASSWORDS’ INFLUATION ON THE COMPRESSING PROCESS ...
·
|
Login World Clock |