Routing Attacks in Wireless Sensor Networks: A Survey Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Routing Attacks in Wireless Sensor Networks: A Survey
A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems
Security Engineering: A Guide to Building Dependable Distributed Systems Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Security Engineering: A Guide to Building Dependable Distributed Systems
Automated Computer Forensics Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Automated Computer Forensics
African Union Convention on Cyber Security and Personal Data Protection Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about African Union Convention on Cyber Security and Personal Data Protection
IP Address Authentication - Frequently Asked Questions Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about IP Address Authentication - Frequently Asked Questions
A Survey of Artificial Immune System Based Intrusion Detection Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about A Survey of Artificial Immune System Based Intrusion Detection
Enhanced personal firewall for dynamic computing environments Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Enhanced personal firewall for dynamic computing environments