A Framework for Ethical Decision Making Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about A Framework for Ethical Decision Making
Disk Devices and Partitions Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Disk Devices and Partitions
Black hole attack in mobile Ad Hoc networks Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Black hole attack in mobile Ad Hoc networks
Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks
A hierarchical secure routing protocol against black hole attacks in sensor networks Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about A hierarchical secure routing protocol against black hole attacks in sensor networks
Information security management handbook Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Information security management handbook
Routing Attacks in Wireless Sensor Networks: A Survey Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about Routing Attacks in Wireless Sensor Networks: A Survey
A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems Submitted by rest1 on Mon, 01/12/2026 - 09:30 Read more about A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems