-
1
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
Published 2009“…LJS Publisher and IJCSIS Press …”
Get full text
Article -
2
Novel framework for hidden data in the image page within executable file using computation between advanced encryption standard and distortion techniques
Published 2009“…LJS Publisher and IJCSIS Press …”
Get full text
Article -
3
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms
Published 2010“…LJS Publisher and IJCSIS Press …”
Get full text
Article -
4
Using biometric techniques to secure online student assessment: Comparative study
Published 2011“…LJS Publisher and IJCSIS Press …”
Get full text
Article -
5
Performance counter monitoring mechanism for measuring QoS attributes in SOA.
Published 2010“…LJS Publisher and IJCSIS Press…”
Get full text
Article -
6
An optimized clustering algorithm using genetic algorithm and rough set theory based on kohonen self organizing map
Published 2010“…LJS Publisher and IJCSIS Press…”
Get full text
Article -
7
The uniformization process of the fast congestion notification (FN)
Published 2009“…LJS Publisher and IJCSIS Press …”
Get full text
Article