×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [unintentional attacks]
1 SECURITY IN MOBILE NETWORKS Bharat Bhargava CERIAS and Computer Sciences Departments Purdue University, W. Lafayette, IN 47907
[email protected]
Supported
216 views
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
[email protected]
221 views
More Secured Steganography Model With High Concealing Capacity by Using Genetic Algorithm, Integer Wavelet Transform and OPAP
220 views
LOBSTER: Large Scale Monitoring of Broadband Internet Infrastructure Evangelos Markatos The LOBSTER Consortium markatos Institute
228 views