Defeating Internet attacks and Spam using "disposable" Mobile IPv6 home addresses
Defeating the Kalka--Teicher--Tsaban linear algebra attack on the Algebraic Eraser
Defense Strategies Against Modern Botnets
Defining a Comprehensive Threat Model for High Performance Computational Clusters
Design and Analysis of a Novel Digital Image Encryption Scheme
Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks
Design and Analysis of the REESSE1+ Public Key Cryptosystem v2.2
Design and Implementation of a High Quality and High Throughput TRNG in FPGA
Design and Implementation of a Secure Web-Based File Exchange Server: Specification Design Document
Design and Performance Analysis of Unified Reconfigurable Data Integrity Unit for Mobile Terminals
Design Method for Constant Power Consumption of Differential Logic Circuits
Design of an Automated Intrusion Detection System incorporating an Alarm
Design of an Efficient Neural Key Distribution Centre
Design of Image Cryptosystem by Simultaneous VQ-Compression and Shuffling of Codebook and Index Matrix
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
Detecting Bots Based on Keylogging Activities
Detecting DNS Tunnels Using Character Frequency Analysis
Detecting Security threats in the Router using Computational Intelligence
Detecting Threat E-mails using Bayesian Approach
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks