Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet
DREAM: DiffeRentially privatE smArt Metering
Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network
Dynamic Data Flow Analysis via Virtual Code Integration (aka The SpiderPig case)
Dynamic IDP Signature processing by fast elimination using DFA
Dynamic MDS Matrices for Substantial Cryptographic Strength
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Dynamic Session Key Exchange Method using Two S-Boxes
Dynamic Tardos Traitor Tracing Schemes
Dynamics, robustness and fragility of trust
E-net models for distribution, access and use of resources in security information systems
E-Net Models of a Software System for E-Mail Security
E-Net Models of a Software System for Web Pages Security SECURITY
Early Phishing
Eavesdropping on GSM: state-of-affairs
ECAKP: Encrypt Collect Authenticate Kill Play
Effective Privacy Amplification for Secure Classical Communications
Effective Steganography Detection Based On Data Compression
Effectiveness and detection of denial of service attacks in Tor
Effectiveness of Intrusion Prevention Systems (IPS) in Fast Networks