| Article Title | 
				    View  | 
				    Download | 
				  
				  
				    | Toward a New Cloud-Based Approach to preserve the Privacy for Detecting Suspicious Cases of Money Laundering | 
				    View | 
				    Download | 
				  
                  
				    | State-of-The-Art in Block based Copy Move Forgery Detection | 
				    View | 
				    Download | 
				  
                  
				    | Conception of Ontology for Security in Health Care Systems | 
				    View | 
				    Download | 
				  
                  
				    | User Online Information Security Practices: The South African Context | 
				    View | 
				    Download | 
				  
                  
				    | Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications | 
				    View | 
				    Download | 
				  
                  
				    | Securing Image Data's Using Cellular Automata Techniques | 
				    View | 
				    Download | 
				  
                  
				    | Sanskrit Character Recognition with Improved feed forward BPNN and LSB Matching Patterns | 
				    View | 
				    Download | 
				  
                  
				    | Identification of Suspicious Region in Secured Stegno-Mammograms with Two Dimensional Wavelets and Genetic Operators | 
				    View | 
				    Download | 
				  
                  
				    | Internet Worm Detection based on Traffic Behavior Monitoring with Improved C4.5 | 
				    View | 
				    Download | 
				  
                  
				    | Detection of Replica Node Attack Based on Hybrid Artificial Immune System Technique | 
				    View | 
				    Download | 
				  
                  
				    | Secure Data Transmission through Trusted Node in Mantes using AODV Routing Algorithm: SATEM | 
				    View | 
				    Download |