All Stories

  1. Using Performance Counters in Malware Detection: Data Analysis and Anomaly
  2. Improving the accuracy of camera model identification through Jaya algorithm optimization
  3. An appraisal of Ransomware detection enhancement through GALA-based techniques
  4. Machine Learning Approaches to Ransomware Detection: A Comprehensive Review
  5. Detection and Classification of Eye Diseases using Hybrid Deep Features with Decision Tree Algorithm
  6. Signature verification based on proposed fast hyper deep neural network
  7. Offline Handwritten Signature Identification based on Hybrid Features and Proposed Deep Model
  8. Offline Handwritten Signature Identification based on Hybrid Features and Proposed Deep Model
  9. A Comparative Study among Handwritten Signature Verification Methods Using Machine Learning Techniques
  10. A fuzzy vault development based on iris images
  11. Iris Features Extraction and Recognition based on the Local Binary Pattern Technique
  12. Second-Order Statistical Methods GLCM for Authentication Systems
  13. Distributed Transform Encoder to Improve Diffie-Hellman Protocol for Big Message Security
  14. A Raspberry PI Real-Time Identification System on Face Recognition
  15. Eye Diseases Classification Using Hierarchical MultiLabel Artificial Neural Network
  16. Effect of levels in Dual Tree Complex Wavelet Transform when design Universal image stego-analytic
  17. Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
  18. Multi-Resolution Like Data Transmission Security Using Diffie-Hellman Protocol
  19. Eye Detection using Helmholtz Principle
  20. Comparison between the effects of Aloe vera and chlorhexidine on clinical periodontal parameters
  21. Anti-screenshot Keyboard for Web-Based Application Using Cloaking
  22. A Survey On Human Eye-Gaze Tracking "EGT" System:, A Comparative Study
  23. Automatic Book Scanner
  24. Effect of Successive Convolution Layers to Detect Gender
  25. Pupil detection algorithm based on feature extraction for eye gaze
  26. Multi-spectral Face Recognition System
  27. Formal Language Space Time Block Code for Mobile Network
  28. Designing a smartphone honeypot system using performance counters
  29. A Method For Detect Forgery from Images
  30. Fuzzy gradient based image reconstruction as a means for detection the tampering