All Stories

  1. Proactive SIEM-Based Framework for Cyberattack Monitoring and Classification
  2. Detect and Mitigate Cyberattacks Using SIEM
  3. A Survey on Network Security Monitoring: Tools and Functionalities
  4. Image steganography using exploiting modification direction for compressed encrypted data
  5. Video Steganography Using Knight Tour Algorithm and LSB Method for Encrypted Data
  6. Image steganography by using exploiting modification direction and knight tour algorithm
  7. Content-based image retrieval using PSO and k-means clustering algorithm