Search Word(s) in Title, Keywords, Authors, and Abstract: Network Security

Audio Data Hiding Based on Sample Value Modification Using Modulus Function
Mohammed Hatem Ali Al-Hooti, Supeno Djanali and Tohari Ahmad
Page: 525~537, Vol. 12, No.3, 2016
10.3745/JIPS.03.0054

Keywords: Audio, Data Hiding, Modulus Function, Information Security, Network Security
Show / Hide Abstract

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Aly M. El-Semary and Mostafa Gadal-Haqq M. Mostafa
Page: 481~500, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.481
Keywords: Data-Mining, Fuzzy Logic, IDS, Intelligent Techniques, Network Security, Software Agents
Show / Hide Abstract

Data-Hiding Method using Digital Watermark in the Public Multimedia Network
Jung-Hee Seo and Hung-Bog Park
Page: 82~87, Vol. 2, No.2, 2006
None
Keywords: Digital Watermark, Scalable, Wavelet, Public Multimedia Network
Show / Hide Abstract