Current Issue (Vol. 5, No. 4), 2017
Method for Detecting a Malicious Domain by using only Well-known InformationPages: 166-174 / DOI: http://dx.doi.org/10.17781/P002212 |
||
Digital Forensic Analysis of Ubuntu File SystemPages: 175-186 / DOI: http://dx.doi.org/10.17781/P002213 |
||
A Preferential Analysis of Existing Password Managers from End-Users' View PointPages: 187-196 / DOI: http://dx.doi.org/10.17781/P002216 |
||
Intrusion Detection System with Spectrum Quantification AnalysisPages: 197-207 / DOI: http://dx.doi.org/10.17781/P002219 |
||
The Unwitting Danger Within - Detection, Investigation and Mitigation of a Compromised NetworkPages: 208-222 / DOI: http://dx.doi.org/10.17781/P002222 |