Previous Issue (Vol. 6, No. 4), 2017
Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on TransitionAuthor/s: A.O Isah, J.K Alhassan, S.S Olanrewaju, Enesi Femi Aminu Pages: 162-178 / DOI: http://dx.doi.org/10.17781/P002303 |
||
Deception in Web Application Honeypots: Case of GlastopfAuthor/s: Banyatsang Mphago, Dimane Mpoeleng, Shedden Masupe Pages: 179-185 / DOI: http://dx.doi.org/10.17781/P002304 |
||
Forensic Investigation Technique on Android’s Blackberry Messenger using NIST FrameworkAuthor/s: Imam Riadi, Sunardi, Arizona Firdonsyah Pages: 198-205 / DOI: http://dx.doi.org/10.17781/P002306 |