60 results on '"Memon, Nasir"'
Search Results
2. What’s in This Book and Why?
3. A Framework for Analysis Attackers’ Accounts
4. Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication
5. X-Platform Phishing: Abusing Trust for Targeted Attacks Short Paper
6. Verification Code Forwarding Attack (Short Paper)
7. Glass OTP: Secure and Convenient User Authentication on Google Glass
8. Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass
9. Leap Motion Controller for Authentication via Hand Geometry and Gestures
10. Touchpad Input for Continuous Biometric Authentication
11. Selective Robust Image Encryption for Social Networks
12. A Lightweight Combinatorial Approach for Inferring the Ground Truth from Multiple Annotators
13. Mining Groups of Common Interest: Discovering Topical Communities with Network Flows
14. Secure Sketches for Protecting Biometric Templates
15. ACE-Cost: Acquisition Cost Efficient Classifier by Hybrid Decision Tree with Local SVM Leaves
16. NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring
17. Multimedia Analysis for Content Identification
18. Security Models of Digital Watermarking
19. Identifying Digital Cameras Using CFA Interpolation
20. Network Monitoring for Security and Forensics
21. Secure Sketch for Biometric Templates
22. Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography
23. Integrating Digital Forensics in Network Infrastructures
24. Image Steganalysis
25. String Matching on the Internet
26. Multimedia Forensics
27. Image Steganography and Steganalysis: Concepts and Practice
28. Design of a Laboratory for Information Security Education
29. ForNet: A Distributed Forensics Network
30. Random permutations from logarithmic signatures
31. Properties of Cryptosystem PGM
32. Photo Forensics – There Is More to a Picture than Meets the Eye
33. Multimedia Forensics.
34. Video Frame Deletion and Duplication
35. Adversarial Examples in Image Forensics
36. Image Provenance Analysis
37. Physical Integrity
38. Anti-Forensic Attacks Using Generative Adversarial Networks
39. Integrity Verification Through File Container Analysis
40. Source Camera Model Identification
41. DeepFake Detection
42. Power Signature for Multimedia Forensics
43. GAN Fingerprints in Face Image Synthesis
44. Data-Driven Digital Integrity Verification
45. Computational Imaging
46. Source Camera Attribution from Videos
47. Sensor Fingerprints: Camera Identification and Beyond
48. Media Forensics in the Age of Disinformation
49. Courtroom Considerations in Digital Image Forensics
50. Counter-Forensics: Attacking Image Forensics
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.