|
|
|
Journal of Information
Security Research |
|
Current Issue
|
|
|
Volume: 5 , Issue: 4
(December 2014) |
|
A Multi-Stage Framework of Textual Criminal Cases Categorization: Criminal and Legal Elements Approach -
Sotarat Thammaboosadee
Page: 119-126
Abstract
| Full Text (PDF,
61KB)
|
A Digital Watermarking Approach Based on DCT Domain Combining QR Code and Chaotic Theory -
Qingbo Kang, Ke Li, Jichun Yang
Page: 127-137
Abstract
| Full Text (PDF,
846KB)
|
From K-Anonymity to Differential Privacy Back to K-Anonymity!-
Ddeel ANJUM, Guillame Raschia, Marc Gelgon
Page: 138-144
Abstract
| Full Text (PDF,
79KB)
|
Book Review |
Graph Mining Laws, Tools and Case Studies, Deepayan Chakrabarti and Christos Faloutsos, Morgan & Claypool Publishers, 2014 ISBN: 9781608451159 |
Conference
Notification |
• Sixth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2015)
• Fifth International Conference on Innovative Computing Technology (INTECH 2015)
• Fourth International Conference on Future Generation Communication Technologies (FGCT 2015)
|
|
|
|