共 264 条
- [1] Hussain M(2016)The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks Pervasive Mob. Comput. 25 1-25
- [2] Salem Y(2011)A review on multimedia communications cryptography Res. J. Inf. Technol. 3 146-152
- [3] Watari MA(2013)Securing m-government transmission based on symmetric and asymmetric algorithms: A review Asian J. Sci. Res. 8 80-94
- [4] Naji AW(2011)Security improvement of credit card online purchasing system Sci. Res. Essays 6 3357-3370
- [5] Zaidan AA(2011)Spam influence on business and economy: Theoretical and experimental studies for textual anti-spam filtering using mature document processing and naive Bayesian classifier Afr. J. Bus. Manag. 5 596-607
- [6] Raad M(2010)Impact of spam advertisement through e-mail: A study to assess the influence of the anti-spam on the e-mail marketing Afr. J. Bus. Manag. 4 2362-2367
- [7] Zaidan BB(2017)Software and hardware FPGA-based digital watermarking and steganography approaches: Toward new methodology for evaluation and benchmarking using multi-criteria decision-making techniques J. Circ. Syst. Comput. 26 1750116-1392
- [8] Zaidan BB(2017)A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi-criteria analysis based on ‘large-scale data’ Softw. Pract. Exp. 47 1365-294
- [9] Zaidan BB(2018)Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques Measurement 117 277-497
- [10] Naji AW(2009)New approach of hidden data in the portable executable file without change the size of carrier file using distortion techniques Proc. World Acad. Sci. Eng. Technol. (WASET) 56 493-237