Now showing items 1-4 of 4

    • Data hiding and detection in Office Open XML (OOXML) documents 

      Raffay, Mohammad Ali (2011-03-01)
      With the rapid development and popularity of information technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. One of the commonly used tactics, called steganography, ...
    • Forensic analysis of unallocated space 

      Lei, Zhenxing (2011-06-01)
      Computer forensics has become an important technology in providing evidence in investigations of computer misuse, attacks against computer systems and more traditional crimes like money laundering and fraud where digital ...
    • Secure and compromise-resilient architecture for advanced metering infrastructure 

      Alfaheid, Khalid (2011-03-01)
      In recent years, the Smart Grid has grown to be the solution for future electrical energy that promises to avoid blackouts as well as to be energy efficient, environmentally and customer-friendly. In Smart Grid, the ...
    • Social-based trustworthy data forwarding in vehicular delay tolerant networks 

      Alganas, Abdulelah (2011-03-01)
      Vehicular ad hoc network (VANET) is an emerging new communication technol-ogy which has attracted a lot of research attention from academic community and indus-try. For many applications in VANETs, information has to be ...