S.No. | Title | Author | Pages | View | Google Scholar |
---|---|---|---|---|---|
1 |
Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks DOI: 10.19101/IJACR.2016.623006 |
Nabie Y. Conteh and Paul J. Schmick |
31 -38 |
14605 |
View |
2 | DOI:10.19101/IJACR.2016.623031 |
Hsien-Yu Lee and Nai-Jian Wang |
39 -46 |
11128 |
View |
3 | DOI:10.19101/IJACR.2016.623027 |
S.O. Otuagoma |
47 -57 |
11168 |
View |
4 |
Transformation of LOG file using LIPT technique DOI:10.19101/IJACR.2016.623015 |
Amit Kumar Sinha and Vinay Singh |
58 -64 |
11206 |
View |
5 |
How to secure web servers by the intrusion prevention system (IPS)? DOI:10.19101/IJACR.2016.623028 |
Yousef Farhaoui |
65 -71 |
11488 |
View |