Collection's Items (Sorted by Submit Date in Descending order): 1 to 17 of 17
Issue Date | Title | Author(s) |
2016-11-17 | Secure tool for Map data sharing | Logendra, E. |
2016-11-16 | Dynamic and Temporal Control of Role Based Access for On-Demand Role Assignment | Fernando, S. P. R. D. |
2016-09-28 | eCommerce System for Negotiable Bill of Lading and Flexible Payment Options | Tharaka, M.H.S. |
2016-09-22 | Secure Information Sharing in a Collaboration Oriented Architecture | Boteju, A.J. |
2016-09-21 | BGP Origin Validation and Threat Mitigation Using Route Server | Wijethunge, K.D.T.R. |
2016-09-15 | Privacy and Security Implications on Wireless (Wi-Fi) Tomography | Sirimanne, J.R.O. |
2016-09-15 | Mobile Application Security Framework for iOS | Isaac, E.R. |
2016-09-15 | Investigation of Privacy Violations In Wi-Fi Band Using Software Defined Radio | Jayasooriya, J.A.M.M. |
2016-09-15 | A Common Flexible Framework for Modern and Legacy Relational Database Systems Enhanced for Security | Muthuthanthrie, M.R.C.S. |
2016-09-15 | Modeling and detection of database inference through system development life cycle to enhance data security. | Chamantha, A.P. |
2016-09-15 | Android Smart Phone Contact Analyzer | Jayasinghe, C.A. |
2016-09-15 | De-Anonymization of Anonymous E-mails in digital forensic | Wickramasinghe, W.A.V.M.G. |
2016-09-15 | Forensic Artifacts Analysis on Windows 10 Operating System from the View of Digital Forensics Investigator | Priyashantha, H.D.R. |
2016-09-15 | Integrated Simple Intrusion Detection and Prevention System for Nginx Web Server | Wijeratne, W.V.D.P. |
2016-09-15 | Secure Smart Home System | Bandara, A.M.K.C. |
2016-09-14 | A Machine Learning Based Approach for Phishing Detection On Smart Phones | Senavirathne, W.M.N. |
2016-09-14 | Implementation of an Elliptic Curve Cryptography (ECC) based Authentication Framework for Contiki to Secure Internet of Things (IOT) | Anushka, K.P. Boominda |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 17 of 17