Search for persons
X
?
2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS) ,
2
TangleTunes: A P2P Music Streaming Service on the IoTA Dist..:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
4
Hollow-Pass: A Dual-View Pattern Password Against Shoulder-..:
, In:
?
Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics ,
6
Heuristics and Metaheuristic Optimization Algorithms:
, In:
?
Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics ,
7
Cohort Intelligence with Cognitive Computing (CICC) and Mod..:
, In:
?
Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics ,
8
Secret Text Embedding Capacity Improvement (Approach 3):
, In:
?
9
Optimization Models in Steganography Using Metaheuristics
Intelligent Systems Reference Library, 187
?
Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics ,
10
Steganalysis on All Approaches/Vulnerability Analysis of St..:
, In:
?
Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics ,
11
Conclusions and Future Recommendations:
, In:
?
Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics ,
12
Improved Cohort Intelligence Optimization Algorithm (Approa..:
, In:
?
Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics ,
13
Introduction:
, In:
?
Intelligent Systems Reference Library; Optimization Models in Steganography Using Metaheuristics ,
14