export record
dblp key:
journals/cluster/MontanoGRMDR22 share record
persistent URL:
Isabel Herrera Montano , José J. García-Aranda , Juan Ramos-Díaz , Sergio Molina-Cardín , Isabel de la Torre Díez , Joel J. P. C. Rodrigues : Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat. Clust. Comput. 25 (6 ) : 4289-4302 (2022 )share record
persistent URL:
Sang-Wook Kwon , Yong-Seo Koo : Design of high-reliability LDO regulator with SCR based ESD protection circuit using body technique and load transient detection. IEICE Electron. Express 19 (11 ) : 20220110 (2022 )share record
persistent URL:
Jasvinder Kaur , Parvinder Singh : Comparative analysis of wavelet-based copyright protection techniques. Int. J. Comput. Vis. Robotics 12 (3 ) : 219-235 (2022 )share record
persistent URL:
Mohammed S. Resen , Muna Majeed Laftah : A Blind Video Copyright Protection Technique in Maximum and Minimum Energy Frames Based on The Fast Walsh Hadamard Transform (FWHT) and Discrete Wavelet Transform (DWT) and Arnold Map. Int. J. Interact. Mob. Technol. 16 (10 ) : 163-175 (2022 )export record
dblp key:
journals/isjgp/BirthriyaJ22 share record
persistent URL:
Santosh Kumar Birthriya , Ankit Kumar Jain : A Comprehensive Survey of Phishing Email Detection and Protection Techniques. Inf. Secur. J. A Glob. Perspect. 31 (4 ) : 411-440 (2022 )export record
dblp key:
journals/jcloudc/ZhouLGMZ22 share record
persistent URL:
Qian Zhou , Chengzhe Lai , Qili Guo , Haoyan Ma , Dong Zheng : A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique. J. Cloud Comput. 11 : 93 (2022 )share record
persistent URL:
Balkar Singh , Mahesh Kumar Sharma : Efficient watermarking technique for protection and authentication of document images. Multim. Tools Appl. 81 (16 ) : 22985-23005 (2022 )export record
dblp key:
journals/remotesensing/SledziowskiTGFL22 share record
persistent URL:
Jakub Sledziowski , Pawel Terefenko , Andrzej Giza , Pawel Forczmanski , Andrzej Lysko , Witold Macków , Grzegorz Stepien , Arkadiusz Tomczak , Apoloniusz Kurylczyk : Application of Unmanned Aerial Vehicles and Image Processing Techniques in Monitoring Underwater Coastal Protection Measures. Remote. Sens. 14 (3 ) : 458 (2022 )export record
dblp key:
journals/sensors/DziechBD22 share record
persistent URL:
Andrzej Dziech , Piotr Bogacki , Jan Derkacz : A New Method for Image Protection Using Periodic Haar Piecewise-Linear Transform and Watermarking Technique. Sensors 22 (21 ) : 8106 (2022 )export record
dblp key:
journals/sensors/ZhangLLSL22 share record
persistent URL:
Shiwen Zhang , Mengling Li , Wei Liang , Voundi Koe Arthur Sandor , Xiong Li : A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services. Sensors 22 (16 ) : 6141 (2022 )share record
persistent URL:
Diptak Pal , Bijaya Ketan Panigrahi : Small Signal Stability Analysis Oriented Design of Hybrid Anti-Islanding Protection Technique Based on Active Disturbance Injection. IEEE Syst. J. 16 (1 ) : 1448-1459 (2022 )export record
dblp key:
journals/soco/VenkateshN22 share record
persistent URL:
K. Venkatesh , D. Narasimhan : MLPD: a multi-layer protection with deduplication technique to preserve audio file transmission over the public domain. Soft Comput. 26 (7 ) : 3573-3585 (2022 )export record
dblp key:
journals/tcasII/ChengLWL22 share record
persistent URL:
Shih-Hao Cheng , Meng-Hsueh Lee , Bing-Chen Wu , Tsung-Te Liu : A Lightweight Power Side-Channel Attack Protection Technique With Minimized Overheads Using On-Demand Current Equalizer. IEEE Trans. Circuits Syst. II Express Briefs 69 (10 ) : 4008-4012 (2022 )share record
persistent URL:
Pallavi Ahire , Jibi Abraham : Secure cloud model for intellectual privacy protection of arithmetic expressions in source codes using data obfuscation techniques. Theor. Comput. Sci. 922 : 131-149 (2022 )export record
dblp key:
journals/tjs/DhinakaranP22 share record
persistent URL:
D. Dhinakaran , P. M. Joe Prathap : Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining. J. Supercomput. 78 (16 ) : 17559-17593 (2022 )export record
dblp key:
journals/tjs/DhinakaranP22a share record
persistent URL:
D. Dhinakaran , P. M. Joe Prathap : Correction to: Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining. J. Supercomput. 78 (18 ) : 19754 (2022 )export record
dblp key:
journals/tomccap/NatgunanathanPG22 share record
persistent URL:
Iynkaran Natgunanathan , Purathani Praitheeshan , Longxiang Gao , Yong Xiang , Lei Pan : Blockchain-Based Audio Watermarking Technique for Multimedia Copyright Protection in Distribution Networks. ACM Trans. Multim. Comput. Commun. Appl. 18 (3 ) : 86:1-86:23 (2022 )export record
dblp key:
journals/tvlsi/NagataMM22 share record
persistent URL:
Makoto Nagata , Takuji Miki , Noriyuki Miura : Physical Attack Protection Techniques for IC Chip Level Hardware Security. IEEE Trans. Very Large Scale Integr. Syst. 30 (1 ) : 5-14 (2022 )export record
dblp key:
journals/wpc/AlmashhadaniDLI22 share record
persistent URL:
Hasnain Ali Almashhadani , Xiaoheng Deng , Suhaib N. Abdul Latif , Mohammed M. Ibrahim , Ali Hussien Alshammari : An Edge-Computing Based Task-Unloading Technique with Privacy Protection for Internet of Connected Vehicles. Wirel. Pers. Commun. 127 (2 ) : 1787-1808 (2022 )export record
dblp key:
conf/asianhost/FangLZCM22 share record
persistent URL:
Lele Fang , Jiahao Liu , Yan Zhu , Chi-Hang Chan , Rui Paulo Martins : LSB-Reused Protection Technique in Secure SAR ADC against Power Side-Channel Attack. AsianHOST 2022 : 1-6 share record
persistent URL:
Sharath Yaji , Bayyapu Neelima : Reinforcement Technique for Classifying Quasi and Non-quasi Attributes for Privacy Preservation and Data Protection. ATIS 2022 : 3-17 share record
persistent URL:
Runsheng Guo , Qichao Liu , Man Zhang , Ning Hu , Hui Lu : A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection. DSC 2022 : 40-47 share record
persistent URL:
Xinya Shu , Zihao Wang , Mingyang Cao , Yanqing Wang : The One-stop Intelligent Environmental Protection Community based on Image Processing Techniques. ICAIP 2022 : 103-108 share record
persistent URL:
Costas Argyrides , Vilas Sridharan , Hayk Danoyan , Gurgen Harutyunyan , Yervant Zorian : A Novel Protection Technique for Embedded Memories with Optimized PPA. ITC 2022 : 642-645 share record
persistent URL:
Eugenio Lomurno , Matteo Matteucci : On the Utility and Protection of Optimization with Differential Privacy and Classic Regularization Techniques. LOD (1) 2022 : 223-238 share record
persistent URL:
Le Danh Tai , Nguyen Van Thanh , Ta Minh Thanh : Blockmarking: Hybrid model of blockchain and watermarking technique for copyright protection. SoICT 2022 : 398-404 export record
dblp key:
journals/corr/abs-2209-03175 share record
persistent URL:
Eugenio Lomurno , Matteo Matteucci : On the utility and protection of optimization with differential privacy and classic regularization techniques. CoRR abs/2209.03175 (2022 )2021 export record
dblp key:
journals/access/MajeedH21 share record
persistent URL:
Abdul Majeed , Seong Oun Hwang : A Comprehensive Analysis of Privacy Protection Techniques Developed for COVID-19 Pandemic. IEEE Access 9 : 164159-164187 (2021 )export record
dblp key:
journals/access/RathoreMKP21 share record
persistent URL:
Bhuvnesh Rathore , Om Prakash Mahela , Baseem Khan , Sanjeevikumar Padmanaban : Protection Scheme using Wavelet-Alienation-Neural Technique for UPFC Compensated Transmission Line. IEEE Access 9 : 13737-13753 (2021 )export record
dblp key:
journals/ijcnis/AbuzanounehH21 share record
persistent URL:
Khalil Ibrahim Mohammad Abuzanouneh , Mohammed Hadwan : Multi-Stage Protection Using Pixel Selection Technique for Enhancing Steganography. Int. J. Commun. Networks Inf. Secur. 13 (1 ) (2021 )