Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Prevention of Insider Attacks Using Block Chain with Hierarchical Auto-Associative Polynomial Convolutional Neural Network in Cloud Platform

  • articleNo Access

    A Two-Stage Approach for Secure Node Localization and Optimal Route Selection for Enhanced Performance in Wireless Sensor Networks

  • articleNo Access

    Formal Verification and Security Analysis of Go-based New Simple Queue System

  • articleNo Access

    Assessing the Impact of Software Patching on Vulnerabilities: A Comprehensive Framework for Faulty and Safe Patches

  • articleNo Access

    Early Phase Software Dependability Analysis: A Neutrosophic Inference System-Based Approach

  • articleNo Access

    Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications

  • articleNo Access

    Distributed denial of service (DDOS) attacks and mitigation method using logistic regression-based GoogLeNet for real time in security games

  • articleNo Access

    Noncooperative game-theoretic model for security enhancement in cloud gaming environments

  • articleNo Access

    Effective data management using heuristic predictive modeling for security applications in games

  • articleNo Access

    Developing an Innovative Network Security Attack Detection Model Through Artificial Intelligence and Edge Computing

    SPIN30 Dec 2024
  • articleFree Access

    Assessing the Impact of Credibility and Security on Customers E-Trust in the Context of Indian Banks

  • articleNo Access

    Steamrollers, Sports Cars and Security: Phthalocyanine Progress Through the Ages

  • articleNo Access

    QUANTUM AUTHENTICATION USING ENTANGLED STATES

  • articleNo Access

    HANDLING NON LEFT-LINEAR RULES WHEN COMPLETING TREE AUTOMATA

  • articleNo Access

    RELATIONAL STRING VERIFICATION USING MULTI-TRACK AUTOMATA

  • articleNo Access

    A NOVEL EFFICIENT ACCESS CONTROL SCHEME FOR LARGE-SCALE DISTRIBUTED WIRELESS SENSOR NETWORKS

  • articleNo Access

    TIME DOMAIN TERAHERTZ IMAGING OF THREATS IN LUGGAGE AND PERSONNEL

  • articleNo Access

    Masked FPGA Bitstream Encryption via Partial Reconfiguration

  • articleNo Access

    EFFICIENT QUANTUM KEY DISTRIBUTION SCHEME USING THE BELL STATE MEASUREMENT

  • articleNo Access

    A COMPETITIVE SEARCHING-BASED CHAOTIC CIPHER