@article{Adeyemi2017,title = {NTRU binary polynomials parameters selection for reduction of decryption failure},journal = {Advances in Intelligent Systems and Computing},year = {2017},volume = {532},pages = {175-187},author = {Gaithuru, J.N. and Salleh, M. and Mohamad, I. and Adeyemi, I.R.}}
2017
Acquisition and retention of potential digital evidence
@article{Dlamini2017,title = {Application of artificial intelligence for detecting derived viruses},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2017},pages = {647-655},author = {Asiru, O. and Dlamini, M. and Blackledge, J.}}
2017
A Text Steganographic System Based on Word Length Entropy Rate
@article{Akotoye_2017,
doi = {10.3991/ijes.v5i3.7521},
url = {https://doi.org/10.3991%2Fijes.v5i3.7521},
year = 2017,
month = {oct},
publisher = {International Association of Online Engineering ({IAOE})},
volume = {5},
number = {3},
pages = {71},
author = {Francis Xavier Kofi Akotoye},
title = {A Text Steganographic System Based on Word Length Entropy Rate},
journal = {International Journal of Recent Contributions from Engineering, Science {\&} {IT} ({iJES})}
}
2017
Enforcing privacy by with holding private information
@article{Olivier2017,title = {Enforcing privacy by with holding private information},journal = {IFIP Advances in Information and Communication Technology},year = {2017},volume = {47},pages = {421-430},author = {Lategan, F. and Olivier, M.S.}}