Now showing items 1-3 of 3

    • Enhanced and secured hybrid steganography model for hiding large data 

      Majumder, Srabony; Tanu, Mohon Dash; Faisal, S. M. Fahim; Sristy, Mumtahinah Rahman; Paul, Rigan (Brac University, 2023-05)
      Recent works on steganography basically are focused on various network layers and multiple data-hiding techniques. These researches lead to image manipula- tion, contortion and small-scale payload. This paper proposes a ...
    • Performance analysis of machine learning classi ers for detecting PE malware 

      Azmee, ABM.Adnan; Choudhury, Pranto Protim; Alam, Md.Aosaful; Dutta, Orko (Brac University, 2019-12)
      In this modern era of technology, securing and protecting one's data has been a major concern and needs to be focused on. Malware is a program that is designed to cause harm and malware analysis is one of the paramount ...
    • Right to be forgotten: a critique of the post-Costeja Gonzalez paradigm 

      Ahmed, Farhaan Uddin (© 2015 Computer and Telecommunications Law Review, 2015)
      Considers the challenges of administering the "right to be forgotten" (RTBF) as formulated by the ECJ ruling in Google Spain SL v Agencia Espanola de Proteccion de Datos (AEPD) (C-131/12) and the draft General Data Protection ...