Sign in

Implementation and Embellishment of Prevention of Keylogger Spyware Attacks.

Mohammad WazidRobin SharmaAvita KatalR. H. GoudarPriyanka BhakuniAsit Tyagi
Published in: SSCC (2013)
Keyphrases
  • genetic algorithm
  • multiresolution
  • security threats
  • data sets
  • real world
  • information systems
  • lightweight
  • watermarking scheme
  • implementation details