Windows rootkits: Attacks and countermeasures
Authorship attribution for Twitter in 140 characters or less
Identity crime : The challenges in the regulation of identity crime
A biometric based authentication and encryption Framework for Sensor Health Data in Cloud
Are you sure you would like to clear your session, including search history and login status?