Hoose one of the options in the assignment criteria field
Choose a title from the following list:
a? Side channel attacks
a? Cryptanalysis of the Wired Equivalence Protocol / The Practical attacks
a? Steganography and Steganalysis
a? Public and open source tools versus proprietary closed source tools
a? Malware and forensic investigation.
a? Cannot see the wood for the trees how effective can information hiding be?
The number of references depends on the writer