Complete Network Security Protection for SME's within Limited Resources[ Pdf ]
Margie S. Todd1 and Syed (Shawon) M. Rahman1,2, 1Capella University, USA and 2University of Hawaii-Hilo, USA |
Multi-Level Parsing Based Approach Against Phishing Attacks With the Help of Knowledge Bases[ Pdf ]
Gaurav Kumar Tak1 and Gaurav Ojha2, 1Lovely Professional University, India and 2Indian Institute of Information Technology and Management, India |
A Need for Peer-To-Peer Strong Local Authentication Protocol (P2PSLAP) in Mobile Banking[ Pdf ]
Bossi Masamila, Dublin Institute of Technology, Ireland |
Securing Mobile Cloud Using Finger Print Authentication [ Pdf ]
IehabALRassan and HananAlShaher, King Saud University, Saudi Arabia |
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection Engine[ Pdf ]
Anjan K1, Srinath N K1 and Jibi Abraham2, 1R V College of Engineering,India and 2College of Engineering, India |
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel Shortening in Multi-carrier Systems[ Pdf ]
Samir Abd Elghafar1,2, Salaheldin M. Diab1, Bassiouny M. Sallam1, Moawad I. Dessouky1, El-Sayed M. El-Rabaie1 and Fathi E. Abd El-Samie1, 1Menoufia University, Egypt and 2Jazan University, Saudi Arabia |
Investigating the Effects of the Common Control Channel Challenge in Multichannel Cognitive Networks With Hypothetical Spectrum Hole [ Pdf ]
Mthulisi Velempini1 and Mqhele E. Dlodlo2, 1North-West University, South Africa and 2University of Cape Town, South Africa |
Knowledge-Based Authentication using Twitter Can We Use Lunch Menus As Passwords? [Pdf]
ManabuOkamoto, Kanagawa Institute of Technology, Japan |
A Security Framework in Cloud Computing Infrastructure [Pdf]
Arijit Ukil1, Debasish Jana2 and Ajanta De Sarkar2, 1Tata Consultancy Services, India and 2Birla Institute of Technology, India |
Micro Rotor Enhanced Block Cipher Designed For Eight Bits Micro-Controllers (MREBC) [Pdf]
Ahmed ElShafee, Ahram Canadian University, Egypt |
Image Authentication Through ZTransform with Low Energy And Bandwidth (IAZT [Pdf]
Madhumita Sengupta and J. K. Mandal, University of Kalyani, India |
Fast Detection of Ddos Attacks Using Non-Adaptive Group Testing [Pdf]
Huynh Nguyen Chinh, Tan Hanh and Nguyen Dinh Thuc, HCMC,Vietnam |
Effectiveness of Feature Detectionoperators on the Performance of Iris Biometric Recognition System [Pdf]
Binsu C. Kovoor, Supriya M.H. and K. Poulose Jacob, Cochin University of Science and Technology, India |
Secure Collaborative Processing Architecture for MITB Attack Detection [Pdf]
Hani Qusa and Shadi Abudalfa, University College of Applied Science, Palestine |
Security Challenges, Issues and Their Solutions For Vanet [Pdf]
Ram Shringar Raw, Manish Kumar and Nanhay Singh, Ambedkar Institute of Advanced communication Technologies & Research, India |
Defense Mechanisms for Computer-Based Information Systems [Pdf]
Majid Alshammari and Christian Bach, University of Bridgeport, USA |
Optimized Hybrid Security Mechanism for Image Authentication and Secrecy using PSO [Pdf]
K.Kuppusamy and K.Thamodaran, Alagappa University, India |
Credit Based Methodology to Detect and Discriminate DDOS Attack From Flash Crowd in A Cloud Computing Environment [Pdf]
N.Jeyanthi, Hena Shabeeb and Mogankumar P.C, VIT University, India |
Z-Shaped Dipole Antenna and its Fractal Iterations [Pdf]
Mustafa H. Abu Nasr, Al- Azhar University, Palestine |
A Novel Approach for Secure Routing Through BGP Using Symmetric Key [Pdf]
Divan Raimagia, Shraddha Singh and Sameena Zafar, PIES College, India |
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm [Pdf]
Adnan M. Shihab, Raghad K. Mohammed and Woud M. Abed, University of Baghdad, Iraq |
A Novel Technique to Detect Intrusion in Manet [Pdf]
J. K. Mandal1 and Khondekar Lutful Hassan2, 1University of Kalyani, India and 2University of Calcutta,India |
Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level [ Pdf ]
Fahmida Rahman and Mohammed Arozullah, The Catholic University of America, USA |
Phishing Techniques and Mitigating the Associated Security Risks [ Pdf ]
Marc A. Rader and Syed (Shawon) M. Rahman, Capella University, USA |
Wireless Networks Security in Jordan: A Field Study [ Pdf ]
Ahmad S. Mashhour1 and Zakaria Saleh2, 1University of Bahrain, Bahrain and 2Yarmouk University, Jordan |
Early Detection of SQL Injection Attacks [ Pdf ]
Hossain Shahriar, Sarah North and Wei-Chuen Chen, Kennesaw State University, USA |
A Framework for Security Components Anomalies Severity Evaluation and Classification [ Pdf ]
Kamel Karoui, Fakher Ben Ftima and Henda Ben Ghezala, University of Manouba, Tunisia |
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication [ Pdf ]
Pavan Kumar K, P. E. S. N. Krishna Prasad, M. V. Ramakrishna and B.D.C.N. Prasad, Prasad V. Potluri Siddhartha Institute of Technology, India |
Defence Schemes From Attacker's Own Reward Processes [ Pdf ]
L-F Pau, Copenhagen Business School, Denmark |
Controlling IP Falsifying Using Realistic Simulation [ Pdf ]
Govindavaram Madhusri1 and Chakunta Venkata Guru Rao2, 1Kakatiya University, India and 2JNTU University, India |
Malware Risk Analysis on the Campus Network with Bayesian Belief Network [ Pdf ]
Aliyu Mohammed, Haitham A. Jamil, Sulaiman Mohd Nor and Muhammad NadzirMarsono, Universiti Teknologi Malaysia,Malaysia |
Internal Security on an IDS Based on Agents [ Pdf ]
Rafael Paez, Mery Yolima Uribe and Miguel Torres, Pontificia Universidad Javeriana, Colombia |
A New Stemmer to Improve Information Retrieval [ Pdf ]
Wahiba Ben Abdessalem Karaa, University of Tunis. Tunisia |
Performance Evaluation of Enhancedgreedy-Two-Phase Deployment Algorithm [ Pdf ]
Kartit Ali, University Mohammed V-Agdal, Morocco |
Steganography and Random Grids [ Pdf ]
Pratarshi Saha1, Sandeep Gurung1 and Kunal Krishanu Ghose2, 1Sikkim Manipal Institute of Technology, India and 2QualComm, USA |
An Improved MULTI-SOM Algorithm [ Pdf ]
Imen Khanchouch, Khaddouja Boujenfa and Mohamed Limam, University of Tunis, Tunisia and Dhofar University, Oman |
Experimental Analysis of AODV and DSR with Varying Vehicle Mobility and Density in Vanet Scenario [ Pdf ]
Arzoo Dahiya and R.K.Chauhan, Kurukshetra University, India |
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy Depletion Parameters [ Pdf ]
S.Prabhakara Rao1, E.Nagabhooshanam2 and S.Ramesh Babu1, 1Nigama Engineering College, India and 2Sridevi Womens Engineering College, India |
An Efficient Group Authentication for Group Communications [ Pdf ]
Lein Harn1 and Changlu Lin2, 1University of Missouri, USA and 2Fujian Normal University, P. R. China |
Password Based Scheme and Group Testing for Defending DDOS Attacks [ Pdf ]
G Dayanandam1, T V Rao2, S Pavan Kumar Reddy1 and Ravinuthala Sruthi1, 1QIS Institute of Technology (QISIT), India and 2KL University (KLU), India |
Security Algorithms for WIMAX [ Pdf ]
M Alzaabi1, K D Ranjeeth1, T Alukaidey1 and K Salman2, 1University of Hertfordshire, UK and 2Middle Tennessee State University, USA |
Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network [ Pdf ]
Seyedeh Yasaman Rashida, Islamic Azad University Shirgah, Iran |
HTTPI Based Web Service Security over SOAP [ Pdf ]
Pankaj Choudhary, Rajendra Aaseri and Nirmal Roberts, ABV - Indian Institute of Information Technology & Management, India |
Implementation of a Security Protocol for Bluetooth and WI-FI [ Pdf ]
U. Pavan Kumar, Amity University, India |
Bearings Prognostic Using Mixture of Gaussians Hidden Markov Model and Support Vector Machine [ Pdf ]
Fatima Ezzahra Sloukia1, Rajae Bouarfa1, Hicham Medromi2 and Mohammed Wahbi1, 1SIR2C2S/LASI-EHTP, Morocco and 2Hassan II University, Morocco |
Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc Networks [ Pdf ]
Rajendra Aaseri, Pankaj Choudhary and Nirmal Roberts, ABV-Indian Institute of Information Technology, India |
Incident Response Plan for a Small to Medium Sized Hospital[ Pdf ]
Charles DeVoe and Syed (Shawon) M. Rahman, Capella University, USA |
Privacy Preserving Data Mining by using Implicit Function Theorem[ Pdf ]
Pasupuleti Rajesh1 and Gugulothu Narsimha2, 1VVIT College, India and 2JNTUH University, India. |
Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering Systems[ Pdf ]
Alexis V. Pantola1, Susan Pancho-Festin2 and Florante Salvador1, 1De La Salle University, Philippines and 2University of the Philippines,Philippines |
Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks [ Pdf ]
Leelavathi G1, Shaila K2, Venugopal K R3 and L M Patnaik4, 1Govt.S.K.S.J.Technological Institute, India, 2Vivekananda Institute of Technology, India, 3University Visvesvaraya College of Engineering, India and 4Indian Institute of Science, India |
Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation[ Pdf ]
Andrew Rudder, Wayne Goodridge and Shareeda Mohammed, The University of the West Indies, Trinidad and Tobago. |
A 64 Bits Rotor Enhanced Block Cipher (Rebc3[ Pdf ]
Ahmed ElShafee, Ahram Canadian University, Egypt. |
A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering[ Pdf ]
S.Lakshmi1 and V.Sankaranarayanan2, 1Jeppiaar Engineering College, India and 2Crescent Engineering College, India. |
Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment[ Pdf ]
Shalvi Dave1, Bhushan Trivedi2 and Jimit Mahadevia3, 1Indus University, India, 2GLSICT,India and 3Elitecore Technologies Pvt. Ltd., India |
Code Aware Dynamic Source Routing for Distributed Sensor Network[ Pdf ]
M Abdul Rahiman1, Nishanth Jain1, Arun K. Dubey2 and G Manoj Kumar3, 1AICTE, Ministry of HRD,Govt of India, India, 2Bharati Vidyapeeth College of Engineering, India and 3LBS Inst of Tech for Women, India. |
Resonance Based Micromechanical Cantilever for Gas Sensing[ Pdf ]
Subhashini. S1 and Vimala Juliet. A2, 1Sathyabama University, India and 2SRM University, India |
Traceback of DOS Over Autonomous Systems [ Pdf ]
Mohammed Alenezi and Martin J Reed, School of Computer Science and Electronic Engineering, University of Essex, UK |
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-hoc Network Environment[ Pdf ]
Vaishali D. Khairnar and Ketan Kotecha, Institute of Technology Nirma University, India |
A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries[ Pdf ]
Dexin Yang1, Chunjing Lin2 and Bo Yang2, 1Guangzhou City Polytechnic, China and 2Shaanxi Normal University, China |
Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour[ Pdf ]
Arpitha M1, Geetha V1,Gowranga K H2 and Bhakthavathsalam R2, 1Alpha College Of Engineering, India and 2Indian Institute of Science, India |
E-Commerce Systems Security for Small Businesses[ Pdf ]
Syed (Shawon) M. Rahman and Robert Lackey, Capella University, Minneapolis, USA. |
Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study [ Pdf ]
Natarajan Meghanathan, Jackson State University, USA |
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers [ Pdf ]
Kuo-Tsang Huang1, Jung-Hui Chiu1 and Sung-Shiou Shen2, 1Chang Gung University, Taiwan and 2DE LIN Institute of Technology, Taiwan |
An Integrated Solution for both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study [ Pdf ]
M Gnana Seelan and Ch AS Murty, Centre for Development of Advanced Computing - Hyderabad, India |
How to Find a Fixed Point in Shuffle Efficiently [ Pdf ]
Mikako Kageshima and ManabuOkamoto, Kanagawa Institute of Technology, Japan |
Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study [ Pdf ]
Aidarus M. Ibrahim, Hussein A. Hashi and Abdullalem A. Mohamed, University Technology Malaysia (UTM), Malaysia |
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines [ Pdf ]
A. M. Chandrashekhar1 and K. Raghuveer2, 1Sri Jayachamarajendra College of Engineering (SJCE), India and 2National Institute of Engineering (NIE) Mysore, India |
Text Steganographic Approaches: A Comparison[ Pdf ]
Monika Agarwal, PDPM-IIITDM Jabalpur, India |
|
|