COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

International journal of Network Security & Its Applications

ISSN : 0974 - 9330[Online]; 0975 - 2307[Print]

November 2015, Volume 7. Number 6

A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for Intrusion Detection in Computer Network [Pdf]
Yuchen Wang1, Shuxiang Xu2 and Qiongfang Huang1, 1Zhejiang University of Technology, China and 2University of Tasmania, Australia
A Machine Learning Approach to Anomaly-Based Detection on Android Platforms[Pdf]
Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S, Federal University of Technology Minna, Nigeria
A System for Validating and Comparing Host-Based Ddos Detection Mechanisms[Pdf]
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Viet Nam

September 2015, Volume 7. Number 5

ANDROINSPECTOR: A System for Comprehensive Analysis of Android Applications[Pdf]
Babu Rajesh V, Phaninder Reddy, Himanshu P and Mahesh U Patil, Centre for Development of Advanced Computing cdac.in, India
Improved Steganographic Security by Applying an Irregular Image Segmentation and Hybrid Adaptive Neural Networks With Modified Ant Colony Optimization[Pdf]
Nameer N. El. Emam1 and Kefaya S. Qaddoum2, 1Philadelphia University, Jordan and 2Warwick University, UK
An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing[Pdf]
P.S.Jagadeesh Kumar, S.Meenakshi Sundaram and Ranjeet Kumar, Don Bosco Institute of Technology, India

July 2015, Volume 7. Number 4

Deterring Hacking Strategies via Targeting Scanning Properties[Pdf]
Saad Alsunbul1,2, Phu Dung Le1, Jefferson Tan1, 1Monash University, Australia and 2King Abdullaziz for Science and Technology, Saudi Arabia
Providing End-To-End Secure Communications in GSM Networks[Pdf]
Heshem A.El Zouka, Arab Academy for Science & Technology and Maritime Transport, Egypt

May 2015, Volume 7. Number 3

Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions[Pdf]
Nabeel Zanoon1, Nashat Albdour2, Hatem S. A. Hamatta1 and Rasha Moh`d Al-Tarawneh1, 1Al-Balqa Applied University, Jordan and 2Tafila Technical University, Jordan
An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection [Pdf]
AshalataPanigrahi and ManasRanjanPatra, Berhampur University, India
A Performance Evaluation Of Common Encryption Techniques With Secure Watermark System (Sws) [Pdf]
Ashraf Odeh1, Shadi R.Masadeh1 and Ahmad Azzazi2, 1Isra University, Jordan and 2Applied Science University, Jordan
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured Communication [Pdf]
Anjan K1, Srinath N K1 and Jibi Abraham2, 1R V College of Engineering, India and 2College of Engineering Pune, India

March 2015, Volume 7. Number 2

Exploiting Rhetorical Relations to Multiple Documents Text Summarization[Pdf]
N.Adilah Hanin Zahri1, Fumiyo Fukumoto2, Matsyoshi Suguru2 and Ong Bi Lynn1, 1University of Malaysia Perlis, Malaysia and 2University of Yamanashi, Japan
An Interactive Visualization Tool for Animating Behavior of Cryptographic Protocols [Pdf]
Mabroka Maeref1, Fatma Algali1, Ahmed Patel2 and Zarina Shukur2, 1Sebha University Libya and 2The National University of Malaysia, Malaysia
A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection[Pdf]
Odai M.Al-Shatanawi and Nameer N.El.Emam, Philadelphia University, Jordan
Certificate Less Key Management Scheme in Manet Using Threshold Cryptography[Pdf]
Shaheena Khatoonand Balwant Singh Thakur, Pt.Ravishankar Shukla University, India
Comprehensive Survey of Possible Security Issues on 4G Networks[Pdf]
Sumant Ku Mohapatra, Biswa Ranjan Swain, Pravanjan Das, Trident Academy of Technology, India

January 2015, Volume 7. Number 1

Multi-Facet Trust Model for Online Social Network EnvironmentPdf ]
Liu Ban Chieng1, Manmeet Mahinderjit Singh1, Zarul Fitri Zaaba1 and Rohail Hassan21University Sains Malaysia, Malaysia and 2Universiti Teknologi Petronas, Malaysia
Accessing Secured Data in Cloud Computing EnvironmentPdf ]
Hasan Omar Al-Sakran, King Saud University, Saudi Arabia
Service Oriented Configuration Management of ‎Software ‎ArchitecturePdf ]
Razie Alidoosti, Shahrouz Moaven and Jafar Habibi, Sharif University of Technology, Iran
Runtime Potential Updater File(S) Identification: Does Your Software Updates Automatically With Application Whitelisting?Pdf ]
Janardhan Reddy, Amit Kumar Jha and Sandeep Romana, Centre for Development of Advanced Computing, India
Strong Zero-Knowledge Authentication Based on the Session Keys (SASK)Pdf ]
Younes ASIMI, Abdellah AMGHAR, Ahmed ASIMI and Yassine SADQI, Laboratoire des Systemes informatiques et Vision (LabSiV), Morocco
A New Secret Handshakes Scheme with Dynamic Matching Based on ZSS Pdf ]
Preeti Kulshrestha and Arun Kumar Pal, G.B. Pant University of Agriculture and Technology, India
A New DNA Based Approach of Generating Key-Dependent Shift Rows TransformationPdf ]
Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and Nur Izura Udzir, Universiti Putra Malaysia, Malaysia

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN