A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for Intrusion Detection in Computer Network [Pdf]
Yuchen Wang1, Shuxiang Xu2 and Qiongfang Huang1, 1Zhejiang University of Technology, China and 2University of Tasmania, Australia |
A Machine Learning Approach to Anomaly-Based Detection on Android Platforms[Pdf]
Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S, Federal University of Technology Minna, Nigeria |
A System for Validating and Comparing Host-Based Ddos Detection Mechanisms[Pdf]
Nguyen Hong Son, Post and Telecommunication Institute of Technology, Viet Nam |
ANDROINSPECTOR: A System for Comprehensive Analysis of Android Applications[Pdf]
Babu Rajesh V, Phaninder Reddy, Himanshu P and Mahesh U Patil, Centre for Development of Advanced Computing cdac.in, India |
Improved Steganographic Security by Applying an Irregular Image Segmentation and Hybrid Adaptive Neural Networks With Modified Ant Colony Optimization[Pdf]
Nameer N. El. Emam1 and Kefaya S. Qaddoum2, 1Philadelphia University, Jordan and 2Warwick University, UK |
An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing[Pdf]
P.S.Jagadeesh Kumar, S.Meenakshi Sundaram and Ranjeet Kumar, Don Bosco Institute of Technology, India |
Deterring Hacking Strategies via Targeting Scanning Properties[Pdf]
Saad Alsunbul1,2, Phu Dung Le1, Jefferson Tan1, 1Monash University, Australia and 2King Abdullaziz for Science and Technology, Saudi Arabia |
Providing End-To-End Secure Communications in GSM Networks[Pdf]
Heshem A.El Zouka, Arab Academy for Science & Technology and Maritime Transport, Egypt |
Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions[Pdf]
Nabeel Zanoon1, Nashat Albdour2, Hatem S. A. Hamatta1 and Rasha Moh`d Al-Tarawneh1, 1Al-Balqa Applied University, Jordan and 2Tafila Technical University, Jordan |
An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection [Pdf]
AshalataPanigrahi and ManasRanjanPatra, Berhampur University, India |
A Performance Evaluation Of Common Encryption Techniques With Secure Watermark System (Sws) [Pdf]
Ashraf Odeh1, Shadi R.Masadeh1 and Ahmad Azzazi2, 1Isra University, Jordan and 2Applied Science University, Jordan |
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured Communication [Pdf]
Anjan K1, Srinath N K1 and Jibi Abraham2, 1R V College of Engineering, India and 2College of Engineering Pune, India |
Exploiting Rhetorical Relations to Multiple Documents Text Summarization[Pdf]
N.Adilah Hanin Zahri1, Fumiyo Fukumoto2, Matsyoshi Suguru2 and Ong Bi Lynn1, 1University of Malaysia Perlis, Malaysia and 2University of Yamanashi, Japan |
An Interactive Visualization Tool for Animating Behavior of Cryptographic Protocols [Pdf]
Mabroka Maeref1, Fatma Algali1, Ahmed Patel2 and Zarina Shukur2, 1Sebha University Libya and 2The National University of Malaysia, Malaysia |
A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection[Pdf]
Odai M.Al-Shatanawi and Nameer N.El.Emam, Philadelphia University, Jordan |
Certificate Less Key Management Scheme in Manet Using Threshold Cryptography[Pdf]
Shaheena Khatoonand Balwant Singh Thakur, Pt.Ravishankar Shukla University, India |
Comprehensive Survey of Possible Security Issues on 4G Networks[Pdf]
Sumant Ku Mohapatra, Biswa Ranjan Swain, Pravanjan Das, Trident Academy of Technology, India |
Multi-Facet Trust Model for Online Social Network Environment [ Pdf ]
Liu Ban Chieng1, Manmeet Mahinderjit Singh1, Zarul Fitri Zaaba1 and Rohail Hassan2, 1University Sains Malaysia, Malaysia and 2Universiti Teknologi Petronas, Malaysia |
Accessing Secured Data in Cloud Computing Environment [ Pdf ]
Hasan Omar Al-Sakran, King Saud University, Saudi Arabia |
Service Oriented Configuration Management of Software Architecture [ Pdf ]
Razie Alidoosti, Shahrouz Moaven and Jafar Habibi, Sharif University of Technology, Iran |
Runtime Potential Updater File(S) Identification: Does Your Software Updates Automatically With Application Whitelisting? [ Pdf ]
Janardhan Reddy, Amit Kumar Jha and Sandeep Romana, Centre for Development of Advanced Computing, India |
Strong Zero-Knowledge Authentication Based on the Session Keys (SASK) [ Pdf ]
Younes ASIMI, Abdellah AMGHAR, Ahmed ASIMI and Yassine SADQI, Laboratoire des Systemes informatiques et Vision (LabSiV), Morocco |
A New Secret Handshakes Scheme with Dynamic Matching Based on ZSS [ Pdf ]
Preeti Kulshrestha and Arun Kumar Pal, G.B. Pant University of Agriculture and Technology, India |
A New DNA Based Approach of Generating Key-Dependent Shift Rows Transformation [ Pdf ]
Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and Nur Izura Udzir, Universiti Putra Malaysia, Malaysia |
|
|