Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Distributed denial of service detection using multi layered feed forward artificial neural network
Ismaila Idris, Obi Blessing Fabian, Shafi’i M. Abdulhamid, Morufu Olalere, Baba Meshach
Monitoring of military base station using flooding and ACO technique: an efficient approach
Abdus Samad, Mohammed Shuaib, Mohd Rizwan Beg
An analytical study of cellular automata and its applications in cryptography
G. Kumaresan, N.P. Gopalan
A fault-tolerant improved OLSR protocol using k-Connected m-Dominating set
Vinayagam P. S.
Security protocol of keys management system for transmission encrypted data
Rasha Subhi Ali, Alaa Kadhim F.
Achieving confidentiality in electronic health records using cloud systems
Robert French-Baidoo, Dominic Asamoah, Stephen Opoku Oppong
Validation of an adaptive risk-based access control model for the internet of things
Hany F. Atlam, Ahmed Alenezi, Raid Khalid Hussein, Gary B. Wills
Application of geo-location-based access control in an enterprise environment
Victor L. Yisa, Baba Meshach, Oluwafemi Osho, Anthony Sule
Using homomorphic cryptographic solutions on E-voting systems
Ahmed A. Abu Aziz, Hasan N.Qunoo, Aiman A. Abu Samra
Comparative analysis of classification algorithms for email spam detection
Shafi’i Muhammad Abdulhamid, Maryam Shuaib, Oluwafemi Osho, Idris Ismaila, John K. Alhassan
Verification of cloud based information integration architecture using colored petri nets
Murale Narayanan, Aswani Kumar Cherukuri
An improved model for securing ambient home network against spoofing attack
Solomon A. Akinboro, Adebayo Omotosho, Modupe O. Odusami
A comprehensive review of congestion control techniques in M2M and cellular networks
Chidanandan V., Arun Raj Kumar P.
Acoustic lightweight pseudo random number generator based on cryptographically secure LFSR
Mohammed Abdul Samad AL-khatib, Auqib Hamid Lone
Effective use method of cloudlet resources by mobile users
Rashid G. Alakbarov, Oqtay R. Alakbarov
An implementation of software routing for building a private cloud
Rawezh Ziad Kamla, Tara Yahiya, Nashwan B. Mustafa
Performance analysis of classification techniques by using multi Agent based intrusion detection system
Aumreesh Kumar Saxena, Sitesh Sinha, Piyush Shukla
Optimization of different queries using optimization algorithm (DE)
Sahil Saharan, J.S. Lather, R. Radhakrishnan
The method of hidden terminal transmission of network attack signatures
Igor Ruban, Nataliia Lukova-Chuiko, Vadym Mukhin, Yaroslav Kornaga, Igor Grishko, Anton Smirnov
Chaotic Genetic-fuzzy encryption technique
Hamdy M. Mousa
Linear improved gravitational search algorithm for load scheduling in cloud computing environment (LIGSA-C)
Divya Chaudhary, Bijendra Kumar
Intelligent energy aware fidelity based on-demand secure routing protocol for MANET
Himadri N. Saha, Prachatos Mitra
Impact of IPv4, IPv6 and dual stack interface over wireless networks
Varsha Jain, Damodar Tiwari, Shailendra Singh, Sanjeev Sharma
A novel approach to thwart security attacks on mobile pattern authentication systems
Bh Padma, GVS Raj Kumar
Computer security and software watermarking based on return-oriented programming
Ashwag Alrehily, Vijey Thayananthan
A solution to secure personal data when Aadhaar is linked with DigiLocker
Vinay Kumar, Arpana Chaturvedi, Meenu Dave
Cryptography based on RGB color channels using ANNs
Sanjay Kumar Pal, Sumeet Anand
Ensure symmetrical traffic flow, to prevent the dropping of response packet by the firewall, on the active-active data centers
Irwan Piesessa, Benfano Soewito
Efficient multimedia transmission over scalable IoT architecture
Vasileios A. Memos
An experimental evaluation of tools for estimating bandwidth-related metrics
Fatih Abut, Martin Leischner
Ethical network surveillance using packet sniffing tools: a comparative study
Ibrahim Ali Ibrahim Diyeb, Anwar Saif, Nagi Ali Al-Shaibany
Assessing vulnerability of mobile messaging apps to man-in-the-middle (MitM) attack
Rishabh Dudheria
Investigating and analyzing bitcoin blockchain protocol using wireshark
Auqib Hamid Lone, Roohie Naaz Mir
Simulation analysis of OLSR and its variant with cooperative MPR selection on NS-2.35 in mobile ad-hoc networks
Shelja Sharma, Suresh Kumar
A state-of-the-art survey of coverless text information hiding
Shahbaz Ali
Internet of things for the prevention of black hole using fingerprint authentication and genetic algorithm optimization
Pooja Chandel, Rakesh Kumar
A solution for water factories in Vietnam using automatic meter reading technology
Vu Chien Thang
Implementing security features in MANET routing protocols
Abhishek Vyas, Satheesh A.
Design and implementation of malware detection scheme
Sonali Sharma
Role of scripting language on Unix operating system for risk assessment
Padma Lochan Pradhan