Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis
Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2
A Light-weight Symmetric Encryption Algorithm Based on Feistel Cryptosystem Structure
Mean Response Time Approximation for HTTP Transactions over Transport Protocols
Augmented Reality Mobile Application of Balinese Hindu Temples: DewataAR
Performance Evaluation of Power Aware VM Consolidation using Live Migration
Controlling Information Flows in Net Services with Low Runtime Overhead
Forensics Investigation of Web Application Security Attacks
Linear Crossed Cube (LCQ): A New Interconnection Network Topology for Massively Parallel System
Multipath Data Transmission with minimization of Congestion Using Ant Colony Optimization for MTSP and Total Queue Length
Effective Hybrid Intrusion Detection System: A Layered Approach
Secure Usable Authentication Using Strong Pass text Passwords
Server-Side Encrypting and Digital Signature Platform with Biometric Authorization
Innovative Method for Enhancing Key Generation and Management in the AES-Algorithm
DNS Pharming through PHP Injection: Attack Scenario and Investigation
Embedded Real-Time HTTP Server
Global Trust: A Trust Model for Cloud Service Selection
Cumulative Techniques for Overcoming Security Threats in Manets
Fast and Efficient Design of a PCA-Based Hash Function
Single Sign-On in Cloud Federation using CloudSim
ANM to Perceive and Thwart Denial of Service Attack in WLAN
Information Hiding Using Least Significant Bit Steganography and Cryptography
SD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE)
A Bootstrap Approach of Benchmarking Organizational Maturity Model of Software Product With Educational Maturity Model
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning
An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys
Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing
A Survey on RC4 Stream Cipher
New Region Growing based on Thresholding Technique Applied to MRI Data
Destination Address Entropy based Detection and Traceback Approach against Distributed Denial of Service Attacks
An Extended Approach for Efficient Data Storage in Cloud Computing Environment
Hardware Implementation of Fidelity based On Demand Routing Protocol in MANETs
Genetic Algorithm to Solve the Problem of Small Disjunct In the Decision Tree Based Intrusion Detection System
A 3-D Geometry based Remote Login 2-Way Authentication Scheme using Smart Card
Anomaly Detection in Network Traffic Using Selected Methods of Time Series Analysis
A Hybrid Real-time Zero-day Attack Detection and Analysis System
Intrusion Detection Based on Normal Traffic Specifications
Addressing the Bandwidth issue in End-to-End Header Compression over IPv6 Tunneling Mechanism
SMAODV: A Novel Smart Protocol for Routing in Ad-hoc Wireless Networks Using the PageRank Algorithm
QoS Comparison of MANET Routing Protocols