Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
A Comprehensive Analysis of Android Security and Proposed Solutions
Asim S. Yuksel, Abdul H. Zaim, Muhammed A. Aydin
An Architecture for Alert Correlation Inspired By a Comprehensive Model of Human Immune System
Mehdi Bateni, Ahmad Baraani
A Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET
Sherin Zafar, M K Soni
An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis
Alaa I. Elnashar, Said F. El-Zoghdy
Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2
Hassen Mestiri, Fatma Kahri, Belgacem Bouallegue, Mohsen Machhout
A Light-weight Symmetric Encryption Algorithm Based on Feistel Cryptosystem Structure
Jingli Zheng, Zhengbing Hu, Chuiwei Lu
Mean Response Time Approximation for HTTP Transactions over Transport Protocols
Y. –J. Lee
Augmented Reality Mobile Application of Balinese Hindu Temples: DewataAR
Adi Ferliyanto Waruwu, I Putu Agung Bayupati, I Ketut Gede Darma Putra
Performance Evaluation of Power Aware VM Consolidation using Live Migration
Gaganpreet Kaur Sehdev, Anil Kumar
Controlling Information Flows in Net Services with Low Runtime Overhead
Shih-Chien Chou
Forensics Investigation of Web Application Security Attacks
Amor Lazzez, Thabet Slimani
Linear Crossed Cube (LCQ): A New Interconnection Network Topology for Massively Parallel System
Zaki A. Khan, Jamshed Siddiqui, Abdus Samad
Multipath Data Transmission with minimization of Congestion Using Ant Colony Optimization for MTSP and Total Queue Length
Dhriti Sundar Maity, Subhrananda Goswami
Effective Hybrid Intrusion Detection System: A Layered Approach
Abebe Tesfahun, D. Lalitha Bhaskari
Secure Usable Authentication Using Strong Pass text Passwords
C. Shoba Bindu
Server-Side Encrypting and Digital Signature Platform with Biometric Authorization
Leszek Siwik, Lukasz Mozgowoj
Innovative Method for Enhancing Key Generation and Management in the AES-Algorithm
Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem
DNS Pharming through PHP Injection: Attack Scenario and Investigation
Divya Rishi Sahu, Deepak Singh Tomar
Embedded Real-Time HTTP Server
Radosław Czarnecki, Stanislaw Deniziak
Global Trust: A Trust Model for Cloud Service Selection
Fatima Zohra Filali, Belabbes Yagoubi
Cumulative Techniques for Overcoming Security Threats in Manets
Ajay Koul, Mamta Sharma
Fast and Efficient Design of a PCA-Based Hash Function
Alaa Eddine Belfedhal, Kamel Mohamed Faraoun
Single Sign-On in Cloud Federation using CloudSim
Manoj V. Thomas, Anand Dhole, K. Chandrasekaran
ANM to Perceive and Thwart Denial of Service Attack in WLAN
Durairaj M, Persia A
Information Hiding Using Least Significant Bit Steganography and Cryptography
Shailender Gupta, Ankur Goyal, Bharat Bhushan
SD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE)
Somdip Dey
A Bootstrap Approach of Benchmarking Organizational Maturity Model of Software Product With Educational Maturity Model
R.Manjula, J.Vaideeswaran
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning
Alaeddin Almubayed, Ali Hadi, Jalal Atoum
An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys
Ali M. Meligy, Mohammed M. Nasef, Fatma T. Eid
Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing
Prakash G L, Manish Prateek, Inder Singh
A Survey on RC4 Stream Cipher
Poonam Jindal, Brahmjit Singh
New Region Growing based on Thresholding Technique Applied to MRI Data
A. Afifi, S. Ghoniemy, E.A. Zanaty, S. F. El-Zoghdy
Destination Address Entropy based Detection and Traceback Approach against Distributed Denial of Service Attacks
Abhinav Bhandari, A.L Sangal, Krishan Kumar
An Extended Approach for Efficient Data Storage in Cloud Computing Environment
Fatemeh shieh, Mostafa Ghobaei Arani, Mahboubeh Shamsi
Hardware Implementation of Fidelity based On Demand Routing Protocol in MANETs
Himadri N. Saha, Rohit Singh, Debika Bhattacharyya
Genetic Algorithm to Solve the Problem of Small Disjunct In the Decision Tree Based Intrusion Detection System
Chandrashekhar Azad, Vijay Kumar Jha
A 3-D Geometry based Remote Login 2-Way Authentication Scheme using Smart Card
Hari Om, Vishavdeep Goyal, Kunal Gupta
Anomaly Detection in Network Traffic Using Selected Methods of Time Series Analysis
Jarosław Bernacki, Grzegorz Kołaczek
A Hybrid Real-time Zero-day Attack Detection and Analysis System
Ratinder Kaur, Maninder Singh
Intrusion Detection Based on Normal Traffic Specifications
Zeinab Heidarian, Naser Movahedinia, Neda Moghim, Payam Mahdinia