Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
A fault-tolerant improved OLSR protocol using k-Connected m-Dominating set
Security protocol of keys management system for transmission encrypted data
Achieving confidentiality in electronic health records using cloud systems
Validation of an adaptive risk-based access control model for the internet of things
Application of geo-location-based access control in an enterprise environment
Using homomorphic cryptographic solutions on E-voting systems
Comparative analysis of classification algorithms for email spam detection
Verification of cloud based information integration architecture using colored petri nets
An improved model for securing ambient home network against spoofing attack
A comprehensive review of congestion control techniques in M2M and cellular networks
Acoustic lightweight pseudo random number generator based on cryptographically secure LFSR
Effective use method of cloudlet resources by mobile users
An implementation of software routing for building a private cloud
Performance analysis of classification techniques by using multi Agent based intrusion detection system
Optimization of different queries using optimization algorithm (DE)
The method of hidden terminal transmission of network attack signatures
Chaotic Genetic-fuzzy encryption technique
Linear improved gravitational search algorithm for load scheduling in cloud computing environment (LIGSA-C)
Intelligent energy aware fidelity based on-demand secure routing protocol for MANET
Impact of IPv4, IPv6 and dual stack interface over wireless networks
A novel approach to thwart security attacks on mobile pattern authentication systems
Computer security and software watermarking based on return-oriented programming
A solution to secure personal data when Aadhaar is linked with DigiLocker
Cryptography based on RGB color channels using ANNs
Ensure symmetrical traffic flow, to prevent the dropping of response packet by the firewall, on the active-active data centers
Efficient multimedia transmission over scalable IoT architecture
An experimental evaluation of tools for estimating bandwidth-related metrics
Ethical network surveillance using packet sniffing tools: a comparative study
Assessing vulnerability of mobile messaging apps to man-in-the-middle (MitM) attack
Investigating and analyzing bitcoin blockchain protocol using wireshark
Simulation analysis of OLSR and its variant with cooperative MPR selection on NS-2.35 in mobile ad-hoc networks
A state-of-the-art survey of coverless text information hiding
Internet of things for the prevention of black hole using fingerprint authentication and genetic algorithm optimization
A solution for water factories in Vietnam using automatic meter reading technology
Implementing security features in MANET routing protocols
Design and implementation of malware detection scheme
Role of scripting language on Unix operating system for risk assessment
Verification of web content integrity: detection and recovery security approach using colored petri nets
Mobility support and operation of information centric networking approach
MANETs: QoS and investigations on optimized link state routing protocol