Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Verification of web content integrity: detection and recovery security approach using colored petri nets
Sherin Hijazi, Amjad Hudaib
Mobility support and operation of information centric networking approach
Muktar Hussaini, Shahrudin A. Nor, Amran Ahmad, Inusa Sani Maijama’a, Adamu Isah, Abdullahi Aminu
MANETs: QoS and investigations on optimized link state routing protocol
Lakshman Naik.L, R.U.Khan, R.B.Mishra
Component importance measures based risk and reliability analysis of Vehicular Ad Hoc Networks
Rakhi, G.L.Pahuja
Hybrid KP-ABE algorithm with time bounded access control for cloud data security
Bhumika Dahat, Nischol Mishra, Santosh Sahu
QoS oriented cross-synch routing protocol for event driven, mission-critical communication over MANET: Q-CSRPM
Shashi Raj K., Siddesh G. K.
Novel secured biometric system procuring miniaturized prorogation
Sherin Zafar, Ayesha Hena Afzal, M. Afshar Alam
Cuckoo optimisation based intrusion detection system for cloud computing
D. Asir Antony Gnana Singh, R. Priyadharshini, E. Jebamalar Leavline
An integrated perceptron kernel classifier for intrusion detection system
Ruby Sharma, Sandeep Chaurasia
Identification of compromised nodes in MANETs using machine learning technique
Rodney Sebopelo, Bassey Isong, Naison Gasela
Understanding the evolution of ransomware: paradigm shifts in attack structures
Aaron Zimba, Mumbi Chishimba
A critical appraisal on password based authentication
Amanpreet A. Kaur, Khurram K. Mustafa
Cyber security and analysis of cyber-crime laws to restrict cyber crime in Pakistan
Qamar Atta Ul Haq
PSO and TLBO based reliable placement of controllers in SDN
Ashutosh Kumar Singh, Naveen Kumar, Shashank Srivastava
Deep learning approach on network intrusion detection system using NSL-KDD dataset
Sandeep Gurung, Mirnal Kanti Ghose, Aroj Subedi
Network intrusion detection system based PSO-SVM for cloud computing
Mahmoud M. Sakr, Medhat A. Tawfeeq, Ashraf B. El-Sisi
Conceptual model of national intellectucal system for children safety in internet environment
Rasim Alguliyev, Sabira Ojagverdieva
IoT: application protocols and security
Derek Johnson, Mohammed Ketel
On the impact of perceived vulnerability in the adoption of information systems security innovations
Mumtaz Abdul Hameed, Nalin Asanka Gamagedara Arachchilage
A feed-forward and pattern recognition ANN model for network intrusion detection
Ahmed Iqbal, Shabib Aftab
A novel scheme for isolation of distributed denial of service attack in VANETs
Palak Shandil, Rakesh Kumar
A DOS and network probe attack detection based on HMM using fuzzy inference
Mohsen Salehi, Jamal Karimian, Majid Vafaei Jahan
Intrusion detection using machine learning and feature selection
Prachi, Heena Malhotra, Prabha Sharma
Construction for searchable encryption with strong security guarantees
István Vajda
IAMIN: An infrastructure-aware middleware for the reconfiguration of unstructured Peer-to-Peer overlay networks
Morteza Alizadeh, Arash Ghafouri, Mohsen Sharifi
Distributed wormhole attack mitigation technique in WSNs
Sharada Kori, Krishnamurthy G. N., Nandini Sidnal
A new classification based model for malicious PE files detection
Imad Abdessadki, Saiida Lazaar
Blind payment protocol for payment channel networks
Zhengbing Hu, Ivan Dychka, Mykola Onai, Yuri Zhykin
A privacy-aware dynamic authentication scheme for IoT enabled business services
Nitin Singh Chauhan, Ashutosh Saxena, JVR Murthy
Secure data transmission of video steganography using Arnold scrambling and DWT
Hnin Lai Nyo, Aye Wai Oo
Open source intelligence testing using the OWASP version 4 framework at the information gathering stage (Case Study: X Company)
I Putu Agus Eka Pratama, Anak Agung Bagus Arya Wiradarma
An improved DNA based security model using reduced cipher text technique
Lalit Mohan Gupta, Hitendra Garg, Abdus Samad
Agent based trust establishment between vehicle in vehicular cloud networks
Shailaja S. Mudengudi, Mahabaleshwar S. Kakkasageri
Data mining based framework for effective intrusion detection using hybrid feature selection approach
B.A. Manjunatha, Prasanta Gogoi, M. T. Akkalappa
Parameter training in MANET using artificial neural network
Baisakhi Chatterjee, Himadri Nath Saha
An improved method for packed malware detection using PE header and section table information
Nahid Maleki, Mehdi Bateni, Hamid Rastegari
An approach to develop a transactional calculus for semi-structured database system
Rita Ganguly, Anirban Sarkar
A classification framework to detect DoS attacks
Ahmed Iqbal, Shabib Aftab, Israr Ullah, Muhammad Anwaar Saeed, Arif Husen
An efficiency optimization for network intrusion detection system
Mahmoud M. Sakr, Medhat A. Tawfeeq, Ashraf B. El-Sisi
Security policy modelling in the mobile agent system
Hassan Razouki