Infonomics Society

Displaying 1-9 of 9 results

  • White Papers // Dec 2012

    State-of-the-Art of Virtualization, its Security Threats and Deployment Models

    Virtualization is an emerging technology which provides organizations with a wide range of benefits. But unluckily, from a security standpoint, functionality often takes precedence over a main area like security, leaving security to be retrofitted in later. This paper mainly emphasizes on several security threats that exists today in a...

    Provided By Infonomics Society

  • White Papers // Jun 2012

    Combating Malware Threat Using Hybrid Security Model

    Malware threat is continuously growing with sophistication. Though multiple layers of defense are provided at perimeter, network, host, application and data levels, it is still becoming a challenge to address malware related problems. They have grown in number as well as complexity and are responsible for attacks ranging from denial-of-service...

    Provided By Infonomics Society

  • White Papers // Jun 2012

    Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach

    This is a paper that focuses on enhancing the mitigation of bulk phishing email messages (i.e. email messages with generic socially engineered content that target a broad range of recipients). This paper is based on a phishing website detection technique that the authors have proposed previously. The previously proposed technique...

    Provided By Infonomics Society

  • White Papers // Jun 2012

    Injection and Evaluation of New Attacks on Ad Hoc Proactive Routing Algorithms

    Providing security of communications in Mobile Ad hoc NETworks (MANETs) is one of the most significant fields for researchers. In order to provide security, the first step is to recognize vulnerabilities and examine different implementable attacks regarding such networks. Secure routing is one of the most important security blind spots...

    Provided By Infonomics Society

  • White Papers // Jun 2012

    PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol

    Radio Frequency IDentification (RFID) is a technology used for automatic identification of objects, people, and virtually anything one can think of. Applications of RFID technology are expanding and its usage is being adopted worldwide. As such, major efforts have been made to secure the communications in RFID systems and to...

    Provided By Infonomics Society

  • White Papers // Dec 2011

    Display Integrity Assurance for SMS Transaction Authorization

    Secure online transactions with human users normally require visual display for verifying the correctness of central elements of the transaction before it is submitted. When commodity computer platforms get exposed to the Internet, even for a short period, there is a real and substantial risk that they become infected with...

    Provided By Infonomics Society

  • White Papers // Mar 2011

    Impact of Misconfiguration in Cloud - Investigation Into Security Challenges

    The purpose of this paper is to explore key concepts and ideas surrounding the security challenges of cloud computing, with particular reference to configuration having considerable impact on securing cloud services. It is critical that the concepts of exploitation and vulnerability, which evidence shows exist in Cloud use, are discussed...

    Provided By Infonomics Society

  • White Papers // Jun 2010

    An IEEE 802.21-Based Approach to Integrate Unidirectional Wireless Technologies Into QoS-Constrained Broadband Wireless Mesh Access Networks

    Wireless Mesh Networks (WMNs) research has matured in recent years and implementations are being tested around the world. In a WMN, participating nodes are automatically configured allowing them to communicate among their peers via multiple hops when no direct physical connectivity exists. This allows community networks such as Freifunk to...

    Provided By Infonomics Society

  • White Papers // Mar 2010

    Cloud Computing Storms

    Cloud Computing (CC) is seeing many organisations experiencing the 'Credit crunch', embracing the relatively low cost option of CC to ensure continued business viability and sustainability. The pay-as-one-go structure of the CC business model is typically suited to She's who do not have the resources to completely fulfill their IT...

    Provided By Infonomics Society

  • White Papers // Dec 2012

    State-of-the-Art of Virtualization, its Security Threats and Deployment Models

    Virtualization is an emerging technology which provides organizations with a wide range of benefits. But unluckily, from a security standpoint, functionality often takes precedence over a main area like security, leaving security to be retrofitted in later. This paper mainly emphasizes on several security threats that exists today in a...

    Provided By Infonomics Society

  • White Papers // Jun 2012

    Combating Malware Threat Using Hybrid Security Model

    Malware threat is continuously growing with sophistication. Though multiple layers of defense are provided at perimeter, network, host, application and data levels, it is still becoming a challenge to address malware related problems. They have grown in number as well as complexity and are responsible for attacks ranging from denial-of-service...

    Provided By Infonomics Society

  • White Papers // Jun 2012

    Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach

    This is a paper that focuses on enhancing the mitigation of bulk phishing email messages (i.e. email messages with generic socially engineered content that target a broad range of recipients). This paper is based on a phishing website detection technique that the authors have proposed previously. The previously proposed technique...

    Provided By Infonomics Society

  • White Papers // Mar 2010

    Cloud Computing Storms

    Cloud Computing (CC) is seeing many organisations experiencing the 'Credit crunch', embracing the relatively low cost option of CC to ensure continued business viability and sustainability. The pay-as-one-go structure of the CC business model is typically suited to She's who do not have the resources to completely fulfill their IT...

    Provided By Infonomics Society

  • White Papers // Jun 2010

    An IEEE 802.21-Based Approach to Integrate Unidirectional Wireless Technologies Into QoS-Constrained Broadband Wireless Mesh Access Networks

    Wireless Mesh Networks (WMNs) research has matured in recent years and implementations are being tested around the world. In a WMN, participating nodes are automatically configured allowing them to communicate among their peers via multiple hops when no direct physical connectivity exists. This allows community networks such as Freifunk to...

    Provided By Infonomics Society

  • White Papers // Mar 2011

    Impact of Misconfiguration in Cloud - Investigation Into Security Challenges

    The purpose of this paper is to explore key concepts and ideas surrounding the security challenges of cloud computing, with particular reference to configuration having considerable impact on securing cloud services. It is critical that the concepts of exploitation and vulnerability, which evidence shows exist in Cloud use, are discussed...

    Provided By Infonomics Society

  • White Papers // Jun 2012

    Injection and Evaluation of New Attacks on Ad Hoc Proactive Routing Algorithms

    Providing security of communications in Mobile Ad hoc NETworks (MANETs) is one of the most significant fields for researchers. In order to provide security, the first step is to recognize vulnerabilities and examine different implementable attacks regarding such networks. Secure routing is one of the most important security blind spots...

    Provided By Infonomics Society

  • White Papers // Dec 2011

    Display Integrity Assurance for SMS Transaction Authorization

    Secure online transactions with human users normally require visual display for verifying the correctness of central elements of the transaction before it is submitted. When commodity computer platforms get exposed to the Internet, even for a short period, there is a real and substantial risk that they become infected with...

    Provided By Infonomics Society

  • White Papers // Jun 2012

    PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol

    Radio Frequency IDentification (RFID) is a technology used for automatic identification of objects, people, and virtually anything one can think of. Applications of RFID technology are expanding and its usage is being adopted worldwide. As such, major efforts have been made to secure the communications in RFID systems and to...

    Provided By Infonomics Society