International Journal of Computer Science and Network Security

Displaying 1-40 of 435 results

  • White Papers // Feb 2015

    Highly Efficient Kerberos Style Authentication and Authorization for Cloud Computing

    Cloud computing is an emerging, on-demand and internet based technology used by global customers to improve their business performance. Cloud is highly scalable, flexible and platform in dependable which has security loopholes like attacks, data loss, other authentication and security issues. This paper presents Kerberos system which achieves security goals...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2015

    An Efficient Location and Detection (ELD) based Mobile ad-hoc Networks Implementation with Embedded Systems

    A Mobile Ad-hoc NETwork (MANET) is a temporary wireless network composed of mobile nodes, in which an infrastructure is absent. If two mobile nodes are within each other's transmission range, they can communicate with each other directly; otherwise, the nodes in between have to forward the packets for them. Several...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2015

    Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS

    "Cloud computing has been proved as a boon to distributed computing over a network, having ability to run a program on many connected computing at a same time. It is network based service provided by real server hardware, in fact served by virtual network. It is essential for using any...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2015

    Dynamic Resource Allocation Using Skewness Algorithm in Cloud Computing

    "Cloud computing is the latest technology used by many organizations in this competitive world. As many organizations are using cloud computing technology, the major issue is resource allocation as pay-per-use on demand basis. In cloud environments, efficient resource provisioning and management is a challenging issue because of the dynamic nature...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2015

    Role of Threshold Cryptography in Securing MANETs

    "Distributed environments are becoming more popular as these technologies such as mobile and ad hoc networks, aim to enable large scale cooperation for resource sharing framework. Secure authentication is the challenging issue for such environments. The authors studied the role of threshold cryptography in securing the MANETs, revealing the authorization...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2015

    Modified Self-Selection Routing Algorithm for Wireless Sensor Networks

    "Wireless sensor networks have been the source of increasing interest for researchers because they gather information from multiple sources at the same time. This technology allows small sensors to be distributed across a geographical region to collect data, which is sent to a main server via a routing algorithm to...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2015

    Fixed Wings UAV Direction Control "Hardware Design"

    The goal is to design of Unmanned Aerial Vehicle "UAV" system through the control of a stable fixed-wing aircraft to accomplish inexpensive, simple, and still efficient aircrafts by adding an inertial circuitry to the airplane that consists of a GPS (Global Positioning System) unit, a microcontroller unit and other devices....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2014

    Intrusion Feature Selection Algorithm Based on Particle Swarm Optimization

    "High-dimensional intrusion detection data concentration information redundancy results in lower processing velocity of intrusion detection algorithm. Accordingly, the current study proposes an intrusion feature selection algorithm based on Particle Swarm Optimization (PSO). Analyzing the features of the relevance between network intrusion data allows the PSO algorithm to optimally search in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2014

    Metaheuristic Approaches for Gateway Placement Optimization in Wireless Mesh Networks: A Survey

    Recently, Wireless Mesh Networks (WMNs) have gained significant roles in communication technologies and have been used in many applications with high sensitivity to packet loss, delay and transmission time. Therefore, many researchers paid their attention for solving WMNs related issues. The WMN consists of Mesh Routers (MRs) and Mesh Clients...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    A Novel Aggregations Approach for Preparing Datasets

    Data mining plays an important role in real-time applications for extracting business intelligence from business data and make expert decisions. Datasets are used in order to mine data for the purpose of discovering knowledge from data. However, preparing datasets manually is a tedious task. The reason behind it is that...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    Video Quality Challenges in Wireless Networks

    Wireless support is now available in most devices. Streaming video over networks is a big challenge that faced by most companies working in technology development. Giving the best quality and high throughput performance is an ongoing issue. The quality depends on many factors likes bound rates and stringency of the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    Intrusion Detection and Prevention Systems (IDPS) and Security Issues

    With computer systems increasingly under attack, information security is more serious in user views. Security protects computer and everything associated with it including networks, terminals, printers, cabling, and disks and most important, it protects the available information in this environment. Technical solutions, introduced by policies and implantations are essential requirements...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    A Study of Electronic Ticket Verification Methods

    Information and Communication Technologies (ICT) and Electronic Commerce (EC) are flourishing dramatically. Furthermore, using electronic ticket is possible to reduce the costs of ticket management for companies and users. The business organizations have been restlessly evaluating the revenue potential of the electronic tickets market and exploit the profit potential of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    Securing the Payment Card Data on Cloud Environment: Issues & Perspectives

    Cloud computing is a new IT model that, just like electricity and water, which were firstly generated at home and evolved to be supplied from utility providers, aims to transform computing resources sharing into an utility. This enables startups and other companies to start computing services without having to invest...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2014

    Functional Validation of Inter Processor Communication through Dynamic Analysis

    The major role of Inter Processor Communication (IPC) driver is to transfer data between an application processor and a communication processor. In order to sustain a stabilized performance of the upper framework of radio interface layer and telephony application, the driver should be thoroughly examined. In traditional method, however, the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2014

    Improving The Performance of Adhoc Network Using Hybrid Method

    Infrastructured network consists of fixed base stations while communications take place using technique handoff. It connects with new base station and start communication when mobile goes out of range of one base station. Advantages over ad-hoc networks are efficiently utilized network resources and single-hop routes, results in: lower delay and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2014

    IPv6 : Threats Posed by Multicast Packets, Extension Headers and Their Counter Measures

    Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major issues in the world of networking today. Since it is not the default network protocol deployed now-a-days (but systems are migrating slowly from ipv4 to ipv6) there are no best practices from the point of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2014

    Secured Routing through Multi Stage Authentication in MANETs

    Mobile Ad hoc NETworks (MANETs) are characterized by the absence of fixed infrastructure, rapid topology change and high node mobility. These characteristics determine that wireless ad hoc network is more vulnerable to malicious attacks than the traditional Internet. Among many malicious attacks, a novel method is proposed to eliminate black...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Margin Adaptive Power Allocation Using Channel State Information in OFDMA Systems

    In this paper, the authors present the margin adaptive resource allocation using full CSIT (Channel State InformaTion) and statistical CSIT in OFDMA systems. In the past, Monte-Carlo snap-shots in the MA problem is far too complex, an analytical expression of the outage capacity as a function of the Signal-to-Noise Ratio...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    New Trends in Intrusion Awareness System Based on SVM Classification

    Network intrusion awareness is important factor for risk analysis of network security. In the current decade various method and framework are available for intrusion detection and security awareness. Some method based on knowledge discovery process and some framework based on neural network. These entire model take rule based decision for...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    A Survey of Clustering Uncertain Data Based Probability Distribution Similarity

    Clustering is one of the major tasks in the field of data mining. The main aim of the clustering is grouping the data or similar objects into one group based on their data find the similarity between the objects. Clustering of uncertain data have been becoming the major issues in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Password Authentication with Secured Login Interface at Application Layer

    In this paper, the authors present an innovative solution to the old problem of password security at application layer or input level. In their solution, each of the various lower case & upper case characters, special characters, digits from which a password could be comprised is encoded with a random...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Data Integrity Mechanism Using Hashing Verification

    In this paper, the authors propose a new one-way hash algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, hash algorithm can be used to determine if two values are equal, a hash function maps keys to small values. DILH algorithm using linear...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Mobility Prediction Algorithm to Improve the Routing Performance in MANET

    One of the major challenges in Mobile Ad hoc NETworks (MANETs) is link failure due to mobility. If the degree of mobility of any node in any route increases, the route lifetime decreases. That causes frequent link failures, and results more packet loss and low throughput. Packet loss requires packet...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Prevention of Selective Jamming Attacks by Using Packet Hiding Methods

    The open nature of the wireless medium leaves it too weak to intentional interference attacks, typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting denial-of-service attacks on wireless networks. Typically, jamming has been introduced under an external threat model. However,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    Algorithms for Data-Compression in Wireless Computing Systems

    Data Compression can be defined as encoding the information using the small number of bits rather than original representation. There are two types of data compression, lossless and lossy compression. Compression is a technique used for reducing data size by manipulating data redundancy; so that the packet transmission time and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2014

    An On-Chip Delay Measurement Technique for Small-Delay Defect Detection Using Signature Registers

    In this paper, the authors present a delay measurement technique using signature analysis and a scan design for the proposed delay measurement technique to detect small-delay defects. The proposed measurement technique measures the delay of the explicitly sensitized paths with the resolution of the on-chip variable clock generator. The proposed...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Security Analysis in Open Source Linux Network

    Simple way Linux is an operating system. It is the usage of software on a computer that enables applications and the computer operator to access the devices on the computer to perform desired function. Linux operating system is very similar to other operating systems such as windows and OS X....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Graphical Secure Password Method Against Online Password Hackers(Guessing Attacks)

    Passwords are a common form of authentication and are often the only barrier between a user and their personal information. There are several programs attackers can use to help guess or \"Crack\" passwords, but by choosing good passwords and keeping them confidential, the user can make it more difficult for...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Comparative Analysis of Performance of 3G Networks Over TCP Protocols

    Third Generation (3G) systems develop faster communications services, including voice, fax and Internet, anytime and anywhere with seamless global roaming global standard for 3G has opened the way to enabling innovative applications and services multimedia entertainment, infotainment and location-based services, among other. 3G networks are getting day-by-day popular and they...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Performance Analysis of Classifiers for Intrusive Data and Rough Sets Reducts

    The fast change in the day-to-day activity need to analyze the intrusive data very accurately without losing performance. Intrusive behavior is critical for analyzing the data and performance is crucial in the computational environment, when the user requires accuracy in the results. Finding intrusive behavior in the network with accuracy...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Energy Efficient Mobile Replica Detection in Wireless Sensor Network Based on Modified Sequential Probability Ratio Test

    In wireless sensor network, an attacker can capture sensor nodes and can compromise sensor nodes. Then would create duplicate nodes and built up various attacks using duplicate nodes, inserts into the network. This is happened because of unattended nature of wireless sensor network. These attacks helps attacker to control few...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Application of Compound Chaotic Mapping in Voice Encryption Algorithm

    Using the devaney chaos theory, designed a compound chaotic mapping as the encryption function, and had proven that the track was non-periodic for the initial value of a finite decimal. The authors have designed an encryption algorithm successively according to this, and realized the encryption for sound documents. Afterward the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Using Unitary Matrices in High-Speed Video Encryption

    Encryption computational complexity and encryption speed are two important aspects of video encryption algorithms. Due to its increasingly large size, video images present a great challenge to currently available cryptographic algorithms; the processes of encryption and decryption of video images are so computationally intensive that they introduce delays beyond acceptable...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Energy Efficient Power Aware Multipath Dynamic Source Routing

    The versatile uses of Mobile Ad hoc NETworks (MANETs) have elicited everyone's attention and offer a lot of challenges to the researchers. Due to absence of central coordinators in ad hoc networks all the necessary actions are played by the individual node. Nodes major responsibility is routing and many routing...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Multi-Parameter Summarization for Software Architecture Recovery

    Software architecture is identified as an important element in the successful development and evolution of software systems. In spite of the significant role of architecture representation and modeling, many existing software systems like legacy or eroded ones do not have a consistent architecture representation. There have been several algorithms on...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Video Quality Adaptation to Improve The Quality of Experience in DASH Environments

    Recently, DASH (Dynamic Adaptive Streaming over HTTP) is gaining attention because it is possible to use an existing web server, and not be restricted by the firewall or NAT (Network Address Translator). However, the existing video quality adaptation methods for DASH do not consider the frequent change of video quality,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Peer Trust Based Trust and Reputation Model for Wireless Sensor Networks to Protect Border

    Border security has become a high-priority issue in many countries around the world. The conventional border surveillance or petrol systems consist of check points and border troops but it does not provide the complete security. In addition to that smart fencing is a solution to extend the eyes and ears...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    A Novel Approach in Classification by Evolutionary Neural Networks

    Artificial neural network is an interconnected group of natural or artificial neurons that uses a mathematical or computational model for information processing based on a connectionist approach to computation. Neural network optimization based on three basic parameters topology, weights and the learning rate. The overfitting is a problem in NN...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2014

    Haptic Science and Technology

    Haptic technology, or haptics, is a tactile feedback technology which takes advantage of a user's sense of touch by applying forces, vibrations, and/or motions upon the user. This mechanical stimulation may be used to assist in the creation of virtual objects (objects existing only in a computer simulation), for control...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // May 2010

    Policy Based Decentralized Group Key Security for Mobile Ad-Hoc Networks

    The unique characteristics and constraints of MANET have made the traditional approach to security inadequate. With this view in mind decentralized group key management is taken into consideration. A novel structure of the node is proposed and each entity holds a secret share SSi of each node in cluster is...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2009

    Integration of Quantum Key Distribution in the TLS Protocol

    Quantum Key Distribution (QKD) or quantum cryptography has been developed within the last decade; it is proved that QKD is secure against computer attacks and it is considered as a promising solution towards absolute security within long-term cryptosystems. Currently, research efforts are required to make strongly secure the existing communication...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2009

    Security Based Multiple Bayesian Models Combination Approach

    Decision making in medical domain often involves incorporating new evidences into existing or working models reflecting the decision problems at hand. The authors propose a new framework that facilitates effective aggregation of multiple Bayesian Network models. The proposed framework aims to minimize time and effort required to customize and extend...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2009

    Hardware Implementation of the Chameleon Polymorphic Cipher-192

    The Chameleon Cipher-192 is a polymorphic cipher that uses a variable word size and variable-size user's key. The cipher employs a shuffler and two nonlinearity-associated filters for selective addition. The cipher structure is based on the simultaneous use of block and stream cipher approaches. Other elements of the cipher include...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2009

    Design and Evaluation of Policy Based Authorization Model for Large Scale Distributed Systems

    Large scale distributed systems enable sharing of resources and services scattered over geographically dispersed, heterogeneous, autonomous administrative domains. Two main entities interacting with each other over a distributed system are service requesters and service providers. The service requesters belonging to a particular administrative domain may request access to resources/services available...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2009

    Deriving Call Holding Time Distribution in Cellular Network From Empirical Data

    The call holding time distribution in cellular systems is one of the main parameters that are used to study and analyze several system performance measures. Several statistical distributions have been used in the literature to model the call holding time distribution in 3rd and 4th generations cellular systems, such as...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2009

    Security Vulnerability Analysis and Forensic Data Research to Attacks on Mobile Stock Trading System in WiBro Network

    A financial transaction is becoming activation, and financial accident is frequently occurring at mobile terminals by a spread of the Ubiquitous Era on the latest date. The authors execute an attack regarding mobile stocks transactions system from WiBro networks at this paper, and they study a Security Vulnerability Analysis infringement...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2009

    Pattern Recognition Techniques Applied to Evaluation Engineering Problem

    The purpose of this paper is to present a Pattern Recognition methodology composed by Multivariate Statistical Analysis techniques, in order to build a Multiple Linear Regression statistical model to evaluate real estates according to their characteristics (variables, attributes). First, a Clustering Analysis was applied to the data of each urban...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2009

    MANET Security Issues

    When a routing protocol for manet Networks (mobile and ad hoc networks) does a route discovery, it does not discover the shortest route but the route through which the route request flood traveled faster. In addition, since nodes are moving, a route that was the shortest one at discovery time...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2009

    The Architectural Review of Web Security in Static and Dynamic Analysis

    Its objective in web security is to move black box to white box in enterprise practices. This paper explains how approaches achieve the goal in terms of static and dynamic analysis. To better explain the framework and roadmap of analysis work, it describes approaches by using macro and micro views...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2010

    Automation of Data Warehouse, Extraction, Transformation and Loading Update Cycle

    Businesses today are largely dependent on access to right information at the right time. With vast amounts of data being processed on a minute to minute basis, it is of vital importance that managers and decision makers have access to the latest updates in their information database at all point...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2010

    Framework to Represent the Software Design Elements in Markup Text - Design Markup Language (DGML)

    The software design document bridges the requirement phase activity with the implementation phase activity. Design elements are having pictorial information about the possible solution for requirements. Software modules are written from these documents. If the paper can represent these design elements in well-defined text format, many experiments are possible on...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2010

    An Object Oriented Modeling and Implementation of Web Based ETL Process

    The data warehousing environment includes components that are inherently technical in nature. These cleansing components function to extract, clean, model, transform, transfer and load data from multiple operational systems into a single coherent data model hosted within the data warehouse. The analytical environment is the domain of the business users...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2012

    Analytical Scenario of Software Testing Using Simplistic Cost Model

    Software can be tested either manually or automatically. The two approaches are complementary: automated testing can perform a huge number of tests in short time or period, whereas manual testing uses the knowledge of the testing engineer to target testing to the parts of the system that are assumed to...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2012

    Performance Evaluation of Dynamic Particle Swarm Optimization

    In this paper the concept of dynamic particle swarm optimization is introduced. The dynamic PSO is different from the existing PSO's and some local version of PSO in terms of swarm size and topology. Experiment conducted for benchmark functions of single objective optimization problem, which shows the better performance rather...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2012

    High Performance Efficiency of Distributed Optical Fiber Raman Amplifiers for Different Pumping Configurations in Different Fiber Cable Schemes

    Fiber Raman Amplifiers (FRAs) are attractive for Ultra Wide Dense Wavelength Division Multiplexing (UW-DWDM) transmission systems due to their advantages of broad amplification bandwidth and flexible central wavelength. With recent developments of optical pump sources with high power near 1.4 ?m wavelength and highly nonlinear fiber having a peak effective...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Feb 2012

    Modified Small Business Network Security

    This paper covers some likely threats and effective steps for a secure small business. It also involves a flowchart to comprehend the overall small business network security easily and the authors identify a set of security issues and apply appropriate techniques to satisfy the corresponding security requirements. In respect of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Apr 2012

    High-Speed Multiplier Design Using Multi-Operand Multipliers

    Multiplication is one of the major bottlenecks in most digital computing and signal processing systems, which depends on the word size to be executed. This paper presents three deferent designs for three-operand 4-bit multiplier for positive integer multiplication, and compares them in regard to timing, dynamic power, and area with...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Apr 2012

    A Novel Authenticity of an Image Using Visual Cryptography

    A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    3-Layer Security Using Face Recognition Layer Recognition in Cloud

    In cloud computing databases are the centralized large data centers, where the management of the data and services may not be fully trust worthy which is provided by large amount of computing and storage to customers provisioned as a service over the internet. Due lack of proper security and weakness...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    GPS Integrategps Integrated Navigation System

    The project is an application to facilitate the car drivers with some artificial intelligence and other helping features/guidance. This will be used or implemented in the near future by various car companies. So, the authors' project is mainly a navigation system for car drivers along with a map of the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    RFID Based Bill Generation and Payment Through Mobile

    Emerging electronic commerce becomes popular together with the considerable increase of mobile device. Since mobile payments will become one of the most important mobile services. Here the authors are generating a bill in Super market and billing it through mobile. The most important consideration is the security of the mobile...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    Reliability Oriented Transporreliability Transport Protocol in WSN

    Wireless sensor network is a special form of wireless networks dedicated to surveillance and monitoring applications Reliability in wireless sensor network is application specific. The specific form of reliability might change from application to application. The authors' idea is to generate reliability based transport protocol that is customizable to meet...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    Detecting Sinking Behavior at MAC and Network Layer Using SVM in Wireless Ad hoc Networks

    Wireless Ad hoc networks present more security problems than the conventional wired and wireless networks because of the nature of dynamically changing and a fully decentralized topology. As the Ad hoc network lacks infrastructure the nodes have to cooperate for services like routing and data forwarding. This paper proposes a...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    Minimizing the Overhead in the Terminode Routing Protocol Minimizing Protocol in Mobile Adhoc Networks

    In this paper, the authors present an approach of using Optimized Link State Routing Protocol (OLSR) in the terminode routing method. Terminode routing uses the combination of location based routing i.e. Terminode Remote Routing (TRR), used when the destination is far and Link state routing i.e. Terminode Local Routing (TLR),...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    Use of Inheritance Feature in Relational Database Development Use Development

    Currently object-relational database technology is setting the direction for the future of data management. The appearance of Object-Relational DataBase (ORDB) technology into the business database market caused the database user's attention in search of how to utilize its object-oriented features in the database development. Although the ORDB technology is already...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Analysis of Various Clustering and Classification Algorithms in Datamining

    The term "Classification" is frequently used as an algorithm for all data mining tasks. Instead, it is best to use the term to refer to the category of supervised learning algorithms used to search interesting data patterns. While classification algorithms have become very popular and ubiquitous in DM research, it...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Performance Versus Cost of a Parallel Conjugate Gradient Method in Cloud and Commodity Clusters

    Cloud computing is an emerging technology to run HPC applications using computing resources on a pay per use basis. The CG method is a linear solver which is used in many engineering and scientific applications, and is computationally demanding. The authors implement different approaches of a parallel CG method and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Virtualization in Intrusion Detection Systems: A Study on Different Approaches for Cloud Computing Environments

    This paper presents an overview of some of the major works that focus on the use of virtualization in intrusion detection systems to protect against threats in cloud computing environments. The elasticity and abundant availability of computational resources are attractive to attackers in order to exploit vulnerabilities of the cloud,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    A Low Rate DDoS: A Security Threat in Mobile Adhoc Networks

    Network security is soft spot in wired or wireless networks, MANETS pose number of non-trivial challenges to the security design, such as shared wireless medium, dynamically changing topology, etc. DoS and DDoS are two of the most harmful threats to the network. MANETS are more vulnerable to these attacks. In...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2010

    An Efficient Materialized View Selection Approach for Query Processing in Database Management

    Quick response time and accuracy are important factors in the success of any database. In large databases particularly in distributed database, query response time plays an important role as timely access to information and it is the basic requirement of successful business application. A data warehouse uses multiple materialized views...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Design and Implementation of Fuzzy Temperature Control System for WSN Applications

    With its low power embedded sensingactuation, computing, wireless RF communications and multi-hop mesh networking capabilities, Wireless Sensor Network (WSN) has emerged as one of the popular multidisciplinary technologies of the 21st century. Present day research trends focus on application specific deployment of network hardware with information processing, integrating it into...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Investigating The Effect of The Carrier Frequency Offset(CFO) and Frequency Synchronization on The Performance of The OFDM Wireless Systems

    Orthogonal Frequency Division Multiplexing (OFDM) is a modulation schema that due to the high spectral efficiency and the simplicity of the receiver implementation is the most common system for using in broadband communication systems. Although OFDM has been used in numerous wireless communication systems, but two of the main problems...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Design of Stream Cipher for Text Encryption using Soft Computing based Techniques

    In cryptography, encryption is the process of transforming information referred to as plain-text using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is information which is, referred to as cipher-text. Stream...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Towards Minimizing Human Factors In End-User Information Security

    Today, many hardware and software solutions are available to enhance information security, however, little is known about the human factor in information security. Other researchers have revealed that the application of information security technologies alone does not always result in improved security. Human factors immensely contribute to the security of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    A Virtualised High Trust Zone (VHTZ) to Mitigate the Security and Privacy Issues in Cloud Computing

    The benefits of cloud computing are clearly well known which include rapid deployment, ease of customization, reduce cost and low risks. However, some high profile security breaches confuse organizations as they attempt to deploy cloud services in their businesses. Although, the cloud service providers pitch the security of their services....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Smart Decision Making for Internal Attacks in Wireless Sensor Network

    An information procuring and processing emerging technology Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain autonomous nodes. It communicates short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Survey of Web Application and Internet Security Threats

    Computer and network security are one of the most challenging topics in the Information Technology research community. Internet security is a significant subject that may affect a wide range of Internet users. People that use Internet to sell, buy and even to communicate needs their communications to be safe and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    Energy-Efficient Dynamic Source Routing Protocol for Wireless Sensor Networks

    Routing presents a significant design challenge to meet various applications requirements in Wireless Sensor Networks (WSNs) communications. In this paper, the authors present a minimum delay multipath routing protocol with modification to the standard Dynamic Source Routing (DSR) protocol, which aims to improve energy efficiency and minimize end-to-end delay to...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    Security Challenges in 3G Systems

    This paper explains the authentication and encryption scheme used in GSM. It explains the different possible attacks on cellular systems, which include SIM cloning, eavesdropping, location tracking, SMS ping, SMS denial of service, authentication denial of service and SMS spam. It classifies these attacks on the basis of target of...

    Provided By International Journal of Computer Science and Network Security