International Journal of Computer Science and Network Security

Displaying 1-40 of 265 results

  • White Papers // Jan 2014

    Outlier Analysis of Categorical Data Using NAVF

    Outlier mining is an important task to discover the data records which have an exceptional behavior comparing with other records in the remaining dataset. Outliers do not follow with other data objects in the dataset. There are many effective approaches to detect outliers in numerical data. But for categorical dataset...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2014

    Fuzzy Logic Approach to Improving Stable Election Protocol for Clustered Heterogeneous Wireless Sensor Networks

    The wireless sensor network is composed of a set of nodes which energy is limited in terms of computing, storage and communication power. In this network, a few nodes become cluster head which causes the energetic heterogeneity of the network, therefore the behavior of the sensor network becomes very unstable...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2014

    Web Usage Mining Through Efficient Genetic Fuzzy C-Means

    In process of knowledge discovery from any web-log dataset, most widely and extensively used clustering algorithm for this purpose is Fuzzy C-Means (FCM) algorithm because the data of web-log is unsupervised dataset. Due to sensitivity of FCM, it can be easily trapped in a local optimum, and it is also...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2014

    IRIS Recognition Using Conventional Approach

    The proper functioning of many of the users' social, financial, and political structures now-a-days relies on the correct identification of people. Reliable and unique identification of people is a difficult problem; people typically use identification cards, usernames, or passwords to prove their identities, however passwords can be forgotten, and identification...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2014

    Cryptography Based On Hash Function BLAKE 32 in VLSI

    An important commodity in the world of electronic communication is information. The protection of authenticity and integrity of information is necessary to achieve a secure communication between communicating parties. Electronic security is becoming increasingly important as the Internet and other forms of electronic communication become more prevalent. BLAKE is a...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jan 2014

    Optimized Intrusion Detection by CACC Discretization Via Na

    Network Intrusion Detection System (IDS), as the main security defending technique, is second guard for a network after firewall. Data mining technology is applied to the network intrusion detection, and Precision of the detection will be improved by the superiority of data mining. For IDS many machine learning approaches are...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Proposed Architecture for Automatic Conversion of Unstructured Text Data into Structured Text Data on the Web

    Data mining, and in particular text mining, has attracted much attention in recent years due to the vast amounts of data available, and the rate of growth. Data mining tools can be used to uncover patterns or hidden relations in the available data, and can potentially contribute greatly to business...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    GPS Test Performance: Elastic Execution Applications Between Mobile Device and Cloud to Reduce Power Consumption

    Mobile systems, such as smart phones, have become the primary computing platform for many users. Smartphone's stimulate growth of Global Position Systems (GPS). However, Smartphone mobile computing faces challenges because of the limited battery capacity. Therefore, it is necessary to offload the computation-intensive part by careful partitioning of application functions...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    An Empirical Study on Similarity Between Documents in Nptel Application Using Clustering Techniques

    In this paper, the authors present a tutorial overview of the main clustering methods used in data mining. The goal is to provide a self-contained review of the concepts and the similarity underlying clustering techniques. The paper begins by providing measures and criteria that are used for determining whether two...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Context Awareness through Cross-Layer Network Architecture

    Layered architectures are not sufficiently flexible to cope with the dynamics of wireless-dominated next generation communications. Cross-layer approaches may provide a better solution: allowing interactions between two or more nonadjacent layers in the protocol stack. Cross-layer architectures based on purely local information will not be able to support system-wide cross-layer...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Face Detection and Recognition Using Ada Boost-ICA Algorithm

    Face recognition mainly involves recognizing personal identity, based on statistical as well as geometrical features which are derived from face images .This paper presents an automated system for human face recognition in a real time background world for a large homemade dataset of persons face. The task is very difficult...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Fault Tolerance in SIP Push-To-Talk Service

    Push-to-Talk (PTT) is a well known service in the law enforcement and public safety communities, where coordination and spectral efficiency are key for efficient communication. Push-to-Talk (PTT) is a useful capability for rapidly deployable wireless mesh networks used by first responders. PTT allows several users to speak with each other...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Face Recognition Using Singular Value Decomposition Along with Seven State HMM

    In this paper, the authors present a new approach using Hidden Marko Model as classifier and Singular Values Decomposition (SVD) coefficients as features for face recognition. As face is a complex multi-dimensional structure and needs good computing techniques for recognition and it is an integral part of biometrics. Features extracted...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Wifi Infrastructure Security System from Vulnerable Attacks

    Wi-Fi is a very popular wireless technology which is powerful core for the global digital infrastructure. A device connected using Wi-Fi can access the network resource such as the Internet via a wireless network access point. Recent discoveries and initiatives highlight a simple fact that the core is just as...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Trustiness Certification of Information Technology Equipment

    In this paper, the authors propose a system, which assigns trustiness certification to information technology equipment through a series of tests and evaluations. This system is based in a methodology that should be applied in a laboratory, which issues a technical report containing the results of all the methodology steps,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Intrusion Detection System Based on Conditional Random Fields

    An intrusion detection system is used to monitor network traffic, check for suspicious activities and notifies the network administrator or the system to operate in high speed networks, present network intrusion detection systems are either signature based or anomaly based system. These systems are inefficient and suffer from a large...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2013

    Smile Mask to Capsulation MOLAZ Method

    Concealment of information is the most important things of interest to scientists and users alike. The work of many researchers to find new ways and methods for building specialized systems to protect the information from hackers. The method of those techniques AES and an adopted by the U.S. department of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2013

    General IPS: Carapace for Campus Wide Network in Intranet

    The proposed software architecture is implemented by using the agile software development process. The proposed software for the defence against attacks deals with the attack generation, attack detection in the intranet and then prevention of attacks. The attack prevention module is flexible as the authors can add the rule in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2013

    A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service

    With rapid rise of virtualization technology from diverse types of cloud computing service, security problems such as data safety and reliability are the issues at stake. Since damage in virtualization layer of cloud service can cause damage on all host (user) tasks, Hypervisor that provides an environment for multiple virtual...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2013

    Enhancing Malware Detection Using Innate Immunization

    Malware (malicious software) is a software designed to access secretly a computer system without the owner's consent which includes viruses, worms. Trojan horse and other types of malicious software. It represents the main threat facing the computer systems, networks and data. Creators of malware have different reasons to spread their...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2013

    Jamming Attacks in Wireless Networks

    The commodity of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. A jammer can continually transmit a radio signal in order to block any access to the medium by legitimate wireless nodes. Jamming techniques can vary, from simple...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2013

    Dynamic Training Intrusion Detection Scheme for Blackhole Attack in MANETs

    Mobile ad hoc NETwork (MANET) is a self-configuring network which is composed of several movable mobile nodes. These mobile nodes communicate with each other without any infrastructure. As wireless ad hoc networks lack an infrastructure, they are exposed to a lot of attacks. This paper analyzes the black-hole attack which...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2013

    Black Hole Attack-Hazard to AODV Routing Protocol in Manet

    Mobile Ad Hoc NETwork (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2013

    Securing Distributed Control of Software Defined Networks

    Software Defined Networking (SDN) is an emerging topic that tracts attention due to its paradigm, that splits the control plane form data forwarding plane. According to which, the control plane is realized as the network operating system, which is responsible for controlling maintaining the state of the whole network. And...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2013

    Multi-Criteria Approach to Select Service Providers in Collaborative/Competitive Multi-provider Environments

    This paper implements and evaluates a multi-criteria approach to select appropriate service providers in a large scale multi-provider environment. This approach uses the Analytic Hierarchy Process (AHP) method in a Peer-To-Peer Service Overlay Network (P2P SON) composed of several service providers in order to select the most suitable one to...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2013

    Online Intrusion Alert Aggregation with Generative Data Stream Modeling

    Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts - produced by low-level intrusion detection systems, firewalls, etc. - belonging to a specific attack instance which has been initiated by an attacker at a certain point in time. Thus, meta-alerts...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2013

    Optimization and Security of Continuous Anonymizing Data Stream

    The characteristic of data stream is that it has a huge size and its data change continually, which needs to be responded quickly, since the times of query is limited. The continuous query and data stream approximate query model are introduced in this paper. Then, the query optimization of data...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2013

    Comparative Analysis between Centralized and P2P System Traffic in Terms of Providing VoD Service to Cable Television Network Subscribers

    The choice between a P2P and a conventional centralized realization of VoD service on cable television network can be made after a comparison of the traffic in different sections of the network. Until recently, the centralized architecture has been the most popular architecture for providing VoD service to subscribers of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2013

    Hardware and Software Design for Automotive Security

    Now-a-days security is a major area of concern. Embedded systems are used in every automotive systems. So, attack from outside network, inside networks, bugs, hacking these are common and major concerns for an automotive security. This paper aims at providing hardware and software solution for security in automotive applications. In...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Enhanced Beta Trust Model for Identifying Insider Attacks in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) are more prone to insider and outsider attacks as the sensor nodes are deployed in open environment for collecting data. The traditional cryptography based security mechanisms such as authentication and authorization are able to sort out issues of outside attacker, but they are not effective against...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Detection and Prevention of SQL Injection Attacks on Web Applications

    In this era where Internet has captured the world, level of security that this Internet provides has not grown as fast as the Internet application. Internet has eased the life of human in numerous ways, but defects such as intrusions that are attached with Internet applications keep on the growth...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    A Proposed Architecture of Cloud Computing based e-Learning System

    The wide use of ICT based e-technologies represents a great opportunity for underserved segments of the population, especially with the aim of reintegrating excluded individuals back into society through education. This is particularly true for people who may have difficulties while attending traditional on-site learning or traditional learning programs in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Security and Flexibility Contribution for Wireless Sensor Networks

    Wireless sensor networks are wireless mesh networks, consisting of multiple sensors. These sensors operate using batteries. They are limited in memory and computing capacity. Finally, they communicate by radio. Routing is a central problem in these networks. The authors consider here that the routing converges: i.e. there is a particular...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Effect of Selfish Attack and Prevention Scheme on TCP and UDP in MANET

    Mobile ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure and centralized administration. Due to security vulnerabilities of the routing protocols, Mobile ad hoc networks may be unprotected against attacks by the malicious nodes. One of these attacks is the selfish attack against...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Providing Security using Hash Algorithm for Chanel Aware Routing in MANET'S

    A Mobile Ad-hoc NETwork (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. Nodes in ad-hoc networks play both the roles of routers and terminals. Moreover, the routing path in ad-hoc networks...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Secured Key Escort Services in Cloud Computing

    Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet and this brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    Efficient Data Transmission with Priority in Heterogeneous Networks

    In wireless networking domain, diverse wireless technologies are utilized for sharing data and providing data services. The protocols used in VANETs are DYMO and AODV+. Both of them can provide internet by communicating with Road Side Units (RSUs) which are static. This application has performed well, still leaving some challenges...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2013

    User Authentication Mechanism for Sharing E-resource in Educational Clouds

    Cloud computing is a computing environment centre on clients and to access the programs or documents stored correspondingly in servers. In this paper, the authors have discussed mainly on cloud computing environment in educational system. The educational learning, utilizing e-resources can be done between two or more educational institutions with...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2013

    An Efficient Approach Concurrency Control in Database Management System: A Performance Analysis

    The traditional pessimistic lock-based concurrency control mechanism which focuses on the data's consistency and the transactions' concurrency cannot meet the demand that the in-time database systems make on the temporal consistency. This paper presents a new concurrency control method which is based on the locking, multi-version and single phase commit...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2013

    Formalization and Petri net-Based Extension to Model Factors of State-Varying Failures for Reliability Modeling

    Failures are very often affected by many other factors besides the time. In reality, very often, these factors are neglected, leading to misleading conclusions about reliability of stochastic systems. In this paper, the authors identify the key factors that contribute to failure rates of various stochastic systems. They further formalize...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    A Design of Cloud Privacy Manager Algorithm

    Cloud Computing is a evolving Technology and new paradigm. The objective of this paper is to introduce the privacy concerns, related to cloud computing that will likely be the focus of discussion. In this paper, the authors discuss the privacy in cloud computing, its enhancement technologies to provide control of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    A Novel Digital Watermark Based on Wavelet Coefficients Comparison

    Watermark technology is one of the most promising and effective ways for copyright protection of digital media and safe transmission of digital information. In the proposed method, the watermark is embedded in the components of medium frequency on the horizontal and vertical direction based on the wavelet coefficients comparison, and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    CBH-MAC Protocol for Multihop QoS in Wireless Sensor Networks

    This paper proposes an efficient hybrid MAC for multi-hop QoS protocol in Wireless Sensor Networks for delay sensitive data traffic. The authors present Contention Based Hybrid MAC (CBH-MAC) protocol for both chain and cross topology, which reduces end-to-end delay, energy efficiency and maximizes the packet delivery ratio by minimizing the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jul 2012

    An Approach to Image Compression With Partial Encryption Without Sharing the Secret Key

    Existing methods when employ compression there is no consideration of security, similarly when it describe encryption there is no consideration of size i.e. compression. In this paper a simultaneous image compression and encryption scheme is discussed. The order of the two processes viz. compression and encryption is EC, i.e., image...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    A Requirements Elicitation and Analysis Aided by Text Mining

    In Requirements Engineering the initial activities of elicitation and analysis are essential for software development. Achieving these requirements (and describing then in natural language), together with simple and rapid modeling (with enough degree of formality) are basic needs that influence the remaining stages of software development. In this paper, the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Jun 2012

    Intelligent Crawling on Open Web for Business Prospects

    Dynamic nature of web based systems requires continuous system updating. Information retrieval depends upon crawlers that crawl the web exhaustively, but business corporate expect from their crawlers to retrieve the specific information as per their applications. Crawlers help to download the required information using hyperlinks that occur in Web pages...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Apr 2011

    Online Loss Differentiation Algorithm With One-Way Delay for TCP Performance Enhancement

    In this paper for the performance enhancement of TCP protocol in the mixed wired/wireless network, packet loss differentiation algorithm is proposed which distinguishes the nature of losses and decides congestion control action accordingly. TCP protocol takes packet loss as an indication of network congestion so that it reduces its congestion...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Network Based Security Model Using Symmetric Key Cryptography (AES 256 - Rijndael Algorithm) With Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)

    The main aim of this paper is to strengthen secured communication over the network by enhancing the strength of the AES algorithm with Diffie-Hellman key exchange Protocol. The Rijndael is a block cipher with variable block and key size is believed to provide much more security. The Rijndael with 128...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Camouflage in Malware: From Encryption to Metamorphism

    Camouflage of malware is a serious challenge for antivirus experts and code analysts. Malware use various techniques to camouflage them to not be easily visible and make their lifetime as longer as possible. Although, camouflage approaches cannot fully stop the analyzing and fighting against the malware, but it make the...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Secured Public Key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks

    As Wireless Sensor Networks (WSNs) are susceptible to attacks and sensor nodes have limited resources, designing a secure and efficient user authentication protocol for WSNs is a difficult task. Considering that most future large-scale WSNs follow a two-tiered architecture, the authors propose an efficient and Denial-of-Service resistant user authentication scheme...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Generalization of Quantum Key Distribution Protocol

    Quantum Key Distribution (QKD) is a secure key sharing technology with unconditional security. Certain well-known protocols for QKD have been presented, which claim their security by means of higher eavesdropping error-rates. A generalized quantum key distribution protocol that can be optimized for arbitrary number of bases and dimensions of photon...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Comprehensive Network Security Approach: Security Breaches at Retail Company-A Case Study

    The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day. As criminals are turn into professional network intruders, new laws and legislations are introduced to cover information security. Even though on-line businesses provide the productivity and efficiency...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Check Points Against Privacy Breaches in Android Applications

    The risk of privacy breaches by malicious programs has been increasing, and these programs have used more elaborate techniques to circumvent detection. Attacks using a collaboration of applications are especially difficult to find since distinct applications obtain privacy-sensitive data and send the data to the outside. Current mobile platforms have...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Implementation of the Remote Control and Management System in the Windows O.S

    In this paper, the authors implemented the remote management system on the Windows Operating System. Remote management system in the Windows operating system was designed for the client and server function. A client function has the ability to allow the system to access from the server. This feature is responsible...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Towards Standardization and Interoperability of Database Backups

    The current business model of modern companies is increasingly dependent on information technology. Thus, it is necessary to keep security copies of the data (backup) which may be used to restore them after a data loss event. On the other hand, this dependence encourages strong competition among suppliers and this...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Novel PSO-Based Algorithm for the Optimal Location of Controllers in Wireless Networks

    The optimal location of controllers in wireless networks is an important problem in the process of designing cellular mobile networks. In this paper, the authors present a novel algorithm based on Particle Swarm Optimization (PSO) for solving it. Their objective function is determined by the total distance based on finding...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Study on Effective Proactive Service in Pervasive Computing Environment

    Pervasive systems are becoming increasingly popular, with the appearance and penetration of mobile devices such as Smart phones. Proactive service is one of the most important fields of research in pervasive computing. The authors propose a method for an effective proactive service in pervasive computing environment. Most of previous researches...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Frame Packing Mechanism Using PDO Communication Service Within CANopen

    The utilization of the CAN open-based network needs to be minimized in order to improve the communication performance such as worst-case response time of CAN open messages. To achieve this end, the messages should be packed together as many as possible so that the message frame overhead will be decreased....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Developing a Web-Based GNH Survey Application and a Web Service for Identifying Missing Data Mechanism in Incomplete Survey Data

    This paper proposes a web-based GNH survey application, capable of identifying missing data mechanism which is crucial in effectively handling missing data in survey questionnaire. First, the authors have stated the rationale behind GNH survey briefly highlighting the concept and the birth of GNH. Second, they have described the present...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Viewpoints Diagram: Towards an Innovative Diagram in the UML Language

    This paper is to put forward a modeling of multi-view classes by making use of the Petri networks formalism. The object approach aims at modeling complex systems and allows to take into account the views of the different users of the system and their access rights. Thus, in the paper,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    Proposing a New Approach to Applying Pervasive Computing in Agriculture Environments

    The resource management in agriculture environments is very important. Using smart controls will be one of the most eminent ways of managing. These resources such as water and plant nutrition. In this paper researcher are going to present a special program in which provide necessary resources for growing plant by...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2012

    A Novel Approach for Keyboard Dynamics Authentication Based on Fusion of Stochastic Classifiers

    Computer security is one of most important issues around the world. Most computer systems are using passwords for their own authentication or verification mechanisms. A robust and efficacious approach for classification of 24 persons who their typing patterns were collected introduced. A Linear Discriminate Classifier (LDC), Quadratic Discriminant Classifier (QDC)...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Aug 2011

    A Hybrid LAR-1DNDP Route Discovery Algorithm for Mobile Adhoc Networks

    A Mobile Ad hoc NETwork (MANET) is defined as a collection of low-power wireless mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. A data packet in a MANET is forwarded to other mobile nodes within the network through a reliable and an...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2010

    An Efficient Materialized View Selection Approach for Query Processing in Database Management

    Quick response time and accuracy are important factors in the success of any database. In large databases particularly in distributed database, query response time plays an important role as timely access to information and it is the basic requirement of successful business application. A data warehouse uses multiple materialized views...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Design and Implementation of Fuzzy Temperature Control System for WSN Applications

    With its low power embedded sensingactuation, computing, wireless RF communications and multi-hop mesh networking capabilities, Wireless Sensor Network (WSN) has emerged as one of the popular multidisciplinary technologies of the 21st century. Present day research trends focus on application specific deployment of network hardware with information processing, integrating it into...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Analysis of Various Clustering and Classification Algorithms in Datamining

    The term "Classification" is frequently used as an algorithm for all data mining tasks. Instead, it is best to use the term to refer to the category of supervised learning algorithms used to search interesting data patterns. While classification algorithms have become very popular and ubiquitous in DM research, it...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Performance Versus Cost of a Parallel Conjugate Gradient Method in Cloud and Commodity Clusters

    Cloud computing is an emerging technology to run HPC applications using computing resources on a pay per use basis. The CG method is a linear solver which is used in many engineering and scientific applications, and is computationally demanding. The authors implement different approaches of a parallel CG method and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    Virtualization in Intrusion Detection Systems: A Study on Different Approaches for Cloud Computing Environments

    This paper presents an overview of some of the major works that focus on the use of virtualization in intrusion detection systems to protect against threats in cloud computing environments. The elasticity and abundant availability of computational resources are attractive to attackers in order to exploit vulnerabilities of the cloud,...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Nov 2012

    A Low Rate DDoS: A Security Threat in Mobile Adhoc Networks

    Network security is soft spot in wired or wireless networks, MANETS pose number of non-trivial challenges to the security design, such as shared wireless medium, dynamically changing topology, etc. DoS and DDoS are two of the most harmful threats to the network. MANETS are more vulnerable to these attacks. In...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Investigating The Effect of The Carrier Frequency Offset(CFO) and Frequency Synchronization on The Performance of The OFDM Wireless Systems

    Orthogonal Frequency Division Multiplexing (OFDM) is a modulation schema that due to the high spectral efficiency and the simplicity of the receiver implementation is the most common system for using in broadband communication systems. Although OFDM has been used in numerous wireless communication systems, but two of the main problems...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Design of Stream Cipher for Text Encryption using Soft Computing based Techniques

    In cryptography, encryption is the process of transforming information referred to as plain-text using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is information which is, referred to as cipher-text. Stream...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Towards Minimizing Human Factors In End-User Information Security

    Today, many hardware and software solutions are available to enhance information security, however, little is known about the human factor in information security. Other researchers have revealed that the application of information security technologies alone does not always result in improved security. Human factors immensely contribute to the security of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    A Virtualised High Trust Zone (VHTZ) to Mitigate the Security and Privacy Issues in Cloud Computing

    The benefits of cloud computing are clearly well known which include rapid deployment, ease of customization, reduce cost and low risks. However, some high profile security breaches confuse organizations as they attempt to deploy cloud services in their businesses. Although, the cloud service providers pitch the security of their services....

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Smart Decision Making for Internal Attacks in Wireless Sensor Network

    An information procuring and processing emerging technology Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain autonomous nodes. It communicates short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Dec 2012

    Survey of Web Application and Internet Security Threats

    Computer and network security are one of the most challenging topics in the Information Technology research community. Internet security is a significant subject that may affect a wide range of Internet users. People that use Internet to sell, buy and even to communicate needs their communications to be safe and...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    Energy-Efficient Dynamic Source Routing Protocol for Wireless Sensor Networks

    Routing presents a significant design challenge to meet various applications requirements in Wireless Sensor Networks (WSNs) communications. In this paper, the authors present a minimum delay multipath routing protocol with modification to the standard Dynamic Source Routing (DSR) protocol, which aims to improve energy efficiency and minimize end-to-end delay to...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    Security Challenges in 3G Systems

    This paper explains the authentication and encryption scheme used in GSM. It explains the different possible attacks on cellular systems, which include SIM cloning, eavesdropping, location tracking, SMS ping, SMS denial of service, authentication denial of service and SMS spam. It classifies these attacks on the basis of target of...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    An Energy-Efficient Clustering Algorithm for Wireless Sensor Networks

    In Wireless Sensors Networks (WSNs) the efficient use of the sensors' energy is a key point to extend the network lifetime and has been the center of attention by many researchers. Clustering formation is an important technique used to reduce the sensor's energy consumption. However, finding an optimal clustering in...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Oct 2012

    Delay-Sensitive Applications in VANET and Seamless Connectivity: The Limitation of UMTS Network

    Multi-interface handheld devices enabling radio link connections to varieties of wireless networks (i.e 3G cellular, Wi-Fi, WiMAX) can provide seamless connectivity. With seamless connectivity, VANET safety applications are emerged. Currently, seamless connectivity has been promoted in 3G cellular environments offering a large coverage area and high bandwidth. Even though, 3G...

    Provided By International Journal of Computer Science and Network Security

  • White Papers // Sep 2012

    A New Mobility Model for Multimedia Networks

    Mobile IP is the current standard proposed by IETF for mobility management in IP networks. Its importance increases if network is supporting multimedia applications. Mobile node communicates with a static Correspondent Node. The main consideration is when Mobile Node and Correspondent Node both are visiting beyond their home networks and...

    Provided By International Journal of Computer Science and Network Security