International Journal of Computer Science and Network

Displaying 1-40 of 106 results

  • White Papers // Oct 2014

    The Solution for Efficient Electricity Management through Wireless Sensor Network

    In the new paradigm of Internet of Things (IoT), many objects will be on the network having capability of sensing, computing and communicating with each other directly or indirectly. The most important aspect of it is that, such network will be invisible but intelligent to complete the entire task through...

    Provided By International Journal of Computer Science and Network

  • White Papers // Oct 2014

    A Comparative Study of Symmetric Key Encryption Algorithms

    Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2014

    Dynamic Data Mining Tool on Distributed Encrypted Data

    Now-a-days the security of the system matters because system gets easily hacked, so deal with this problem. Here the authors introduce the 3d key generation. It generated from RGB colors and their priority. User data distributed in smaller parts and uploaded server side database. To maintain the security of data,...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2014

    NIOS II Based Embedded Web Server Development for Networking Applications

    In this paper the authors presents design of NIOS II based embedded web server for networking applications. The altera's SOPC (System On Programmable Chip) development tool is used to implement the system, which contains NIOS II core processor. It includes development of embedded Web server application design based on the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2014

    Cloud Based Web IDE for Collaborating Programmers

    Cloud computing is a computing paradigm, where a large pool of systems are connected in private or public networks, to provide dynamically scalable infrastructure for application, data and file storage. It is a technology that uses the internet and central remote servers to maintain data and applications. It allows consumers...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Evaluation of Web Mining Approach

    With abundance of data on system it is complicated to accessing facts oriented information from the WWW and provided a reasonable outcome to the users. It has become mandatory to utilize some approach so that valuable information can be extracted. Web mining is most promising solution in such circumstances. The...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Secured Data Storage with Enhanced TPA Auditing Scheme using Merkle Hash Tree in Cloud Computing

    In this paper, the authors proposed system provides secure cloud storage system supporting privacy-preserving public auditing. In which the data owner uploads the data in the cloud server and they are allowed to modify the data using the private key. The cloud severs stores the data and split those data...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Evaluation of LSB Data Hiding in Various Images

    Data encryption is not the only safe way to protect data from penetration. There has emerged a set of new technologies that provides protection with or without data encryption technology such as data hiding. The word steganography (from Greek steganos, or \"Covered,\" and graphie, or \"Writing\") is the hiding of...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    The Impact of Creativity on Organizational Knowledge Management Processes

    In modern economics, knowledge is the main source for economical and industrial development. Knowledge consists of subjective ideas, realities, concepts, data and techniques recorded in human memory which originates from the human brain and is based on information gathered by individual experience, beliefs and values along with their decisions and...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    A Survey on Authentication Protocols and Security Techniques for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have gained attention Worldwide in recent years. Because of potential of physical isolation, these sensors have wide range of applications in land based security, military security and much more. As WSNs exchange there environmental conditions with each other, security become important aspect. In WSNs due to...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Using WASSEC to Analysis and Evaluate Open Source Web Application Security Scanners

    The web application security has currently become a very significant area of scholarship, the best way to deal with it is to use web application security scanner to discover the architectural weaknesses and vulnerabilities in the web application. This paper is to use The Web Application Security Scanner Evaluation Criteria...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Security Surface Analysis and Patching

    Web applications and web services drive the current iteration of the web. They are emerging to serve new platforms and new devices with an ever-increasing scope of information and services. With the fast development, there is also an ever increasing need of safety for these services. Nothing on the web...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Image Based Authentication for Phishing using Visual Cryptography

    With the advent of internet, various online attacks have been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    A Best Fit Mathematical Model for Maximizing GridFTP Throughput Based on Real and Simulated Network Conditions

    Grid computing refers mainly to resources which are geographically distributed over a Wide-Area Network (WAN). Therefore, the need for a high throughput transfer protocol is essential. This has led to the development and adoption of the GridFTP protocol. Although, several attempts have been made to achieve higher throughputs, they appear...

    Provided By International Journal of Computer Science and Network

  • White Papers // Feb 2014

    File Management System in Multi Cloud Storage System

    Cloud computing service providers take advantage of virtualization technologies, combined with self-service capabilities, to offer cost-effective access to computing resources via the internet. But major issue in cloud computing is security. Several concerns which identify security requirements in cloud computing. In this paper, the authors have proposed to implements, the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Feb 2014

    A Survey on Malicious Node Detection Method for Delay Tolerant Network

    Delay Tolerant Networks (DTNs) is the one of the areas in the field of wireless communication, where in delay is particularly high. They are promising technology in vehicular, disaster response, under water and satellite networks. Delay tolerant networks characterized by large end to end communication latency and the lack of...

    Provided By International Journal of Computer Science and Network

  • White Papers // Feb 2014

    Load Balancing Techniques: Major Challenges in Cloud Computing - A Systematic Review

    Cloud computing is an emerging area in the field of Information Technology (IT). Load balancing is one of the main challenges in cloud computing. It is a technique which is required to distribute the dynamic workload across multiple nodes to ensure that no single node is overloaded. Load balancing techniques...

    Provided By International Journal of Computer Science and Network

  • White Papers // Feb 2014

    Message Routing with Counting Bloom Filter for Name-Based Home Ad Hoc Networks

    As future home appliances will have many useful built-in functions, a communication network that allows a user to access these built-in functions and to control the appliances is highly desirable. If the home appliances are fitted with a wireless communication module, a wireless ad hoc network can be used to...

    Provided By International Journal of Computer Science and Network

  • White Papers // Feb 2014

    Traffic Analysis Tool for Wireless Sensor Node

    Simulation is playing important role in design and test concepts in wireless sensor network. There are many simulators are available in research community, but problem is many researchers face flexibility in creating traffic flow for simulation of sensor network and associated energy consumption. This tool will generate traffic with given...

    Provided By International Journal of Computer Science and Network

  • White Papers // Feb 2014

    Emergency Messaging for Car Accident in Vehicular Ad-hoc Network

    Global positioning system is used to get the vehicle position and can be shared with other nodes in the network. The sparse vehicle traffic leads to network fragmentation, is challenging task for safety application. In case of emergency not all the vehicle get affected in network so broadcasting of alert...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Improvised Security for RDF Using Random Salt and Levels with Bi-Directional Translation to Relational Database

    A middleware framework is required for semantic web applications to access data from relational databases and legacy storage systems, without replication or synchronization. Resource Description Framework (RDF) is one such type of middleware framework which bridges the gap between two needs. Though, there were some efforts to publish relational data...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    A Survey on Privacy Enhancement in Cloud Computing Using Identity Management

    Cloud computing is a better way to increase the capabilities dynamically without the expenses spent in new infrastructure or licensing new software. Though cloud computing is providing better utilization of resources by virtualization techniques and taking up much of the work load from the user, it is fraught with security...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Data Warehouse Creation for Preparing an Electricity Statistics Dashboard

    The 21st century is making use of electricity so extensively that it has almost changed the face of the earth. To generate and harness electricity on a large scale means the development of machinery capable of doing so. An essential strategy for meeting the energy challenge is to concentrate on...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Taxonomy of Dummy Generation Techniques for Preserving Location Privacy

    With the advent of GIS, internet and mobile telephony, location based services are becoming the need of the day. Privacy issues arising while using location based services have the potential to become the serious apprehensions. Existing privacy techniques based on anonymity generally fails in to offer the required privacy. The...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Data Minder Using Steganography: Technology of Data Encryption

    The internet and the World Wide Web have revolutionized the way in which digital data is distributed. The growing possibilities of modern communication need special means of security especially on computer network. In this paper a new randomized secure data hiding algorithm using file hybridization is proposed for strengthening the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Review of Various Algorithms Used in Hybrid Cryptography

    Cryptography enables the user to transmit confidential information across any insecure network so that it cannot be used by an intruder. Cryptography is the process that involves encryption and decryption of text using various mechanisms or algorithms. A cryptographic algorithm is a mathematical function that can be used in the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    DPMAP for Abrupt Manuscript Clustering With Attribute Partition

    Discovery the suitable quantity of huddle to which credentials should be separation is vital in manuscript huddle. In this paper, the authors suggest a fresh approach, namely DPMAP (Dirichilet Process Model Attribute Partition), to realize the embryonic huddle construction based on the DPM model lack in require the amount of...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Vulnerability, Human Behaviour, Hazards and Expected Utility in the Context of Risk Management

    In this paper, the authors use four main dimensions: vulnerability, human behavior, hazards and expected utility to analyze their impact in scenario planning when cross-matched with human development adjusted, gender inequality and multidimensional poverty indexes within flood risk management strategies. They argue that the four dimensions are among the central...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    A Survey on Algorithms for Optimal Path Search in Dynamic Networks

    Dynamic networks are prevalent everywhere right from Internet, local area networks, mobile ad hoc networks to wireless sensor networks. Communication networks, social networks, Web, transportation networks infrastructures represent dynamic networks due to the dynamics that influence its topologies, connectivity, reliability and fault-tolerance. The network dynamics is rigorously influenced by the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    A Review on Metamorphic Cryptography for Video Files

    Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Steganography is the science of embedding information into the cover image viz., text, video, and image without causing statistically significant modification to the cover image. Combining...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    A Review on the Various Recent Steganography Techniques

    Security of the secret information has been a challenge when the large amount of data is exchanged on the internet. A secure transfer of information can be very much achieved by steganography and cryptography. Steganography is a tool for hiding information inside an image. Cryptography is a tool which provides...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Distributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast)

    IP TV has become very popular discipline in last year. Many internet service providers provide their own dedicated IP TV solutions. Common situation is that some TV channels are provided as free and some as paid service. In the past IP TV was mostly provided through optical fiber networks, but...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    JPEG versus GIF Images in forms of LSB Steganography

    Steganography (from Greek steganos, or \"Covered\" and graphie or \"Writing\") is the hiding of undisclosed message (such as text, image, audio and video) within an ordinary message (such as text, image, audio and video) and the extraction of it at its target (receiver). Steganography takes cryptography a step farther by...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Mobile Robot Navigation with Obstacle Avoidance in Unknown Indoor Environment using MATLAB

    One of the most recent research areas over the last two decades is the navigation of mobile robots in unknown environments. In this paper, real time navigation for Wheeled Mobile Robot (WMR) using fuzzy logic technique, wireless communication and MATLAB is investigated. Two Fuzzy Logic Controllers (FLCs) with two inputs...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Back Propagation Neural Network Based Gender Classification Technique Based on Facial Features

    The gender recognition system with large sets of training sets for personal identification normally attains good accuracy. The features set are applied to three different applications: pre-processing, feature extraction and classification. The gender are classified on the basis of distance between eyebrow to eye, eyebrow to nose top, nose top...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Analytical Modeling of Social Network Growth Using Multilayer Network Projection

    In this paper, the authors present a new network model to address the question of how social networks such as groups in social websites, networks of social events, online video game groups evolve in time. A common feature of all these networks is that first, new users attach to an...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Performance Evolution of EACP Protocol for System Optimization in Heterogeneous Sensor Network

    Sensor network is an important area for the research in last few years. Much of work is deal with homogeneous sensor network but in practically heterogeneous sensor network play a vital role in several applications. In sensor network energy efficiency is always a challenge, there are many protocols are developed...

    Provided By International Journal of Computer Science and Network

  • White Papers // Nov 2013

    A Survey on Schedule-Based MAC Protocols for Wireless Sensor Networks

    In the last few years Wireless Sensor Networks (WSNs) have gained much research as well as commercial interest due to their wide range of application specially deployed in hazardous, hostile or remote areas. WSN-MAC protocols are generally classified as contention-based and schedule-based protocols. This paper discusses the properties of WSN-MAC...

    Provided By International Journal of Computer Science and Network

  • White Papers // Oct 2013

    Application of Data Mining In Marketing

    One of the most important problems in modern finance is finding efficient ways to summarize and visualize the stock market data to give individuals or institutions useful information about the market behavior for investment decisions. The enormous amount of valuable data generated by the stock market has attracted researchers to...

    Provided By International Journal of Computer Science and Network

  • White Papers // Oct 2013

    Review on Fragment Allocation by Using Clustering Technique in Distributed Database System

    Considerable Progress has been made in the last few years in improving the performance of the distributed database systems. The development of Fragment allocation models in Distributed database is becoming difficult due to the complexity of huge number of sites and their communication considerations. Under such conditions, simulation of clustering...

    Provided By International Journal of Computer Science and Network

  • White Papers // Feb 2012

    Modified Cocomo Model for Maintenance Cost Estimation of Real Time System Software

    Accurate cost estimation of software projects is one of the most desired capabilities in software development Process. Accurate cost estimates not only help the customer make successful investments but also assist the software project manager in coming up with appropriate plans for the project and making reasonable decisions during the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Cross-site Scripting Attacks on Android WebView

    WebView is an essential component in Android and iOS. It enables applications to display content from on-line resources. It simplifies task of performing a network request, parsing the data and rendering it. WebView uses a number of APIs which can interact with the web contents inside WebView. In the current...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    Establishing a Service Model of Private Elastic VPN for Cloud Computing

    In this paper, the authors describe the concept of elastic VPN services with Hypervisor on Cloud Computing. Under the Cloud Computing mainly VPN is a IaaS cloud services which is create for small unit business and medium size company which is based on pay-as-much as used policy. Under this they...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Evaluation of Web Mining Approach

    With abundance of data on system it is complicated to accessing facts oriented information from the WWW and provided a reasonable outcome to the users. It has become mandatory to utilize some approach so that valuable information can be extracted. Web mining is most promising solution in such circumstances. The...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Efficient Algorithms for Materialized View Selection in Data Warehousing Environment

    The notion of data warehouse can be defined as subject-oriented, integrated, nonvolatile and time-variant collection of data in support of making management's decision effectively, for the success of data warehouse accurate and timely consolidated information as well as quick query response times is the fundamental requirement. To avoid accessing from...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Algorithm and Approaches to Handle Large Data - A Survey

    Data mining environment produces a large amount of data that need to be analyzed; patterns have to be extracted from that to gain knowledge. In this new era with boom of data both structured and unstructured, in the field of genomics, meteorology, biology, environmental research and many others, it has...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Energy-Efficient Cloud Computing: A Vision, Introduction, and Open Challenges

    Cloud computing is offering utility-oriented IT services to users worldwide. Based on a pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific, and business domains. In recent years, energy efficiency has emerged as one of the most important design requirements for modern computing systems, such as data centers...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Energy Efficient VM Live Migration in Cloud Data Centers

    Server consolidation is one of the techniques to reduce the overall energy consumption in the data centers besides various hardware and software features. Virtualization Technology (VT) has made this possible with the help of various hypervisors which helps to create the Virtual Machines (VMs). During consolidation there are various parameters...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2012

    Web Service Integration Using Cloud Data Store

    Current web users usually have their own files, work documents, communications and personal contacts distributed in the storage systems of many widely-used Internet services (e.g. Google Docs, Gmail, Face book, Zoho). Therefore, they face the challenge of being not able to have an integrated view for their related data objects...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jan 2013

    Secure and Stable VANET Architecture Model

    Vehicular Ad-hoc NETwork (VANET) is known as an essential factor of smart Transportation systems. The key benefit of VANET communication is noticed in dynamic protection systems, which objective to enhance security of travelers by exchanging caution messages between automobiles. Other applications and personal services are also allowed in order to...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Wireless Networks Security Using Dispersive Routing Mechanism

    Attacks in wireless sensor networks are Compromised-Node (CN) and Denial-Of-Service (DOS). In the Compromised-Node attack (CN attack); an adversary physically compromises a subset of nodes to eavesdrop information, whereas in the denial-of-service attack, the adversary interferes with the normal operation of the network by actively disrupting, changing, or even paralyzing...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jan 2013

    Survey on Security Challenges in VANET

    Recent advances in development of Wireless Communication in Vehicular Ad-hoc NETwork (VANET) has provided emerging platform for industrialists and researchers. Vehicular ad-hoc networks are multi-hop networks with no fixed infrastructure. It comprises of moving vehicles communicating with each other. One of the main challenge in VANET is to route the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Digital Data Security and Copyright Protection Using Cellular Automata

    Computer networks vulnerable to penetration and thus steal or modify digital data. For this the authors need the security of digital data and the means to protect the property rights of these data led to more interest in the development of new methods for watermark signs. The emergence of many...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    Secured Routing Protocols for Wireless & ATM Networks : An Analysis

    Routing protocols in WSNs might differ depending on the application and network architecture. Routing protocols that do not take the malicious attacks into account cannot be easily tamper proofed. Wireless sensor networks consist of small nodes with sensing, computation, and wireless communication capabilities. Many routing, power management, and data dissemination...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Security Threats in Prepaid Mobile

    Recent communications environment significantly expand the mobile environment. Prepaid mobile services for 3G networks enables telecommunication to sign up new users by utilizing the latest in converged billing technologies. The worldwide mobile communication market is exploding, and 50 percent of subscribers are expected to use prepaid billing. Prepaid services are...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Improvised Security for RDF Using Random Salt and Levels with Bi-Directional Translation to Relational Database

    A middleware framework is required for semantic web applications to access data from relational databases and legacy storage systems, without replication or synchronization. Resource Description Framework (RDF) is one such type of middleware framework which bridges the gap between two needs. Though, there were some efforts to publish relational data...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jan 2013

    A Study on Cloud Computing and its Security Issues

    Cloud computing was coined for what happens when services and applications are propelled into the internet \"Cloud.\" Cloud computing refers to the many different types of services and applications being delivered in the internet cloud, and the devices used to access these services and applications do not require any special...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    A Reactive Protocol for Privacy Preserving Using Location Based Routing in MANETs

    Mobile Ad-hoc NETworks (MANETs) are an infrastructure less, self configuring network. These networks can be setup easily anywhere and anytime without any base infrastructure, thus they have proved to be very efficient is rescue related areas like flood and fire. MANETs are now extended to be used in military and...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2012

    Policies Based Intrusion Response System for DBMS

    Intrusion detection systems play an important role in detecting online intrusions and provide necessary alerts. Intrusion detection can also be done for relational databases. Intrusion response system for a relational database is essential to protect it from external and internal attacks. The authors propose a new intrusion response system for...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2012

    Secure Public Key Protocol for Ad-Hoc Wireless Networks

    As part of the security within distributed systems, various services and resources need protection from unauthorized use. Remote authentication is the most commonly used method to determine the identity of a remote client. This paper investigates a systematic approach for authenticating clients by three factors, namely password, smart card, and...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    A Survey on Privacy Enhancement in Cloud Computing Using Identity Management

    Cloud computing is a better way to increase the capabilities dynamically without the expenses spent in new infrastructure or licensing new software. Though cloud computing is providing better utilization of resources by virtualization techniques and taking up much of the work load from the user, it is fraught with security...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    FPGA Based Intruder Detection System Using CMOS Sensor

    Humans have always felt very possessive of their belongings. During ancient times, inhabitants used to live in secure caves so that they would be protected from unwanted intrusion and from deadly animals. The advancement of civilization witnessed better and improved means of security system being implemented by humans. Technological revolution...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jan 2013

    A Survey of Encroachment Disclosure in Wireless Sensor Network

    In Wireless Sensor Network (WSN) security is the major issue because of its hostile nature. The traditional intrusion detection technique and traditional access control will not provide reliability and security if they do not work cooperatively. If the security is compromised, there could be serious consequences starting from theft of...

    Provided By International Journal of Computer Science and Network

  • White Papers // Oct 2012

    Review Paper on Preserving Confidentiality of Data in Cloud Using Dynamic Anonymization

    Cloud computing is a model that enables convenient and on-demand network access to a shared pool of configurable computing resources where millions of users share an infrastructure. Security and privacy concerns are significant obstacle that is preventing the extensive adoption of the public cloud in the Industry. Multi-tenancy where multiple...

    Provided By International Journal of Computer Science and Network

  • White Papers // Oct 2012

    Prevention of Buffer overflow Attack Blocker Using IDS

    Now-a-day internet threat takes a blended attack form, targeting individual users to gain control over networks and data. Buffer Overflow which is one of the most occurring security vulnerabilities in a Computer's world. Buffer Overflow occurs while writing data to a buffer and it overruns the buffer's boundary and overwrites...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    Approach for Application on Cloud Computing

    A web application is any application using web browser as client or the user can say that it is a dynamic version of a web or application server. There are two types of web applications based on orientation: a presentation-oriented web application generates interactive web pages containing various types of...

    Provided By International Journal of Computer Science and Network

  • White Papers // Oct 2012

    Web Application and its Marketing as Cloud Computing

    A web application uses two words \"Web\" and \"Application\". Where web means web browser and application means computer software. Web browser is used to search the information on the World Wide Web i.e. www or on Internet, where as application is used to solve the single or multiple tasks, depending...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Scalable ALARM: Anonymous Location Aided Routing in Hostile MANETs

    Hostile MANETs are significant because of their applications in military and law enforcement area where the identity of the nodes cannot be revealed since there is a risk of tracing and locating them with their identities, which makes the network vulnerable to attacks. Therefore communication between nodes should be performed...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    Study of Network Layer Attacks and Countermeasures in Wireless Sensor Network

    A Wireless Sensor Network (WSN) consists of distributed autonomous sensors to closely monitor physical or environmental conditions (such as temperature, sound, vibration, pressure, motion or pollutants). Wireless platforms are less expensive and are more powerful, with usage in enabling the promise health science to military sensing operations. The wireless sensor...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Secured Data Storage with Enhanced TPA Auditing Scheme using Merkle Hash Tree in Cloud Computing

    In this paper, the authors proposed system provides secure cloud storage system supporting privacy-preserving public auditing. In which the data owner uploads the data in the cloud server and they are allowed to modify the data using the private key. The cloud severs stores the data and split those data...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Evaluation of LSB Data Hiding in Various Images

    Data encryption is not the only safe way to protect data from penetration. There has emerged a set of new technologies that provides protection with or without data encryption technology such as data hiding. The word steganography (from Greek steganos, or \"Covered,\" and graphie, or \"Writing\") is the hiding of...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Data Warehouse Creation for Preparing an Electricity Statistics Dashboard

    The 21st century is making use of electricity so extensively that it has almost changed the face of the earth. To generate and harness electricity on a large scale means the development of machinery capable of doing so. An essential strategy for meeting the energy challenge is to concentrate on...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    Wireless Sensor Network Architectures for Different Systems

    Recent technological advances enabled the design and proliferation of wireless sensor networks capable of autonomously monitoring and controlling environments. One of the most promising applications of sensor networks is for human health monitoring. The wireless body area networks promise to revolutionize health monitoring. Within a smart building many sensors and...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    Modified Mutual Authentication and Key Agreement Protocol Based on NTRU Cryptography for Wireless Communications

    In this paper the authors implemented new methods of public keys exchange in the existing mutual authentication and key agreement protocol in wireless communication. The existing mutual authentication and key agreement protocol in wireless communications has been studied and the break points have been observed. They used \"CS attack\" to...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    A Survey on Spatio-Temporal Data Mining

    Data mining is the process of searching valuable information by analyzing large volumes of data through automatic or semiautomatic means to discover meaningful patterns and rules. The field of spatio-temporal data mining is concerned with such analysis in the case of spatial and temporal interdependencies. Many interesting techniques of spatio-temporal...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    Credit Card Fraud: The Study of its Impact and Detection Techniques

    With the rise and swift growth of E-commerce, credit card uses for online purchases has increased dramatically and it caused sudden outbreak in the credit card fraud. Fraud is one of the major ethical issues in the credit card industry. With both online as well as regular purchase, credit card...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Activity Modeling in Smart Home Using High Utility Pattern Mining Over Data Streams

    Smart home technology is a better choice for the people to care about security, comfort and power saving as well. It is required to develop technologies that recognize the Activities of Daily Living (ADLs) of the residents at home and detect the abnormal behavior in the individual's patterns. Data mining...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2012

    Integrating Heterogeneous Data Sources Using XML Mediator

    In the past decade, research papers in heterogeneous database integration have established a good and solid framework to alleviate this task. However, there are still works need to be accomplished to bring these achievements to be easily implemented and integrated to internet applications. This paper presents the XML mediator, a...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Contribution to Securing Communications on VOIP

    The authors contribute to the study of the security of voice in IP (Internet Protocol) network, which will become in the near future, a universal standard of voice and video networks telecommunications. As with any phone call, it is a need to encrypt communication to respect the rights and privacy...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Using Unobtrusive Techniques for Detecting Leakage of Data

    While doing business, there are situations when some important information or data should be handed over to some third parties. The data important to organization must be secured but the third parties are not that careful about the data. So there is possibility that the data gets leaked. Here in...

    Provided By International Journal of Computer Science and Network