Security
Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.
-
Fuzzy Modelling of a Network Denial of Service (DOS) Attack Phenomenon
This paper presents the fuzzy modeling of a network Denial of Service (DoS) attack characteristics. Conventional methods for achieving same purpose were showcased. Also, the need for a fuzzy logic approach as well as an improved mechanism for generating the fuzzy inference rules were outlined. Further, the paper discusses the...
Provided By Engg Journals Publications
-
Prevention of Worm at Router Level for Providing Seamless Communication in Network Environment
Worm is the major hurdle, which restricts the comfortable communication in any networks. Worm is a malicious software program that destroys the normal communication in the networking systems. Every system must not be vulnerable to avoid infection by worm in the computing networks. Defending against such worm still plays vital...
Provided By Engg Journals Publications
-
Multilayer Intrusion Detection System in Web Application Based Services
Web based services having a data transfer from different layer. Web services separate layer for the data transfer and the process is difficult in the service. Service transferring data is having intrusion from the user interaction in web based services to detect the intrusion in alert basis and detect the...
Provided By Engg Journals Publications
-
A Stationary Wavelet Transform Approach for Improved Fingerprint Recognition Scheme
Fingerprint recognition, a known biometrics for personal identification is used in securing confidential data contents. Fingerprint exhibits textured like patterns of whorls, loop etc in sector form which is then used for fingerprint matching. The existing method uses Gabor filter which does not provide much Robustness. In this Paper, a...
Provided By Engg Journals Publications
-
An Intelligent Intrusion Detection for Detecting Unauthorized Malware Over the Network
Monitoring Internet traffic is critical in order to acquire a good understanding of threats and in designing efficient security systems. It is the most important issue to monitor the traffic in internet and also in designing efficient security systems. Honeypot is one of the security tools for gathering intelligence of...
Provided By Engg Journals Publications
-
Security Vulnerabilities in Web Application - An Attack Perspective
Security is the essential and important topic in web applications. The choice of communication made the web technology an essential one in the environment. The importance of web application and its security increasing day by day, but traditional networks fails to provide security for web application. This paper discuss about...
Provided By Engg Journals Publications
-
Cryptography on Android Message Applications - A Review
Short Message Service (SMS) is a text messaging service component of phone, web, or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices. Security of SMS's is still an open challenging task. Various Cryptographic algorithms have been...
Provided By Engg Journals Publications
-
Human Identification Using Finger Print and Face Biometrics
The objective is to compared at feature extraction level for face and fingerprint biometrics. The proposed approach is based on a compared to identify the human through, finger prints in automated manner and providing an efficient solution for very low resolution face recognition problem. It is performed by compared the...
Provided By IJCSMR
-
Various Methods Used for the Protection, Detection and Prevention of Application Layer DDOS Attacks
Among all the attacks that occur on a web application like SQL Injection, XSS (Cross Site Scripting) attacks, DDOS attacks, etc., DDOS are the most difficult to detect and prevent. DDOS attacks occur mainly at two levels : application layer and network layer. Application layer DDOS attacks are very difficult...
Provided By IJCSMR
-
Generating Cryptosystem for Multimodal Biometrics Based on Feature Level Fusion
Multi-biometrics are used worldwide because there will be low error rate and large population coverage. Multi-biometric data are stored in template and these template needs to be protected. There are many attacks possible in these templates. So here, the authors transform the different biometric representation (iris, fingerprint and face) into...
Provided By IJCSMR
-
Decision Tree Based IDS Implementation: Review
Network security technology has become crucial in protecting government and industry computing infrastructure. Modern intrusion detection applications face complex requirements - they need to be reliable, extensible, easy to manage, and have low maintenance cost. In recent years, data mining - based Intrusion Detection Systems (IDSs) have demonstrated high accuracy,...
Provided By IJCSMR
-
Review of DDoS and Flooding Attacks in MANET
The flooding and DDoS (Distributed Denial of Service) attacks are acts as major threats for MANET because of its ability to create huge amount of unwanted traffic. It is very difficult to detect and respond to flooding and DDoS attacks due to large and complex network environments. In this paper,...
Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)
-
New Multimodal Biometric Approach with Two Score Level Combination Strategies
Biometrics is the science of verifying the identity of an individual through physiological measurements or behavioral traits. Since biometric identifiers are associated permanently with the user they are more reliable than token or knowledge based authentication methods. The anatomy of human fingers is quite complicated and largely responsible for the...
Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)
-
Buffer Overflow Attack Blocking Using MCAIDS - Machine Code Analysis Intrusion Detection System
MCAIDS-Machine Code Analysis Intrusion Detection System for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. With the increasing access of Internet, the Internet threat takes a form of attack, targeting individual users to gain control over network and data. Buffer overflow is one...
Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)
-
STEGCRYP: A Multilevel Information Security Shceme
In this paper, Cryptography and Steganography techniques are combined to enhance the security level of data communication over an unsafe distributed network. The standard LSB (Least Significant Bit) steganography method is also modified by digitally signing a information of starting position of hided message in image, so that any other...
Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)
-
Securing a Firm's Computer Operating System : Trusted Platform Module
Recently Trusted Platform Module (TPM) is emerged as a new solution to secure computers and other systems. It is a small microchip that enables encryption and stores authentication information in computer motherboard. This paper presents the initiative of trust computing and an overview of TPM along with architecture and security...
Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)
-
Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL
Now-a-days internet is one of the most important sources of communication and thousands of people interact electronically. For sending sensitive messages over the internet, the authors need security. Hence for secure communication required the algorithms. Among these algorithms is Twofish, a promising 128-bit block cipher and one of the competitors...
Provided By International Journal of Computer Applications
-
Feature Level Fusion of Multimodal Biometrics and Two Tier Security in ATM System
Unimodal biometrics uses a single source of biometric system for personal identification. It has a variety of problems such as noise in the sense data, Intra-class variations, Inter-class similarities and spoof attacks. Multi-biometrics is a combination of one or more biometrics. In multi-biometrics the noise in any one of the...
Provided By International Journal of Computer Applications
-
Analysis of Mesh Topology of NoC for Blocking and Non-blocking Techniques
Network on Chip is efficient on-chip communication architecture for system on chip architectures. It enables the integration of a large number of computational and storage blocks on a single chip. The router is the basic element of NoC. The router architecture can be used for building a NoC with standard...
Provided By International Journal of Computer Applications
-
Security Issues and Accuracy Concerns in Information Retrieval Process
An approach towards information retrieval process security issues and the accuracy of the retrieved data of the retrieved data from the user perspective are the major concerns of this paper. Implanted work includes demonstration of the retrieval modes, the process flow of information retrieval system and risk analysis of the...
Provided By International Journal of Computer Applications
-
Area Efficient Counting Bloom Filter (A-CBF) design for NIDS
An interesting target for the intruders is computers, since valuable data are fed into it. The need for impeccable intrusion detection system is growing every day. Hardware based Network Intrusion Detection System (NIDS) relies upon power, delay and area. The Counting Bloom Filter (CBF), improves the power and speed of...
Provided By International Journal of Computer Applications
-
An Efficient Model for Securing Identity Access in Scalable System
In this paper, the authors propose an identity management system model which will ensure secure storage and retrieval of the IDs information in the scalable identity database. The proposed model uses the distributed database technology for information storage and retrieval to make the system more reliable. The IDs information storage...
Provided By International Journal of Computer Applications
-
User Authentication System Using Cryptography Involving Arithmetic Operations
The concept of having to identify an entity before being allowed to perform any action is quite acceptable, and expected, and required in today's wired world. Password managers, graphical systems, pattern recognition, biometrics has always been found to be incapable of providing robust security in some or the other aspect,...
Provided By International Journal of Computer Applications
-
High Secured and Authenticated Secret Message Sending Using TIRI-DCT-DWT Based Iris Recognition and Steganography
In the world of modern communication, securing information is a very important task. Hence Cryptographic systems are integral parts of communication systems in majority applications. Security requirements demand that these systems need to be operated with large secret keys. Since it is very difficult to remember large private keys, these...
Provided By International Journal of Computer Applications
-
Survey and Design Approach of Protocol Steganography in IPv6
Steganography is the process of hiding message in another cover medium such that it is difficult to detect. Cover medium is used as a carrier. This carrier can be Image, video, text or IP packet. Covert Channel is implemented in different header Fields of IPv4 header to send secrete message....
Provided By International Journal of Computer Applications
-
Developing a New Hybrid Cipher Using AES, RC4 and SERPENT for Encryption and Decryption
In this paper, the authors aim to developing a new hybrid cipher by combining the characteristics of 3 ciphers namely AES (Advanced Encryption Standard), Rc4 (also known as ARC4) and Serpent. The characteristics of both the ciphers are studied and a new cipher combining the characteristics of both the ciphers...
Provided By International Journal of Computer Applications
-
An Axiomatic Approach for Secure Data Transmission
Cryptography is the strongest link in the chain of security since it plays an integral role in secure communication. Symmetric key cryptography is the oldest form of cryptology in which identical keys are used by the sender and receiver to share the confidential data. This research paper is about analyzing...
Provided By International Journal of Computer Applications
-
A Survey on Security Issues and Concerns to Social Networks
Social networking sites are websites designed for human interaction. Online social networks are now used by hundreds of millions of people and have become a major platform for communication and interaction between users. Under the gentle encouragement of social networking services like Face book, Twitter, LinkedIn, Google, Yahoo, the right...
Provided By International Journal of Science and Research (IJSR)
-
Network Security - Catastrophic Risks And Countermeasures
Security is crucial to networks and applications. So with the huge explosion of public internet, ecommerce, private computers it has become necessary to secure them properly otherwise they are increasingly vulnerable to malicious attack and various threats. Network structure itself allows many security threats to occur because of many loopholes...
Provided By Creative Commons
-
Survey Report: Insights on Endpoint Security and Stealthy Threats
This report captures key findings from a survey of 400 IT professionals, including 200 in the United States and 200 in the U.K., that can help you understand how your peers are managing endpoint security and protecting against stealthy threats, such as rootkit attacks.
Use the benchmarking data in...Provided By Intel/McAfee
-
Whitepaper: The Inevitable Extinction of PSTs
Microsoft® Exchange administrators are responsible for the integrity, security, and availability of an organization's email platform. Some of the most common threats to mailboxes are viruses, spam, and hardware failures, but there is another, often overlooked culprit -PST files.
This white paper discusses the problems that PSTs cause as well...Provided By Symantec Australia
-
Attacks and Countermeasures in Fingerprint Based Biometric Cryptosystems
The authors investigate implementations of biometric cryptosystems protecting fingerprint templates (which are mostly based on the fuzzy vault scheme by Juels and Sudan in 2002) with respect to the security they provide. They show that attacks taking advantage of the systems false acceptance rate, i.e. false-accept attacks, pose a very...
Provided By Cornell University
-
Practical Options for Deploying IT Equipment in Small Server Rooms & Branch Offices
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the...
Provided By APC by Schneider Electric
-
Secure Relay Selection Based on Learning With Negative Externality in Wireless Networks
In this paper, the authors formulate relay selection into a Chinese restaurant game. A secure relay selection strategy is proposed for a wireless network, where multiple source nodes send messages to their destination nodes via several relay nodes, which have different processing and transmission capabilities as well as security properties....
Provided By EURASIP
-
Password Hardened Biometric: A Complete Solution of Online Security
In present paper, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in Business-to-Customer (B2C) and Business-to-Business (B2B) e-commerce need to feel that their transactions are secured from...
Provided By mecs-press
-
A Robust Fault Detection Scheme for the Advanced Encryption Standard
Fault attacks are powerful and efficient cryptanalysis techniques to find the secret key of the Advanced Encryption Standard (AES) algorithm. These attacks are based on injecting faults into the structure of the AES to obtain the confidential information. To protect the AES implementation against these attacks, a number of countermeasures...
Provided By mecs-press
-
On the Feasibility of Online Malware Detection with Performance Counters
The proliferation of computers in any domain is followed by the proliferation of malware in that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits, spyware, adware and other classes of malware. Despite the existence of Anti-Virus software, malware threats persist and are growing as there exist...
Provided By Association for Computing Machinery
-
Towards a Networks-of-Networks Framework for Cyber Security
Networks-of-Networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed...
Provided By Cornell University
-
Symmetric Key Generation Algorithm Using Sum of Subset N-P Problem
Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. More companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing....
Provided By Galgotias College Of Engineering And Technology
-
Detection and Resolution of Anomalies in Firewall Policy Rules
A firewall is a system acting as an interface of a network to one or more external networks. It implements the security policy of the network by deciding which packets to let through based on rules defined by the network administrator. Any error in defining the rules may compromise the...
Provided By Galgotias College Of Engineering And Technology
-
A Note on Security Protocol for Multicast Communications
The authors show that the protocol recently proposed in for securing multicast communication is completely insecure. They described obvious insecurity of the multicast protocol. The proposal lacks any decent security analysis. Moreover, the protocol cannot be easily fixed, since not distributing the inverses of secrets assigned to other members of...
Provided By Comenius University
-
Attacking Scrambled Burrows-Wheeler Transform
Scrambled Burrows-Wheeler transform is an attempt to combine privacy (encryption) and data compression. The authors show that the proposed approach is insecure. They present chosen plaintext and known plaintext attacks and estimate their complexity in various scenarios. The Burrows-Wheeler Transform (BWT) is a commonly used transform in loss-less compression algorithms....
Provided By Comenius University
-
ESET Smart Security Business Edition Comparative Testing
ESET commissioned West Coast Labs to carry out a series of independent performance evaluations and comparative tests on the ESET Smart Security Business Edition package when compared with other leading vendors. ESET's Smart Security Business Edition product, are drawn from the leading vendors in the field of IT security such...
Provided By West Coast Labs
-
Guard Data and Improve Performance With Internet Security Approach
The New York Eye and Ear Infirmary, ranked one of the Nation's top hospitals by the U.S. News and World Report, is a not-for-profit organization located in New York City whose mission is "To provide all in need with the highest quality care in the disciplines of Ophthalmology, Otolaryngology/Head &...
Provided By Cymphonix
-
Network Box Intrusion Detection & Prevention System
Wikipedia defines Intrusion Detection as "The act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource", and then goes on to say that "When Intrusion Detection takes a preventive measure without direct human intervention, then it becomes an Intrusion Prevention System". Network Box includes...
Provided By Network Box
-
Network Box Advisory: Forgotten Security
Some businesses rely on IT departments to spot the weak points in the system and rectify them as soon as possible. Whilst the need for a rapid resolution is understandable, this method exposes the company to vulnerability - human error. A procedure should be in place, so that if and...
Provided By Network Box
-
Network Box White Paper: Securing Schools From Social Media Threats
Schools today face increasing internet security risks from the number of new platforms and technologies used by pupils and teachers in and out of the classroom. The proliferation of social networks such as Facebook, Bebo and MySpace, instant messenger (IM) platforms, and file-sharing and peer-to-peer applications and software mean that...
Provided By Network Box
-
Authentication - Who Are You?
Identity fraud is rising. It is increasingly simple, with more ways of doing it than ever before. As more and more applications become available to over the Internet, there is a growing need to prove identity, in order to prevent criminals from taking advantage of all. To achieve this protection...
Provided By Network Box
-
SPAM Back-Scatter
The core of the back-scatter problem is that it is trivial to forge the sender address of an email; as the standard email protocols provide no mechanisms to authenticate the sender's email address. Spammers don't want to deal with backscatter, and they don't want complaints coming back; so they forge...
Provided By Network Box
-
How That PDA Could Bring the Whole System Crashing Down
As users blur work and personal Internet use, particularly on their own devices, one could find organization exposed to malware simply because of their ignorance. The battle for corporate network security is being fought at new endpoints. Businesses need to think laterally when it comes to protecting their networks from...
Provided By Network Box
-
How to Choose the Right Security Personnel
The continual success of the network security industry owes much to the ever-advancing, cutting-edge technology. However, this is only as effective as the security professionals that run it. This means recruiting high-calibre security professionals is essential for any organisation wishing to be protected from the external and internal threats. The...
Provided By Network Box
-
Parasitic Malware
It should also be noted that the term 'Parasitic Malware' can refer to malware that exploit vulnerabilities in other malware to install themselves. For the purposes of this paper, however, the term refers to malware that adds itself to legitimate files in one way or another. It is always useful...
Provided By Network Box
-
Phishing With Good Bait
Phishing is fraudulently attempting to acquire sensitive information like passwords, credit card details etc. It's tied into the growing crime of identity theft and, over the past two years, there has been a big increase in this form of crime. So what can a company do to protect itself from...
Provided By Network Box
-
Part II: Routing, the Hole in the Wall
Routing can be tricky. If one knows where data is going, one is half way to resolving a large number of application problems. But understanding where data is being routed to and from is crucial in the security arena. Incorrect routing can result in security measures being bypassed or reduced...
Provided By Network Box
-
Network Box Advisory: Forgotten Security - Part 1: Monitoring
Companies are protecting themselves from high-profile threats such as malware attacks, but are often leaving themselves vulnerable from the 'forgotten security defences'. The first of these results from simply not monitoring the applications, hardware and security systems across the business, which can lead to network failure. Most businesses are using...
Provided By Network Box
-
Gang Culture in the Online World
Off late when online scams such as phishing were relatively new phenomena, an email containing grammatically incorrect English may have been enough to dupe a recipient. Similarly, a phishing website may not have been an exact replica of a bank's, but it was familiar enough to fool a significant number...
Provided By Network Box
-
Online Privacy and Browser Security
In the past year there have been a number of debates on the need for online privacy. Some commentators (Sir David Omand and Scott McNealy) have argued that privacy online must be sacrificed for progress and security whilst others insist on privacy being paramount in a free society (Sir Tim...
Provided By Network Box
-
Network Box Helps Biwater Group Keep Its Network Flowing
The Biwater Group designs and constructs water and wastewater systems across the world (the name 'Biwater' - or 'Two waters' - was adopted because of its involvement in the provision of clean water and the treatment of wastewater). Employees need to access the Internet in the course of their work,...
Provided By Network Box
-
Network Box Case Study: Charnwood Borough Council
Like many organisations, CBC was using a number of different security technologies to protect itself against the burgeoning myriad of online threats. For example, it outsourced its firewall, VPN, email filtering and web filtering security to separate companies. However, CBC discovered that not only is this method cost-ineffective, it also...
Provided By Network Box
-
Network Box Scores With Tottenham Hotspur
Tottenham Hotspur FC is one of the UK's top premiership football clubs and is also a modern sports business, dealing with large amounts of electronic correspondence and internet traffic from fans, business partners and sponsors. The need for a secure network that can defend against malware and spam was a...
Provided By Network Box
-
The Acorn Group Chooses Network Box
The Acorn Group is one of the largest independent estate agency networks in the South East of England and is ranked in the top 20 estate agents across the UK. The company's consistent growth combined with its publicly available email addresses meant that securing its IT network from the latest...
Provided By Network Box
-
Sunderland AFC Uses Network Box
Sunderland AFC is a UK premiership football club. The club has over 120 full-time employees at three different sites in the UK. Network security is a top level priority for the club, and a need to defend against the vast amounts of spam and malware it was seeing was an...
Provided By Network Box
-
Network Box Case Study: Jeyes
Jeyes manufactures, markets, sells and distributes household cleaning and hygiene products throughout the world in more than 60 countries. The biggest threat Jeyes faced was from malicious spam and email-borne viruses. Thirty percent of the 100,000 inbound emails each month was spam, the primary Internet threat to Jeyes; and around...
Provided By Network Box
-
Network Box Case Study: PDD
PDD is a product innovation consultancy, working with some the world's leading brands, such as Sony Ericsson, Orange and Levis, in the invention, conception and development of products that are used in daily life. It employees 65 staff at its UK headquarters in London. It needed a system that didn't...
Provided By Network Box
-
Network Box Case Study: Pluswork Group
The Pluswork Group is a temporary and permanent recruitment specialist with offices in the North West of England. It has recruitment specialists at various office locations, as well as on the road visiting candidates and clients; and this posed a wide variety of IT security issues. The company wanted to...
Provided By Network Box
-
Network Box Case Study: Selectaglaze
The main issue was that while most provided a reasonable user interface, there was a steep learning curve to get to grips with all of the different security and policy based aspects. It quickly realised that a managed service might be a more cost-effective and secure approach requiring less day-to-day...
Provided By Network Box
-
Network Box Case Study: Hillary Blinds
Hillarys Blinds is the largest manufacturer of made-to-measure window blinds in the UK and has a turnover in excess of ?90 million. The challenge was using three separate security solutions but soon found that managing multiple technologies can become a burden. Also, it needed a solution that would enable the...
Provided By Network Box
-
Securing Vital Infrastructure Network: Network Box and ES Pipelines
ES Pipelines is an independent gas transporter, taking gas to businesses and homes across the UK. The majority of communication between customers and suppliers is done via email, much of it containing confidential information, and so knowing its network is secure is of prime importance. Network Box has provided ES...
Provided By Network Box
-
Forgotten Security Part II: Routing, the Hole in the Wall
Many companies have routing where the path that data takes to arrive at a workstation differs from the path that the data takes back to the originator. If one of these paths goes through a connection tracking firewall while the other path does not, the packets will be blocked. This...
Provided By Network Box
-
Adding SPF to Your Anti-Spam Solution
The Sender Policy Framework (SPF) is an open standard that introduces a grammar for domains to describe the email they send. These descriptions are published in the Domain Name System (DNS), and Simple Mail Transfer Protocol (SMTP) receivers may use these descriptions to authenticate email and to better apply local...
Provided By Network Box
-
Privacy Preserved Collaborative Secure Multiparty Data Mining
In the current modern business environment, its success is defined by collaboration, team efforts and partnership, rather than lonely spectacular individual efforts in isolation. So the collaboration becomes especially important because of the mutual benefit it brings. Sometimes, such collaboration even occurs among competitors, or among companies that have conflict...
Provided By Science Publications
-
An Optimized Device Sizing of Analog Circuits using Particle Swarm Optimization
Day by day more and more products rely on analog circuits to improve the speed and reduce the power consumption(Products rely on analog circuits to improve the speed and reduce the power consumption day by day more and more.). For the VLSI implementation analog circuit design plays an important role....
Provided By Science Publications
-
Geographical Division Traceback for Distributed Denial of Service
Internet is highly used in the most of the people day to day life applications. It is a very essential resource for every one of them. It is the people duty to secure this important resource from all the threats. One way of ensuring internet security is making the internet...
Provided By Science Publications
-
Session Initiation Protocol Security: A Brief Review
The Session Initiation Protocol (SIP) is an application layer used for signaling protocols specified by the Internet Engineering Task Force (IETF). SIP has recently become the main signaling protocol for Internet applications, thus allowing the implementation of a number of features using SIP, such as video conferencing, online gaming, peer-to-peer...
Provided By Science Publications
-
Flexible Topology Migration in Optical Cross Add and Drop Multiplexer in Metropolitan Ring Network
In general, there are two types of optical node that used in present optical network where it depends on what type of topology that is implemented. OXC-based optical node is selected as a node distribution in the mesh network while OADM-based optical node is suitable for use in ring topology...
Provided By Science Publications
-
Computation of Private Key Based on Divide-By-Prime for Luc Cryptosystems
Public key cryptosystem is a way that is used a secret communication between the sender and receiver, without needing for a secret key exchange and it can used for create a digital signature. Public key cryptosystem is a widely used technology around the world, which enables information to be transmission...
Provided By Science Publications
-
Purpose-Based Versus Flow-Based Access Control for Privacy
Advances in information technology and the emergence of privacy-invasive technologies have made it necessary to introduce privacy regulations that impose restrictions on handling of Personal Identifiable Information (PII). According to current thinking, "PII privacy protection can only be achieved by enforcing privacy policies within an organization's online and offline data...
Provided By Science Publications
-
Dynamic Approach to Defend Against Distributed Denial of Service Attacks Using an Adaptive Spin Lock Rate Control Mechanism
The frequency, severity and sophistication of Distributed Denial of Service (DDoS) attack pose a serious threat to the availability of evolving Internet services. DDoS attack is an incident in which a user or organization is deprived of the services of a resource the people would normally expect to have. They...
Provided By Science Publications
-
Fault Detection and Classification in Power Electronic Circuits Using Wavelet Transform and Neural Network
Nowadays, the prime focus of industries is in the field of control engineering. It concerns mainly to monitor a system, detect the occurrence of fault in the system and identify the type of fault and its location. This is mainly to done to protect the system and avert any possible...
Provided By Science Publications
-
Mobile Ad Hoc Network Security for Reactive Routing Protocol With Node Reputation Scheme
A Mobile Ad-hoc NETwork (MANET) can be considered as the collection of wireless mobile nodes organized to create a temporary connection between them. Neither pre-defined network infrastructure nor centralized network administration exists to assist in the communication in MANETs. Through a direct shared wireless radio links nodes communicate with each...
Provided By Science Publications