Security
What's worse than getting hit with a security breach? Getting hit with an easily preventable one.
-
Design, Implementation and Verification of an EXtensible and Modular Hypervisor Framework
The authors present the design, implementation, and verification of XMHF - an eXtensible and Modular Hypervisor Framework. XMHF is designed to achieve three goals - modular extensibility, automated ve...
Provided By Carnegie Mellon University
-
Enhancement in Elimination of Security Threads using Trusted Proactive Routing
Ad hoc networks have been used in many applications which mandate a dynamic setup in the absence of fixed infrastructure. The design of ad hoc network has been mainly focuses on proper operation. It i...
Provided By IOSR Journal of Engineering
-
Effectual Routine for Trilateral Authentication in Ad-Hoc Networks Using Multicast Conventions
Ad-hoc networks have mass of applications; though, a dynamic problem regarding their security aspects must be answered in order to realize these applications. Validating the source and ensuring the in...
Provided By IOSR Journal of Engineering
-
Privacy and Security in Online Examination Systems
A new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure for Online Examination System (OES). Privacy and security are crucial in an OES. Privac...
Provided By IOSR Journal of Engineering
-
A Survey of Weight-Based Clustering Algorithms in MANET
As MANETs haven't any mounted infrastructure, all messages have to be routed through the nodes within the network. Several clustering and routing algorithms are developed for MANETs. Moreover, most of...
Provided By IOSR Journal of Engineering
-
Blacklisting Misbehaving Users for Enhancing Security in Anonymizing Networks
Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, ...
Provided By IOSR Journal of Engineering
-
Prevention Proposals for Threats in Internet Services
The explosion of the public Internet and e-commerce, private computers, and computer networks, if not adequately secured, are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive ...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Certain Investigation on Captcha Design Based on Splitting, Rotating and Grid's Usage in the Images Against OCR
Network security consists of the provisions and policies adopted by a network administrator. Network security prevents and monitors unauthorized access, misuse, modification, or denial of a computer n...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Intelligence Driven Computer Network Defence By Intrusion Kill Chain
Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successf...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Protection Method Against Unauthorised Issues in Network-Honeypots
From common man to huge organization everyone uses network daily for data transfer or for business purpose based on their requirement. But there is no full security to the services provided by the int...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Migration of IPv6 - Security Issues
Deployment of a next generation of Internet protocols is on its way and this process that possibly will take a few years to complete. In the intervening time, the deployment raise considerable new mor...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
SQLi Blocker
In this paper, the authors SQLi Blocker (SQL Injection Blocker) presents the idea of blocking an SQL injection attack by using different agents at different layers each one works to block the SQL inje...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Website Hacking: SQL Injection Method and its Prevention
In the Internet, the websites has an important role to fulfill user requirements. These websites are maintained to be secure. The third person may hack a website without knowledge of developer and the...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Forestalling of Flooding Attacks in Wireless Ad Hoc Networks
In recent years, security has been the most focused area in ad Hoc networks research. Wireless ad hoc networks will be widely used in the near future since these networks form the topology with low co...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
False Data Detection Using MAC pairs in Wireless Sensor Networks
Wireless Sensor Networks are vulnerable to many types of security attacks, including false data injection, data forgery, and eavesdropping. Sensor nodes can be compromised by intruders, and the compro...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Network Security Using Quantum Cryptography
Network security and cryptography is a subject about how to protect information in digital form and to provide security services. The purpose of a digital signature is to provide a means for an entity...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Secure and Dependable Storage in Cloud Computing
Cloud computing has been developed by the next generation architecture of IT activity. This is an Internet-based development and use of computer technology. Cloud Computing moves the application softw...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Encryption and Decryption Algorithm Using 2-D Matrices
Data Security is plays a vital role in Data Communication through Internet. Definitely there is a need to protect the data from unauthorized access. Data may exist in many forms like images, tables, I...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Enhanced Amalgam Encryption Approach for Grid Security: A Review
Grid computing is about several processors distributed globally and sharing the computational resources to solve various problems. Grid computing has become an increasingly important research topic wi...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Analysis of Different Security Issues and Attacks in Distributed System A-Review
Now-a-days so many people are connected to the internet to access the different resources of their use and different companies are using distributed environment to provide their services to the custom...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
An Attendance Monitoring System Using Biometrics Authentication
Biometric technology that involves the identification and verification of individuals by analyzing the human fingerprint characteristics has been widely used in various aspect of life for different pu...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Detecting Spam Zombies Using Spot Tool by Monitoring Outgoing Messages
In the Internet compromised machines are the key security threats; it is used to spread various security attacks like spamming and spreading malware. That spamming activities provides a key incentive ...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Fingerprint Fuzzy Vault: A Review
This paper is a brief review of fuzzy vault which is a biometric template security technique. The advent of technology over the last decade has established biometric identification as an electronic eq...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A Survey on Techniques in Detection and Analyzing Malware Executables
The computer technology has emerged as a necessity in the people day to day life to deal with various aspects like education, banking, communication, entertainment, etc. Computer system's security is ...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Analysis on Intrusion Detection by Machine Learning Techniques: A Review
There are many risks of network attacks under the Internet environment, internet security is a vital issue and therefore, the intrusion detection is one major research problem for business and persona...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Appliance of Biometric and Median Filter Algorithm to Identify Lookalike Faces
This paper is to present an accurate technique to identify two lookalike faces based on the concepts of biometrics and the Median Filter Algorithm. This paper gives some useful insight on the applicat...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Techniques for Malware Analysis
Malware is a worldwide epidemic. Studies suggest that the impact of malware is getting worse. Two types of malware analysis are described here. One is static malware analysis and the other is dynamic ...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Security Integration in SDLC Analysis Phase
SDLC stack is a layered architecture of application or software development. Effect of any layer is reflected on all the upper layers in other words base layer outcomes are executed in upper layers. T...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Securing Legacy Firefox Extensions With SENTINEL
A poorly designed web browser extension with security vulnerability may expose the whole system to an attacker. Therefore, attacks directed at "Benign-but-buggy" extensions, as well as extensions that...
Provided By Northeastern University
-
Implementation of Cryptographic Algorithm on FPGA
Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), is an approved cryptographic algorithm that is used to protect electronic data. The AES can be programmed in softw...
Provided By Creative Commons
-
Enhanced Network Based Query Processing in Road Networks
The location aware portable devices are widely increased. This rise to the usage of location based services to reveal their own location and needed location. The existing query processing techniques u...
Provided By Creative Commons
-
Deep Malicious Website Detection
To search for malicious web pages, the first step is typically to use a crawler to collect URLs that are live on the Internet. In this system, Deep Web Crawler is presented to detect the deep maliciou...
Provided By Creative Commons
-
Security Based Phishing Website Detection
Now-a-days most of the people were familiar with the internet and its applications. Along with the internet usage, the attacks also increased. Phishing is the one the most possible attacks in internet...
Provided By Creative Commons
-
New Data Mining Algorithm for Intrusion Detection in Networks
An intrusion detection system is a mechanism that monitors network or system activities for malicious activities. Intrusion Detection and Prevention Systems (IDPS) are primarily focused on identifying...
Provided By Creative Commons
-
Spot Protocol Detecting Outgoing Spam Messages
Compromised machines it is one of the internet key security threats. It is used to identifying the security attacks such as DDOS, spreading malware and spamming threats and identifying networking thre...
Provided By Creative Commons
-
A Novel Security Technique in Message Passing Interface Systems
In the concept of Message Passing Interface (MPI) chatting and file transmission the decryption part will be done automatically. Here three types of keys are used; they are public, private and secret ...
Provided By Creative Commons
-
A Novel Approach of Detecting the Camouflaging Worm
Active worms major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active w...
Provided By Creative Commons
-
Privacy-Preserving Updates to Anonymous Databases
Suppose a medical facility connected with a research institution and the researchers can use the medical details of a patient without knowing the personal details. Thus the research data base used by ...
Provided By Creative Commons
-
Defenses Against Large Scale Online Password Guessing by Using Persuasive Cued Click Points
This paper presents a detailed evaluation of the persuasive cued click points password scheme which provides high level of security. An important goal of the authentication system is to provide suppor...
Provided By Creative Commons
-
Relay Selection for Secure Co-Operative Networks With Jamming
In this proposed system, the authors investigate joint relay and jammer selection in two-way cooperative networks, consisting of two sources, a number of intermediate nodes, and one eavesdropper, with...
Provided By Creative Commons
-
Survey on Spam Filtering Techniques
In the recent years spam became as a big problem of Internet and electronic communication. There developed a lot of techniques to fight them. In this paper the overview of existing e-mail spam filteri...
Provided By Scientific Research Publishing
-
An Enhanced Secure Heuristic-Stochastic Routing Arithmetic in MPLS Network
To improve routing security in MPLS network, base on the stochastic routing algorithm, the authors propose a proactive mechanism they call Enhanced Secure Heuristic-Stochastic Routing (ESHSR), which b...
Provided By Scientific Research Publishing
-
All-Optical Cryptographic Device for Secure Communication
An all-optical cryptographic device for secure communication, based on the properties of soliton beams, is presented. It can encode a given bit stream of optical pulses, changing their phase and their...
Provided By Scientific Research Publishing
-
A Novel Digital Rights Management Scheme in P2P Networks
P2P networking is a distributed application architecture that partitions tasks or workloads between peers. How to integrate P2P networks and DRM to offer a novel content distribution mode for digital ...
Provided By Scientific Research Publishing
-
A Security Transfer Model Based on Active Defense Strategy
This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/management...
Provided By Scientific Research Publishing
-
Secure Protocol for Leader Election and Intrusion Detection in MANET
As the nodes in MANET are battery limited, one node per cluster is elected as leader to run IDS for all the nodes in the cluster. Leader is elected based on the residual energy of each node that is su...
Provided By Adhiyamaan College of Engineering
-
A New Security Mechanism for Vehicular Communication Networks
Vehicular communication networks are a promising and emerging technology to facilitate road safety, Safety of life, traffic management, and infotainment dissemination for drivers and passengers. One o...
Provided By Universiti Sains Islam Malaysia
-
Digital Steganalysis: Computational Intelligence Approach
Over the last decade, one of the most significant current discussions in computer science is the field of information security. In general, information security is the techniques, policies and strateg...
Provided By Universiti Sains Islam Malaysia
-
IT Regulatory Compliance & Risk Management Easing The IT Audit - Part II
Regardless of the context - regulatory compliance or an audit - policy is considered step one in any security and compliance program. As in Part One of this series, Brabeion Compliance Center eases th...
Provided By Business Forum Institute
-
Electronic Commerce Explained
Electronic commerce is doing business online. It is about using the power of digital information to understand the needs and preferences of each customer and each partner to customize products and ser...
Provided By Business Forum Institute
-
Security In A World Of Electronic Commerce
Electronic commerce is an inescapable fact of life these days. Connecting businesses, granting your partners and customers wider access to your data and systems, and the need to leverage the Internet ...
Provided By Business Forum Institute
-
Risk Maker Risk Taker: A Manager's Guide To Risk
Risk management is a vital training topic for any organization. Whether you're implementing a new strategic plan or coordinating a single event, risk involves the culture, processes and structures thr...
Provided By CRM Learning
-
Gender Bias In Managing Human Resources In The Turkish Hospitality Industry: Is Bias Impacted By Demographic Context?
Within the large and growing body of research on gender issues is a concern with gender bias in managerial activities in business. Unfortunately, however, mixed evidence exists as to whether men and w...
Provided By Valparaiso University
-
Anti-Trust Rank: Fighting Web Spam
The Web is both an excellent medium for sharing information as well as an attractive platform for delivering products and services. This platform is, to some extent, mediated by search engines in orde...
Provided By Gautam Buddha University
-
JPCAP, WINPCAP Used for Network Intrusion Detection System
Intrusion detection systems serve three essential security functions: they monitor, detect, and respond to unauthorized activity by company insiders and outsider intrusion. Intrusion detection systems...
Provided By Rungta Group of Colleges
-
Decentralization, Happiness And The Perception Of Institutions
This paper analyses whether the different powers and resources at the disposal of local and regional governments across Europe deliver greater satisfaction with political institutions and lead to grea...
Provided By IMDEA
-
Reconciling Top-Down And Bottom-Up Development Policies
Top-down and bottom up development policies have been generally sold as two irreconcilable ends of the development intervention spectrum. Top-down policies, solidly based in micro- and macroeconomic t...
Provided By IMDEA
-
Certified Computer-Aided Cryptography: Efficient Provably Secure Machine Code From High-Level Implementations
The authors present a computer-aided framework for proving concrete security bounds for cryptographic machine code implementations. The front-end of the framework is an interactive verification tool t...
Provided By IMDEA
-
Does Decentralization Matter For Regional Disparities? A Cross-Country Analysis
This paper looks at the relationship between fiscal and political decentralization and the evolution of regional inequalities in a panel of 26 countries - 19 developed and 7 developing - for the perio...
Provided By IMDEA
-
A General Equilibrium Analysis Of Parental Leave Policies
Despite mandatory parental-leave policies being a prevalent feature of labor markets in developed countries, the aggregate effects of leave policies are not well understood. In order to assess the qua...
Provided By IMDEA
-
The Dog That Did Not Bark: Insider Trading And Crashes
This paper documents that at the individual stock level insiders sales peak many months before a large drop in the stock price, while insiders purchases peak only the month before a large jump. The au...
Provided By IMDEA
-
An Application to Ensure Security Through Bit-Level Encryption
This paper presents a process by which the authors can secure any kind of file. The newly developed encryption algorithm is presented in this paper. With help of generated distinct blocks N-level, aga...
Provided By Dr. B.C. Roy Engineering College
-
Data Security Using Private Key Encryption System Based on Arithmetic Coding
Problem faced by today's communicators is not only security but also the speed of communication and size of content. In the present paper, a scheme has been proposed which uses the concept of compress...
Provided By BPS Women University
-
Development of Mechanism for Enhancing Data Security in Quantum Cryptography
Nowadays security in communication is increasingly important to the network communication because many categories of data are required restriction on authorization of access, modify, delete and insert...
Provided By BPS Women University
-
An ECK-Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
In this paper, the authors investigate the two-pass (one round) authenticated key exchange protocol in the enhanced Canetti-Krawczyk (eCK) model with perfect forward security against active adversary....
Provided By Zhejiang Normal University
-
Performance Analysis of Timing Attack on Elliptic Curve Cryptosystem
Cryptosystems often take slightly different amounts of running time depending on the input and the used key. This timing information, extracted from the decryption process, can be used to derive infor...
Provided By G.H. Raisoni College of Engineering
-
A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks
Mobile Ad Hoc NETworks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. The absence of a central managem...
Provided By Madhav Institute of Technology & Science
-
Seattle Children's Hospital Implements Desktop Virtualization
View this webinar to learn how Seattle Children's Hospital was able to successfully deal with compliance issues, security requirements, budget constraints and more, all while ensuring a high quality u...
Provided By Citrix & WYSE
-
Swarm Intelligence Based Soft Computing Techniques for the Solutions to Multiobjective Optimization Problems
Most real life problems are multi objective in nature. These objectives are conflicting (preventing simultaneous optimization) in general. It means that one objective is optimized at the cost of other...
Provided By Dayalbagh Educational Institute
-
Efficient Genetic-Wrapper Algorithm Based Data Mining for Feature Subset Selection in a Power Quality Pattern Recognition Application
Power quality monitors handle and store several gigabytes of data within a week and hence automatic detection, recognition and analysis of power disturbances require robust data mining techniques. Lit...
Provided By Government College of Technology
-
E-Commerce Security
Internet has made the idea of an idealized marketplace seem plausible. However, there are still concerns regarding the exchange of money securely and conveniently over the internet. Pretty Good Privac...
Provided By University Zaytoonah
-
Discretized Gabor Statistical Models for Face Recognition
Aiming to the use of texture information of Gabor filtered face images, the authors present a new method matching multi-channel Gabor marginal statistical models for face recognition. Given partitions...
Provided By Nanjing University of Science & Technology
-
LMI-Based Fault Detection Fuzzy Observer Design with Multiple Performance Constraints for a Class of Non-Linear Systems: Comparative Study
Over the last decades, many researchers have paid attention to the problem of observer-based Fault Detection and Diagnosis (FDD) for dynamic systems subjected to various possible faults. Most of the e...
Provided By Nanjing University of Science & Technology
-
A Cryptosystem Based on the Symmetric Group Sn
This paper proposes a public key cryptosystem based on the symmetric group Sn, and validates its theoretical foundation. The proposed system benefits from the algebraic properties of Sn such as non co...
Provided By Shahid Beheshti University
-
Normalized Direct Linear Discriminant Analysis With Its Application to Face Recognition
The dimensionality of sample is often larger than the number of training samples for high-dimensional pattern recognition such as face recognition. Here, Linear Discriminant Analysis (LDA) cannot be p...
Provided By Nanjing University of Science & Technology
-
Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression
In this paper, a visible and removable watermarking scheme in JPEG compression is presented. In the scheme, a secure template is generated to modulate the embedding strength of watermark and host imag...
Provided By Nanjing University of Science & Technology
-
A Network Covert Channel Based on Packet Classification
A network covert channel violates security rules and leaks information imperceptibly. Many researchers have been studying how to construct it, and the basic methods involve exploiting packets head, pa...
Provided By Nanjing University of Science & Technology
-
A Block Cipher Using Key Based Random Permutations and Key Based Random Substitutions
In this paper, the authors have developed a large block cipher by introducing the basic concepts of permutations and substitutions. The permutations and substitutions are key based. They have taken th...
Provided By Sreenidhi Institute Of Science & Technology
-
A Proxy e-Raffle Protocol Based on Proxy Signatures
In 2009, Chang and Cheng proposed an efficient proxy raffle protocol. In their scheme, the raffle tickets are known by participants as well as raffle organizers. Hence, unless the authors implicitly a...
Provided By Shahid Beheshti University
-
A Generalized Chaos Synchronization Based Digital Signature Scheme With Application
Based on the two-dimensional discrete delayed logistic map and Generalized Chaos Synchronization (GCS) theorem, this paper first presents a new Discrete Chaos Map System (DCMS) with GCS property. Seco...
Provided By University of Science & Technology