- Filter by:
-
Content Type
-
Topic
-
New Attacks on Wi-Fi Protected Setup
Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper, the authors propose two attacks on this...
Download Now -
Approaches and Methodologies for Mobile Software Engineering
The development of software for mobile devices takes place in a dynamic environment where constraints, technologies and user needs change very frequently requiring enhanced approaches and methodologies in software engineering essential to deal with the concept of Bring Your Own Device (BYOD). Mobile apps are developed for various purposes in...
Download Now -
Applying Website Usability Testing Techniques to Promote E-Services
In this competitive world, websites are considered to be a key aspect of any organization's competitiveness. In addition to visual esthetics, usability of a website is a strong determinant for user's satisfaction and pleasure. However, lack of appropriate techniques and attributes for measuring usability may constrain the usefulness of a...
Download Now -
Variability Management Challenges in Small and Medium Sized Enterprises (SMEs)
Variability has become important means to provide customer specific products fast to the market. This paper presents findings from a literature study and questionnaire designed to find out the current variability management practices, challenges and needs in Small and Medium sized Enterprises (SMEs). The paper was carried out first and...
Download Now -
Applied Cryptography in Password Encryption Using Neural Networks
Today, the world depends on computers and information systems for processing information in various fields. These systems must be developed in such a way that they are less vulnerable to attacks and more reliable and secured. These systems are more vulnerable to technical issues and many cases of data trawling...
Download Now -
Detecting Infected Botnet Machines by Using the Traffic Behavior Analysis
Despite the increase in attacks and other security challenges in cyberspace, the authors require new methods of detection and to develop new techniques for the new generations of attacks. One of these new threats is botnets. This paper presents the means for identifying infected machines with botnets by using a...
Download Now -
Overview of Routing Algorithms in WBAN
The development of wireless computer networks and advances in the fabrication of integrated electronic circuits is one of the key elements in making miniature sensors, makes it possible to use the wireless sensor networks for environmental monitoring in and around the bodies of animals. This precinct of researches is called...
Download Now -
A Survey on the Privacy Preserving Algorithm and Techniques of Association Rule Mining
In recent years, data mining is a popular analysis tool to extract knowledge from collection of large amount of data. One of the great challenges of data mining is finding hidden patterns without revealing sensitive information. Privacy Preservation Data Mining (PPDM) is answer to such challenges. It is a major...
Download Now -
Correlated Appraisal of Big Data, Hadoop and MapReduce
Big data has been an imperative quantum globally. Gargantuan data types starting from terabytes to petabytes are used incessantly. But, to cache these database competencies is an arduous task. Although, conventional database mechanisms were integral elements for reservoir of intricate and immeasurable datasets, however, it is through the approach of...
Download Now -
A Survey on Security Issues in Big Data and NoSQL
In this paper, the authors present a survey on security and privacy issues in big data and NoSQL. Due to the high volume, velocity and variety of big data, security and privacy issues are different in such streaming data infrastructures with diverse data format. Therefore, traditional security models have difficulties...
Download Now