- Filter by:
-
Content Type
-
Topic
-
Developing a Spam Email Detector
Email is obviously important for many types of group communication that have become most widely used by millions of people, individuals and organizations. At the same time it has become a prone to threats. The most popular such threats are what are called a spam, also known as unsolicited bulk...
Download Now -
With the modern use of technology and communication, data and information travel through many channels. During transmission they may be vulnerable to passive or active attacks, in which messages are used by criminal groups to undermine the integrity of individuals and institutions. In this paper, a solution is proposed that...
Download Now -
A Novel Approach to Network Security Situational Awareness Methods and Models
Network is a combination of nodes (a node may be a computer, a mobile, a sensor and any other communicating devices) in an ordered manner in which they can communicate with each other. Security threats are very often in any kind of network due to many reasons, the authors developed...
Download Now -
Survey for Fragile Watermarking Multimedia Authentication Scheme Using FCM
In this paper, the authors proposed more dominant scheme for conceal text in image, audio and video in place of hiding scheme that can additional diminish the size extension of the entrenched consequences. Propose an irreversible data hiding method that has high hiding volume and an acceptable bite rate support...
Download Now -
Advance Authentication Scheme for Wireless Ad Hoc Network
A Mobile Ad-hoc NETwork (MANET) is a group of wireless mobile nodes serve organized to create a momentary relationship among them. Neither pre-defined network infrastructure nor central network administration subsist to assist in announcement in MANETs. Nodes converse with every another via direct common wireless radio links. Every mobile node...
Download Now -
In this paper, the authors present the multi-model biometrics system for based iris and signature. This paper presents the decision level fusion for combine two unimodel biometric system. Contourlet transform using to feature extraction for iris while the signatures are used Linear Discriminant Analysis (LDA) to extracted feature. The system...
Download Now -
Packet Features Extractor for Network Security Systems: Design and Implementation
The Network Systems (NSs) depend essentially on the packet features (header fields and payload) in their work that includes packet analyses and filtering. Routers, bridges and network security systems need to extract the features of the packet to do their jobs for that the Packet Features Extractor (PFE) is one...
Download Now -
Security through Smart Encryption
In this paper, the authors has a new approach for encryption of text files. It encrypts data at different-different level. First of all ASCII (American Standard Code for Information Interchange) of each character has been taken. Than they check from 2 to no-1, how many digits divide that number than...
Download Now -
Port Scan - A Security Concern
Port scan is act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature...
Download Now -
Cloud shares infrastructure between several organizations and it is managed internally or by a third-party. The user stores the data in an encrypted format. ABE (Attribute Based Encryption) is an encryption scheme used by the user to store the data in the cloud. ABE is a public-key based one to...
Download Now