Complete Network Security Protection for SME's within Limited Resources Margie S. Todd1 and Syed (Shawon) M. Rahman1,2, 1Capella University, USA and 2University of Hawaii-Hilo, USA
Multi-Level Parsing Based Approach Against Phishing Attacks With the Help of Knowledge Bases Gaurav Kumar Tak1 and Gaurav Ojha2, 1Lovely Professional University, India and 2Indian Institute of Information Technology and Management, India
A Need for Peer-To-Peer Strong Local Authentication Protocol (P2PSLAP) in Mobile Banking Bossi Masamila, Dublin Institute of Technology, Ireland
Securing Mobile Cloud Using Finger Print Authentication IehabALRassan and HananAlShaher, King Saud University, Saudi Arabia
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection Engine Anjan K1, Srinath N K1 and Jibi Abraham2, 1R V College of Engineering,India and 2College of Engineering, India
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel Shortening in Multi-carrier Systems Samir Abd Elghafar1,2, Salaheldin M. Diab1, Bassiouny M. Sallam1, Moawad I. Dessouky1, El-Sayed M. El-Rabaie1 and Fathi E. Abd El-Samie1, 1Menoufia University, Egypt and 2Jazan University, Saudi Arabia
Investigating the Effects of the Common Control Channel Challenge in Multichannel Cognitive Networks With Hypothetical Spectrum Hole Mthulisi Velempini1 and Mqhele E. Dlodlo2, 1North-West University, South Africa and 2University of Cape Town, South Africa
Knowledge-Based Authentication using Twitter Can We Use Lunch Menus As Passwords? ManabuOkamoto, Kanagawa Institute of Technology, Japan
A Security Framework in Cloud Computing Infrastructure Arijit Ukil1, Debasish Jana2 and Ajanta De Sarkar2, 1Tata Consultancy Services, India and 2Birla Institute of Technology, India
Micro Rotor Enhanced Block Cipher Designed For Eight Bits Micro-Controllers (MREBC) Ahmed ElShafee, Ahram Canadian University, Egypt
Image Authentication Through ZTransform with Low Energy And Bandwidth (IAZT Madhumita Sengupta and J. K. Mandal, University of Kalyani, India
Fast Detection of Ddos Attacks Using Non-Adaptive Group Testing Huynh Nguyen Chinh, Tan Hanh and Nguyen Dinh Thuc, HCMC,Vietnam
Effectiveness of Feature Detectionoperators on the Performance of Iris Biometric Recognition System Binsu C. Kovoor, Supriya M.H. and K. Poulose Jacob, Cochin University of Science and Technology, India
Secure Collaborative Processing Architecture for MITB Attack Detection Hani Qusa and Shadi Abudalfa, University College of Applied Science, Palestine
Security Challenges, Issues and Their Solutions For Vanet Ram Shringar Raw, Manish Kumar and Nanhay Singh, Ambedkar Institute of Advanced communication Technologies & Research, India
Defense Mechanisms for Computer-Based Information Systems Majid Alshammari and Christian Bach, University of Bridgeport, USA
Optimized Hybrid Security Mechanism for Image Authentication and Secrecy using PSO K.Kuppusamy and K.Thamodaran, Alagappa University, India
Credit Based Methodology to Detect and Discriminate DDOS Attack From Flash Crowd in A Cloud Computing Environment N.Jeyanthi, Hena Shabeeb and Mogankumar P.C, VIT University, India
Z-Shaped Dipole Antenna and its Fractal Iterations Mustafa H. Abu Nasr, Al- Azhar University, Palestine
A Novel Approach for Secure Routing Through BGP Using Symmetric Key Divan Raimagia, Shraddha Singh and Sameena Zafar, PIES College, India
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm Adnan M. Shihab, Raghad K. Mohammed and Woud M. Abed, University of Baghdad, Iraq
A Novel Technique to Detect Intrusion in Manet J. K. Mandal1 and Khondekar Lutful Hassan2, 1University of Kalyani, India and 2University of Calcutta,India
Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level Fahmida Rahman and Mohammed Arozullah, The Catholic University of America, USA
Phishing Techniques and Mitigating the Associated Security Risks Marc A. Rader and Syed (Shawon) M. Rahman, Capella University, USA
Wireless Networks Security in Jordan: A Field Study Ahmad S. Mashhour1 and Zakaria Saleh2, 1University of Bahrain, Bahrain and 2Yarmouk University, Jordan
Early Detection of SQL Injection Attacks Hossain Shahriar, Sarah North and Wei-Chuen Chen, Kennesaw State University, USA
A Framework for Security Components Anomalies Severity Evaluation and Classification Kamel Karoui, Fakher Ben Ftima and Henda Ben Ghezala, University of Manouba, Tunisia
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication Pavan Kumar K, P. E. S. N. Krishna Prasad, M. V. Ramakrishna and B.D.C.N. Prasad, Prasad V. Potluri Siddhartha Institute of Technology, India
Defence Schemes From Attacker's Own Reward Processes L-F Pau, Copenhagen Business School, Denmark
Controlling IP Falsifying Using Realistic Simulation Govindavaram Madhusri1 and Chakunta Venkata Guru Rao2, 1Kakatiya University, India and 2JNTU University, India
Malware Risk Analysis on the Campus Network with Bayesian Belief Network Aliyu Mohammed, Haitham A. Jamil, Sulaiman Mohd Nor and Muhammad NadzirMarsono, Universiti Teknologi Malaysia, Malaysia
Internal Security on an IDS Based on Agents Rafael Paez, Mery Yolima Uribe and Miguel Torres, Pontificia Universidad Javeriana, Colombia
A New Stemmer to Improve Information Retrieval Wahiba Ben Abdessalem Karaa, University of Tunis. Tunisia
Performance Evaluation of Enhancedgreedy-Two-Phase Deployment Algorithm Kartit Ali, University Mohammed V-Agdal, Morocco
Steganography and Random Grids Pratarshi Saha1, Sandeep Gurung1 and Kunal Krishanu Ghose2, 1Sikkim Manipal Institute of Technology, India and 2QualComm, USA
An Improved MULTI-SOM Algorithm Imen Khanchouch, Khaddouja Boujenfa and Mohamed Limam, University of Tunis, Tunisia and Dhofar University, Oman
Experimental Analysis of AODV and DSR with Varying Vehicle Mobility and Density in Vanet Scenario Arzoo Dahiya and R.K.Chauhan, Kurukshetra University, India
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy Depletion Parameters S.Prabhakara Rao1, E.Nagabhooshanam2 and S.Ramesh Babu1, 1Nigama Engineering College, India and 2Sridevi Womens Engineering College, India
An Efficient Group Authentication for Group Communications Lein Harn1 and Changlu Lin2, 1University of Missouri, USA and 2Fujian Normal University, P. R. China
Password Based Scheme and Group Testing for Defending DDOS Attacks G Dayanandam1, T V Rao2, S Pavan Kumar Reddy1 and Ravinuthala Sruthi1, 1QIS Institute of Technology (QISIT), India and 2KL University (KLU), India
Security Algorithms for WIMAX M Alzaabi1, K D Ranjeeth1, T Alukaidey1 and K Salman2, 1University of Hertfordshire, UK and 2Middle Tennessee State University, USA
Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network Seyedeh Yasaman Rashida, Islamic Azad University Shirgah, Iran
HTTPI Based Web Service Security over SOAP Pankaj Choudhary, Rajendra Aaseri and Nirmal Roberts, ABV - Indian Institute of Information Technology & Management, India
Implementation of a Security Protocol for Bluetooth and WI-FI U. Pavan Kumar, Amity University, India
Bearings Prognostic Using Mixture of Gaussians Hidden Markov Model and Support Vector Machine Fatima Ezzahra Sloukia1, Rajae Bouarfa1, Hicham Medromi2 and Mohammed Wahbi1, 1SIR2C2S/LASI-EHTP, Morocco and 2Hassan II University, Morocco
Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc Networks Rajendra Aaseri, Pankaj Choudhary and Nirmal Roberts, ABV-Indian Institute of Information Technology, India
Incident Response Plan for a Small to Medium Sized Hospital Charles DeVoe and Syed (Shawon) M. Rahman, Capella University, USA
Privacy Preserving Data Mining by using Implicit Function Theorem Pasupuleti Rajesh1 and Gugulothu Narsimha2, 1VVIT College, India and 2JNTUH University, India.
Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering Systems Alexis V. Pantola1, Susan Pancho-Festin2 and Florante Salvador1, 1De La Salle University, Philippines and 2University of the Philippines, Philippines
Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks Leelavathi G1, Shaila K2, Venugopal K R3 and L M Patnaik4, 1Govt.S.K.S.J.Technological Institute, India, 2Vivekananda Institute of Technology, India, 3University Visvesvaraya College of Engineering, India and 4Indian Institute of Science, India
Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation Andrew Rudder, Wayne Goodridge and Shareeda Mohammed, The University of the West Indies, Trinidad and Tobago.
A 64 Bits Rotor Enhanced Block Cipher (Rebc3) Ahmed ElShafee, Ahram Canadian University, Egypt.
A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering S.Lakshmi1 and V.Sankaranarayanan2, 1Jeppiaar Engineering College, India and 2Crescent Engineering College, India.
Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment Shalvi Dave1, Bhushan Trivedi2 and Jimit Mahadevia3, 1Indus University, India, 2GLSICT,India and 3Elitecore Technologies Pvt. Ltd., India
Code Aware Dynamic Source Routing for Distributed Sensor Network M Abdul Rahiman1, Nishanth Jain1, Arun K. Dubey2 and G Manoj Kumar3, 1AICTE, Ministry of HRD,Govt of India, India, 2Bharati Vidyapeeth College of Engineering, India and 3LBS Inst of Tech for Women, India.
Resonance Based Micromechanical Cantilever for Gas Sensing Subhashini. S1 and Vimala Juliet. A2, 1Sathyabama University, India and 2SRM University, India
Traceback of DOS Over Autonomous Systems Mohammed Alenezi and Martin J Reed, School of Computer Science and Electronic Engineering, University of Essex, UK
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-hoc Network Environment Vaishali D. Khairnar and Ketan Kotecha, Institute of Technology Nirma University, India
A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries Dexin Yang1, Chunjing Lin2 and Bo Yang2, 1Guangzhou City Polytechnic, China and 2Shaanxi Normal University, China
Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour Arpitha M1, Geetha V1,Gowranga K H2 and Bhakthavathsalam R2, 1Alpha College Of Engineering, India and 2Indian Institute of Science, India
E-Commerce Systems Security for Small Businesses Syed (Shawon) M. Rahman and Robert Lackey, Capella University, Minneapolis, USA.
Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study Natarajan Meghanathan, Jackson State University, USA
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers Kuo-Tsang Huang1, Jung-Hui Chiu1 and Sung-Shiou Shen2, 1Chang Gung University, Taiwan and 2DE LIN Institute of Technology, Taiwan
An Integrated Solution for both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study M Gnana Seelan and Ch AS Murty, Centre for Development of Advanced Computing - Hyderabad, India
How to Find a Fixed Point in Shuffle Efficiently Mikako Kageshima and ManabuOkamoto, Kanagawa Institute of Technology, Japan
Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study Aidarus M. Ibrahim, Hussein A. Hashi and Abdullalem A. Mohamed, University Technology Malaysia (UTM), Malaysia
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines A. M. Chandrashekhar1 and K. Raghuveer2, 1Sri Jayachamarajendra College of Engineering (SJCE), India and 2National Institute of Engineering (NIE) Mysore, India
Text Steganographic Approaches: A Comparison Monika Agarwal, PDPM-IIITDM Jabalpur, India