Effectiveness and Weakness of Quantified/Automated Anomaly Based IDs HidemaTanaka, National Defense Academy of Japan, Japan
Practical Approach for Securing Windows Environment : Attack Vectors and Countermeasures Abdurrahman Pektas and Ertugrul Basaranoglu, Galatasaray University, Turkey
Predominance of Blowfish Over Triple Data Encryption Standard Symmetric Key Algorithm for Secure Integrated Circuits Using Verilog HDL V. Kumara Swamy1 Prabhu Benakop2, 1Sreenidhi Institute of Science and Technology, India and 2Indur Institute of Engineering and Technology, India
Feature Extraction and Feature Selection : Reducing Data Complexity with Apache Spark Dimitrios Sisiaridis and Olivier Markowitch, Universite Libre de Bruxelles, Belgium
An Efficient Identity Based Authentication Protocol by Using Password Sanjeev Kumar Mandal and A R Deepti, Acharya Institute of Technology, India
Architecture and Design of Micro Knowledge and Micro Medical Processing Units Shawon S. M. Rahman1 and Syed V. Ahamed2, 1University of Hawaii-Hilo, USA and 2City University of New York, USA
A Comparative Study of the Approach Provided for Preventing the Data Leakage Kamaljeet Kaur1, Ishu Gupta2 and Ashutosh Kumar Singh2, 1Govt. Sr. Sec. School - Ambala, India and 2National Institute of Technology - Kurukshetra, India
Protocol Safety of VOIP Using the Cryptosystems Based on Elliptic Curve Layie Paul and Vivient Corneille Kamla, University of Ngaoundere, Cameroon
Performance Evaluation of J48 and Bayes Algorithms for Intrusion Detection System Uzair Bashir1 and Manzoor Chachoo2, 1Mewar University, India and 2University of Kashmir, India
Modelling Cyber Attacks Farida Chowdhury1 and Md Sadek Ferdous2, 1Shahjalal University of Science and Technology, Bangladesh and 2University of Southampton, UK
Node Authentication Using BLS Signature in Distributed PKI Based MANETs N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah, and Y. V. Subba Rao, University of Hyderabad, India
Enhance Efficiency of EAP-TTLS Protocol Through the Simultaneous Use of Encryption and Digital Signature Algorithms Seyed Milad Dejamfar and Sara Najafzadeh, Islamic Azad University, Iran
A Plain Image Dependent Image Encryption Scheme Using Half Pixel Level Interchange Permutation Operation Li Liu, Yucheng Chen and Ruisong Ye, Shantou University, China
A Conceptual Secure Blockchain Based Electronic Voting System Ahmed Ben Ayed, Colorado Technical University, USA
Enhancing Cyber Security of Online Accounts via A Novel Protocol and New Techniques Mehrdad Nourai and Haim Levkowitz, University of Massachusetts Lowell, USA
Metric for Evaluating Availability of an Information System : A Quantitative Approach Based on Component Dependency Suhail Qadir Mir1 and S.M.K. Quadri2, 1University of Kashmir, India and 2Jamia Millia Islamia, India
A Secure E-Medical Exemption System (E-MES): Jordan Case Heba N. Kamel, Mohammad A. Alia, Bara'aha. Al Saeq and Eman Abu Maria, Al Zaytoonah University of Jordan, Jordan
A Study on LEA and Seed Algorithms for Data Protection of Smartphone Based Disaster Notification System Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam University, Korea
Application-Layer DDOS Detection Based on a One-Class Support Vector Machine Chuyu She1, 2, 3 , Wushao Wen1,2, Zaihua Lin1 and Kesong Zheng1, 1Sun Yat-Sen University, China, 2SYSU-CMU Shunde International Joint Research Institute, China and 3Guangdong University of Finance & Economics, China
A Survey on Security in Wireless Sensor Networks Waleed Al Shehri, King Abdul-Aziz University, Saudi Arabia