Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Hackers"

ADD TO MY LIST
 
A Study on Watermarking Schemes for Image Authentication

Author(s): S. Radharani | Dr. M.L. Valarmathi
Cyberculture: Impacts on Netizen

Author(s): Chai Lee Goi
Enhancement in the Identities-Exchange Process during the Authentication Process

Author(s): Amr M. Kisk, Nagy W. Messiha, Nabil M. A. Ayad , Nawal A. Elfeshawy and Fathi E. Abdel-Samie
Implementation of Secured password for Web applications using two server model

Author(s): Dr.R.Shashikumar, | C.N.Vijay kumr, | H.M.Kotresh | Vijay kumar K
Biometrics Security using Steganography

Author(s): Chander Kant | Rajender Nath | Sheetal Chaudhary
On Evaluating BGP Routing Stress Attack

Author(s): Wenping Deng | Peidong Zhu | Xicheng Lu | Bernhard Plattner
An Efficient Analysis of Honeypot Data Based on Markov Chain

Author(s): K.P. Kimou | B. Barry | M. Babri | S. Oumtanaga | T.L. Kadjo
Para una ética y una estética del software libre

Author(s): Alonso, Andoni | del Arco, Javier
ENCRYPTION OF DATA STREAMS USING PAULI SPINS ½ MATRICES

Author(s): D. Sravana Kurmar | CH. Suneetha, | A. Chandra Sekhar
Development of a Software Based Firewall System for Computer Network Traffic Control

Author(s): Okonigene R. EHIMEN | Ikhajamgbe OYAKHILOME
Towards a Collaborative and Systematic Approach to Alert Verification

Author(s): Xuejiao Liu | Debao Xiao | Xi Peng
Network protocols, Management and Security

Author(s): Ray Proneet P. | Singh Abhimanyu U. | Chauhan Geetesh P.
Ethical Hacking

Author(s): Ajinkya A. Farsole
Provable Secured Hash Password Authentication

Author(s): T.S.Thangavel | A. Krishnan
Case Study On Social Engineering Techniques for Persuasion

Author(s): Mosin Hasan | Nilesh Prajapati | Safvan Vohara
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services

Author(s): Urjita Thakar | Nirmal Dagdee | Sudarshan Varma
Email Security

Author(s): Kunal Pandove | Amandeep Jindal | Rajinder Kumar
Defeating Hackers Through a JAVA Based Honeypot Deployment

Author(s): V. Maheswari | P.E. Sankaranarayanan
Using simplex method in verifying software safety

Author(s): Vujošević-Janičić Milena | Marić Filip | Tošić Dušan
A Survey on Session Hijacking

Author(s): P. Ramesh Babu | D. Lalitha Bhaskari | CPVNJ Mohan Rao
Network Usage Security Policies for Academic Institutions

Author(s): S.M.Aqil Burney | M.Sadiq Ali Khan
Network Intrusion Detection System Based On Machine Learning Algorithms

Author(s): Vipin Das | Vijaya Pathak | Sattvik Sharma | Sreevathsan | MVVNS.Srikanth | Gireesh Kumar T
An Analysis on Endaira:A Provably Secure On-Demand Source Routing Protocol

Author(s): A.F.A. Abidin, | N.S.M. Usop, | N.H.N. Zulkifli
EFFICIENT MAPPING METHODS FOR ELLIPTIC CURVE CRYPTOSYSTEMS

Author(s): O.SRINIVASA RAO | Prof. S. Pallam Setty
An Efficient Hybrid Honeypot Framework for Improving Network Security

Author(s): Omid Mahdi Ebadati E. | Harleen Kaur | M. Afshar Alam
Autoria na web 2.0 no contexto da educação e a ética dos hackers / Authoring on the web 2.0: educational view and hacker ethic

Author(s): Marcia Izabel Fugisawa Souza | Luciana Oliveira Silva | Izabel Cristina Araújo
An Authentication Mechanism to prevent SQL Injection Attacks

Author(s): Indrani Balasundaram | E. Ramaraj
Hackers: de piratas a defensores del software libre

Author(s): Lizama Mendoza, Jorge
Encyclopedia of Information Ethics and Security

Author(s): Reviewed by Yavuz AKBULUT
Awareness of Social Engineering Among IIUM Student

Author(s): Mutasim Elsadig Adam | Omer Yousif | Yusra al-Amodi | Jamaludin Ibrahim
ENCRYPTIONS OF DATA STREAMS USING PAULI SPIN ½ MATRICES AND FINITE STATE MACHINE

Author(s): B. Krishna Gandhi | A. Chandra Sekhar | S. Sri lakshmi
Cyber Threats In Social Networking Websites

Author(s): Wajeb Ghari | Maha Shaabi
Risks and Remedies in E-Learning System

Author(s): Nikhilesh Barik | Sunil Karforma
An Efficient Method of Steganography using Matrix Approach

Author(s): Nirmalya Chowdhury | Puspita Manna
LSB Replacement Stegnography in an Image using Pseudorandomised Key Generation

Author(s): B. Karthikeyan | V. Vaithiyanathan | B. Thamotharan | M. Gomathymeenakshi | S. Sruti
Random Image Steganography and Steganalysis: Present Status and Future Directions

Author(s): Rengarajan Amirtharajan | Jiaohua Qin | John Bosco Balaguru Rayappan
Piratarias de gênero: experimentos estéticos queer-copyleft

Author(s): Galindo, Dolores | Méllo, Ricardo Pimentel
Experimental Study of Various Data Masking Techniques with Random Replacement using Data Volume

Author(s): Ravikumar G K | B. Justus Rabi | Ravindra S. Hegadi | Manjunath T.N | Archana R A
Inhibition of Denial of Service Attack in WLAN using the Integrated Central Manager

Author(s): B. Vani | L. Arockiam | A. Persia | S. Sivagowry
Cryptographic Scheme for Digital Signals using Finite State Machines

Author(s): B.Krishna Gandhi | Dr.A.Chandra Sekhar | S.Srilakshmi
A Data-Fusion-Based Method for Intrusion Detection System in Networks

Author(s): Xiaofeng Zhao | Hua Jiang | LiYan Jiao
One Time Password Security through Cryptography For Mobile Banking

Author(s): Dr.D.S.Rao | Gurleen Kour | Divya Jyoti
Empirical Study in the Security of Electronic Payment Systems

Author(s): Mohammad AL-Maaitah | Abdallah Shatat | E Raj Kumar
WLAN Security-Active Attack of WLAN Secure Network

Author(s): Anil Kumar Singh | Bharat Mishra
Detecting Malicious Packet Dropping Using Statistical Traffic Patterns

Author(s): P Julian Benadit | Sharmila Baskaran | Ramya Taimanessamy
A Novel Header Matching Algorithm For Intrusion Detection Systems

Author(s): Mohammad A. Alia | Adnan A. Hnaif | Hayam K. Al-Anie | Khulood Abu Maria | Ahmed M. Manasrah | M. Imran Sarwar
Phishing: A Field Experiment

Author(s): Danuvasin Charoen, Ph.D.
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems

Author(s): Indraneel Mukhopadhyay | Mohuya Chakraborty | Satyajit Chakrabarti
Reducing False Alerts Using Intelligent Hybrid Systems

Author(s): Sravan Kumar Jonnalagadda | Subha Sree Mallela
Turning the Corner: Mislabelling of Online Shops

Author(s): Ay-Hwa Andy Liou | Maw-Nian Wang
IS ETHICAL HACKING ETHICAL?

Author(s): DANISH JAMIL, | MUHAMMAD NUMAN ALI KHAN
PROVIDING DATA SECURITY IN WLAN BY DETECTING UNAUTHORIZED ACCESS POINTS AND ATTACKS

Author(s): MS.SNEHAL S. BEHEDE, | Prof. SANDEEP B. VANJALE, | Prof.Dr.P.B.MANE
Affiliate Program     

Tango Rapperswil
Tango Rapperswil