Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "attacks"

ADD TO MY LIST
 
A Unique Approach for Watermarking Nonnumeric Relational Database

Author(s): Rajneesh Kaur Bedi | Purva Gujarathi | Poonam Gundecha | Ashish Kulkarni
A Robust Wavelet Packet Based Blind Digital Image Watermarking using HVS characteristics

Author(s): C. Patvardhan | A. K. Verma | C. Vasantha Lakshmi
Security Agents: A Mobile Agent Based Trust Model for Cloud Computing

Author(s): Priyank Singh Hada | Ranjita Singh | Mukul Manmohan
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator

Author(s): H. A. Esmail | M. R. Khalili Shoj | Hossein gharaee
A Comparison of Trojan Virus Behavior in Linux and Windows Operating System

Author(s): Ghossoon. M. W. Al-Saadoon | Hilal M.Y. Al-Bayatt
Empoasca Mali Leb. Attacks Man

Author(s): George G. Becker
Attacks on Large or Heavily Defended Preyby Tropical Salticid Spiders

Author(s): Michael H. Robinson | Carlos E. Valerio
Predator feeding choice on conspicuous and non-conspicuous carabid beetles: first results

Author(s): Teresa Bonacci | Pietro Brandmayr | Tullia Zetto Brandmayr
Intrusion Detection System Inside Grid Computing Environment (IDS-IGCE)

Author(s): Basappa B. Kodada | Ramesh Nayak | Raghavendra Prabhu | Suresha D
A Dynamic Approach for Anomaly Detection in AODV

Author(s): P.VIGNESHWARAN | R. DHANASEKARAN
Analysis of Radiological Terrorism on Metropolitan Area

Author(s): Hosik Yoo | Jeong-ho Lee | Sung-woo Kwak
The Offensive Efficiency of the High-Level Handball Players of the Front and the Rear Lines

Author(s): Cherif Moncef | Gomri Dagbaji | Aouidet Abdallah | Said Mohamed
Post-September 11 Discourse: The Case of Iran in The New York Times

Author(s): Maryam Jahedi | Faiz Sathi Abdullah
JPEG Steganography System with Minimal Changes to the Quantized DCT Coefficients

Author(s): Hamdy A. Morsy | Zaki B. Nossair | Alaa M. Hamdy | Fathy Z. Amer
ENCRYPTIONS OF DATA STREAMS USING PAULI SPIN ½ MATRICES AND FINITE STATE MACHINE

Author(s): B. Krishna Gandhi | A. Chandra Sekhar | S. Sri lakshmi
The Effect of Culture Technique on Culture Positivity in Peritoneal Dialysis Patients with Peritonitis

Author(s): Meltem Gürsu | Zeki Aydın | Savaş Öztürk | Filiz Pehlivanoğlu | Gönül Şengöz | Sami Uzun | Serhat Karadağ | Emel Tatlı | Rümeyza Kazancıoğlu
Science Teacher Training Programme in Rural Schools: An ODL Lesson from Zimbabwe

Author(s): Misheck Mhishi | Crispen Erinos Bhukuvhani | Abel Farikai Sana
Session Fixation Vulnerability in Web-Based Application

Author(s): A.P. Jadhav | A.P. Jadhav | Vaibhav B. Lohkare | Bhagyashri R.Deulkar
Online Intrusion Alert Based on Aggregation and Correlation

Author(s): Kunchakarra Anusha1 | K.V.D.Sagar2
Varicella-Zoster Pneumonia in an immunodeficient patient

Author(s): Zamani A | Askar Shirazi M
Recurrent Kawasaki diseases: A case report

Author(s): P Akbari | Y Aghighi | HR Tavakoli
Third Attacks of Chicken Pox in a Leukemic Child

Author(s): Keyghobad Ghadiri | Reza Akramipour | Mandana Afsharian | Siavash Vaziri
Black Hole Detection in MANET Using AODV Routing Protocol

Author(s): Govind Sharma | Manish Gupta
Prevalence of Asthma in Children of Chemical Warfare Victims

Author(s): Majid Mirsadraee | Abolfazl Mozaffari | Davood Attaran
Security Risks in IP Telephony

Author(s): Filip Rezac | Miroslav Voznak
Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

Author(s): Filip Rezac | Miroslav Voznak | Karel Tomala | Jan Rozhon | Jiri Vychodil
Applications of Extendable Embedded Web Servers in Medical Diagnosing

Author(s): Chiranji Lal Chowdhary | Shynu P. G.
Robust Preprocessing and Random Forests Technique for Network Probe Anomaly Detection

Author(s): G. Sunil Kumar | C.V.K Sirisha | Kanaka Durga.R | A.Devi
Review Of Syn-Flooding Attack Detection Mechanism

Author(s): Mehdi Ebady Manna | Angela Amphawan
A Novel Security Framework Using Trust And Fuzzy Logic In Manet

Author(s): Manoj V | Mohammed Aaqib | Raghavendiran N | Vijayan R
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots

Author(s): K.Munivara Prasad | A.Rama Mohan Reddy | V Jyothsna
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks

Author(s): Sridhar Subramanian | Baskaran Ramachandran
Effect of Mozart Music on Hippocampal Content of BDNF in Postnatal Rats

Author(s): Mohsen Marzban | Ali Shahbazi | Mahdi Tondar | Mansooreh Soleimani | Masoomeh Bakhshayesh | Arash Moshkforoush | Mehdi Sadati | Siamak Alizadeh Zendehrood | Mohammad Taghi Joghataei
Bound Maxima as a Traffic Feature under DDOS Flood Attacks

Author(s): Jie Xue | Ming Li | Wei Zhao | Sheng-Yong Chen
ATTACK VECTORS USED IN FRAUDULENCE CONNECTION DURING ONLINE TRANSACTIONS

Author(s): PRADEEP PUNDIR AND VIRENDRA GOMANSE
An Efficient Method of Steganography using Matrix Approach

Author(s): Nirmalya Chowdhury | Puspita Manna
Hypokalemic Quadriparesis due to Use of Tetracosactide

Author(s): Halil Kaya | Özgür Söğüt | Leyla Solduk | Mehmet Akif Dokuzoğlu
CORROSION OF COPPER PIPES JOINTS IN SIMULATED OPERATING CONDITIONS

Author(s): Alexander Dodek | Pavol Fajnor | Tatiana Liptáková | Viera Zatkalíková | Evgeniy Anisimov | Michaela Vojsovičová
Papillary fibroelastoma of the mitral valve chordae causing transient ischemic attacks

Author(s): Burak Onan | İsmihan Selen Onan | Kürşad Öz | İhsan Bakır
CSRF Vulnerabilities and Defensive Techniques

Author(s): Rupali D. Kombade | B.B. Meshram
Data Hiding in JPEG Images

Author(s): S. K. Muttoo | Sushil Kumar
DIFFERENT SECURITY MECHANISMS FOR DIFFERENT TYPE OF SECURITY LAPSES IN WMN- A REVIEW

Author(s): Narender Singh | Kuldeep Vats | Jasvinder | Lovish Jaiswal
Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages

Author(s): Mallikka Rajalingam | Saleh Ali Alomari | Putra Sumari
IMPLEMENTATION OF THE TRIPLE-DES BLOCK CIPHER USING VHDL

Author(s): Sai Praveen Venigalla | M. Nagesh Babu | Srinivas Boddu | G. Santhi Swaroop Vemana
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy

Author(s): Masashi Tsuji | Yoshiaki Nemoto | Yuji Waizumi | Hiroshi Tsunoda
Evaluation of Electrocardiogram for Biometric Authentication

Author(s): S K Singh | Yogendra Narain Singh
Antistreptolysin O titer in health and disease: levels and significance

Author(s): Alyaa Amal Kotby | Nevin Mamdouh Habeeb | Sahar Ezz El Arab
Improved Performance by Parametrizing Wavelet Filters for Digital Image Watermarking

Author(s): Mangaiyarkarasi Palanivel | Arulselvi Shanmugam
A Survey on Cross Layer Security

Author(s): Sandeep Sharma | Rajesh Mishra | Karan Singh
Image Watermarking Algorithm using DCT, DWT and SVD

Author(s): Nidhi H. Divecha | N. N. Jani
Generic Network Intrusion Prevention System

Author(s): Kamini Nalavade | B.B.Meshram
Mathematical Model for Digital Video Watermarking Based On 3D Wavelet Transform

Author(s): Sonam A. Bhandari | Amar D. Rana | Swati Z. Bhandari
An Improved Approach for Signature and Anomaly based Intrusion Detection and Prevention

Author(s): Shivarkar Sandip A. | Muzumdar Ajit A. | Dange Bapusaheb J.
New Strategy for detecting Intrusion by using c4.5 algorithm

Author(s): Radhakrishna Naik | Vivek Kshirsagar | B S Sonawane
Botnet-A Network Threat

Author(s): Sonal P.Patil | Swatantra Kumar
Spatial and Frequency Domain for Grey level Digital Images

Author(s): Dharm Singh | Naveen Choudhary | Madhuri Agrawal
K-anonymity Model for Multiple Sensitive Attributes

Author(s): Nidhi Maheshwarkar | Kshitij Pathak | Narendra S. Choudhari
Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3

Author(s): Nidhi Purohit | Richa Sinha | Hiteishi Diwanji

Tango Rapperswil
Tango Rapperswil

     Affiliate Program