Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "security analysis"

ADD TO MY LIST
 
On-board Unit and its Possibilities of Communications on Safety and Security Principles

Author(s): Martin Vaculik | Maria Franekova | Peter Vestenicky | Martin Vestenicky
Measurement of Ultra-Short Solitary Electromagnetic Pulses

Author(s): Eva Gescheidtova | Miloslav Steinbauer | Pavel Fiala
Investigation of TCSC Impacts on Voltage Stability of Electric Power System

Author(s): S. Sajedi | F. Khalifeh | T. Karimi | Z. Khalifeh
Hemodialysis patients' perception from nurses' role in their adjustment with hemodialysis: A qualitative study

Author(s): Mohammad Reza Asgari | Eesa Mohammadi | Masoud Fallahi Khoshknab | Mohammad Reza Tamadon
Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

Author(s): Filip Rezac | Miroslav Voznak | Karel Tomala | Jan Rozhon | Jiri Vychodil
COMPARATIVE ANALYSIS OF THE LEVEL OF TAXATION IN ROMANIA AND EUROPEAN UNION

Author(s): Maria Zenovia GRIGORE | Mariana GURAU
Hurst Parameter for Security Evaluation of LAN Traffic

Author(s): Ruoyu Yan | Yingfeng Wang
DEVELOPING A SECURITY PROTOCOL FOR A WIRELESS COMPUTER VIRTUAL LABORATORY (WCVLAB)

Author(s): EDWARD N. UDO | IMO J. EYO | INI J. UMOEKA
The Role of the Press in Public Security

Author(s): Robson Sávio Reis Souza
Human Security: A Normative Perspective

Author(s): Bogdan Stefanachi
Discriminant Analysis based Feature Selection in KDD Intrusion Dataset

Author(s): Dr.S.Siva Sathya | Dr. R.Geetha Ramani | K.Sivaselvi
Optimal Placement and Sizing of SVC for Voltage Security Enhancement

Author(s): Shraddha Udgir | Sarika Varshney | Laxmi Srivastava
A review of Fuzzy Mechanismsfor Egovernment Security

Author(s): Nadir Omer FadlElssied | Othman Ibrahim | Adil Ali A.alaziz
Speech Recognition: Increasing Efficiency of Support Vector Machines

Author(s): Aamir Khan | Muhammad Farhan | Asar Ali
Intrusion Detection Model based on Differential Evolution

Author(s): M. Sailaja | R. Kiran Kumar | P. Sita Rama Murty
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator

Author(s): H. A. Esmail | M. R. Khalili Shoj | Hossein gharaee
A Comparison of Trojan Virus Behavior in Linux and Windows Operating System

Author(s): Ghossoon. M. W. Al-Saadoon | Hilal M.Y. Al-Bayatt
ANALYSIS OF DIFFERENT PRIVACY PRESERVING CLOUD STORAGE FRAMEWORKS

Author(s): Rajeev Bedi | Mohit Marwaha | Tajinder Singh | Harwinder Singh | Amritpal Singh
Innovation and Technology Management in Wind Energy Cluster

Author(s): Wagner Sousa de Oliveira | Antonio Jorge Fernandes
APPLICATIONS OF THE THERMOCHEMICAL TREATMENTS IN THE SUSTAINABLE DEVELOPMENT CONTEX

Author(s): Cora Bulmău (Gheorghe) | Adrian Badea | Diana Cocârţă | Irina Aura Istrate
Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Author(s): Pavan Kumar Gupta | Naveen Hemrajani | Savita Shiwani | Ruchi Davey
Approaches to Definition of Security of an Enterprise

Author(s): N. L. Gavkalova | Y. S. Chaplygina
Assessment The Agricultural Student's Attitudes Towards Organic Farming (Case of Iran)

Author(s): Farid Golzardi | Shabnam Sarvaramini | Mohammad Reza Ardakani | Ali Asadi | Khalil Kalantari
Achievements of Nursing Portal Development in Selected Countries

Author(s): Reza Safdari | Mashaallah Torabi | Mohammad Ali Cheraghi | Niloufar Masoori | Zahra Azadmanjir
Cloud Computing Security Issues and Challenges

Author(s): Kuyoro 'Shade O., Ibikunle Frank, Awodele Oludele
Dynamic Audio-Visual Client Recognition modelling

Author(s): Tijjani Adam Shuwa, U. Hashim
Europeanization beyond Europe

Author(s): Frank Schimmelfennig
Analysis and Design of Affine and Hill Cipher

Author(s): Mozhgan Mokhtari | Hassan Naraghi
On-board Unit and its Possibilities of Communications on Safety and Security Principles

Author(s): Martin Vaculik | Maria Franekova | Peter Vestenicky | Martin Vestenicky
Measurement of Ultra-Short Solitary Electromagnetic Pulses

Author(s): Eva Gescheidtova | Miloslav Steinbauer | Pavel Fiala
Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

Author(s): Filip Rezac | Miroslav Voznak | Karel Tomala | Jan Rozhon | Jiri Vychodil
Review Of Syn-Flooding Attack Detection Mechanism

Author(s): Mehdi Ebady Manna | Angela Amphawan
A Security Suite for Wireless Body Area Networks

Author(s): Raghav V. Sampangi | Saurabh Dey | Shalini R. Urs | Srinivas Sampalli
A New Image Encryption Scheme for Secure Digital Images Based on Combination of Polynomial Chaotic Maps

Author(s): Ahmed A. Abd El-Latif | Li Li | Ning Wang | Jia-Liang Peng | Zhenfeng Shi | Xiamu Niu
STANDARDIZING SOURCE CODE SECURITY AUDITS

Author(s): Suzanna Schmeelk | Bill Mills | Leif Hedstrom
A contemporary overview labour market of Kazakhstan

Author(s): Ayhan Gençler | Recep Seymen | Arif Akbaş
Risk Analysis for Critical Infrastructures Using Fuzzy TOPSIS

Author(s): Morteza Yazdani | Ali Alidoosti | Mohammad Hossein Basiri
Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques

Author(s): Sreenivasa Rao Basavala | Narendra Kumar | Alok Agarrwal
Preventive Maintenance of Railway Tracks: Ballast Performance Anticipation in the Cameroon Railway

Author(s): Lezin Seba Minsili | Madja Doumbaye Jérémie | Grace L. Tsebo Simo | Christiane Simo
Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA

Author(s): Sundararaman Rajagopalan | Rengarajan Amirtharajan | Har Narayan Upadhyay | John Bosco Balaguru Rayappan
Appetite and falls: Old age and lived experiences

Author(s): Marianne Mahler | Anneli Sarvimäki
The perception of Sao Paulo state consumers in relation to ship meat: analysis by principal components Percepção de consumidores paulistas em relação à carne ovina: análise fatorial por componentes principais

Author(s): Ricardo Firetti | Celso da Costa Carrer | Vivian Lara Silva | Marco Antônio Trindade | Silvio César de Souza | Holmer Savastano Júnior | Marcelo Machado de Luca de Oliveira Ribeiro
HWSW IMPLEMENTATION OF IRIS RECOGNITION ALGORITHM IN THE FPGA

Author(s): Hentati Raida | YassineAoudni | Mohamed Abid
IMPLEMENTATION OF THE TRIPLE-DES BLOCK CIPHER USING VHDL

Author(s): Sai Praveen Venigalla | M. Nagesh Babu | Srinivas Boddu | G. Santhi Swaroop Vemana
The Spirituality Questionnaire: Core Dimensions of Spirituality

Author(s): Gerhild Becker | Malgorzata Dragan | Carola Xander | Jochen Hardt | Sonja Schultz
Forest Biomass Availability Analysis and Large-Scale Supply Options

Author(s): Eero Jäppinen | Kalle Karttunen | Tapio Ranta | Olli-Jussi Korpinen
Safety Aspects in the Distance Learning Systems

Author(s): Alexander Zyma | Yousef Daradkeh | Sergii Kavun
Safety Aspects in the Distance Learning Systems

Author(s): Alexander Zyma | Yousef Daradkeh | Sergii Kavun
Improved Performance by Parametrizing Wavelet Filters for Digital Image Watermarking

Author(s): Mangaiyarkarasi Palanivel | Arulselvi Shanmugam
Split Personality Malware: A Security Threat

Author(s): Nisha Lalwani | M.B.Chandak | R.V.Dharaskar
Antiphishing Model with URL & Image based Webpage Matching

Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat
Efficient Face Detection using Adaboost

Author(s): K.T.Talele | Sunil Kadam | Atul Tikare
A Novel Approach for Iris Encryption

Author(s): Shrinivasrao B. Kulkarni | Ravindra S. Hegadi | Umakant P. Kulkarni
Antiphishing Model with URL & Image based Webpage Matching

Author(s): Madhuri S. Arade | P.C. Bhaskar | R.K.Kamat
An Approach for SMS Security using Authentication Functions

Author(s): Neetesh Saxena | Narendra S. Chaudhari
A New Security Protocol for Mobile Ad Hoc Networks

Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha
Analysis of Secure Mobile Agent System

Author(s): Rajesh Shrivastava | Pooja Mehta (Gahoi)
Estudo da estabilidade de pequenas barragens de terra compactadas em três teores de umidade

Author(s): David de Carvalho | João Alexandre Filho Paschoalin
State of the technical supply of services industrial hygiene and safety, Colombia, 2010 Estado de la oferta técnica de servicios higiene y seguridad industrial, Colombia, 2010

Author(s): Marcela E. Varona | Carlos Humberto Torres | Sonia M. Díaz | Ruth Marien Palma | Diana Milena Checa | Juan Vicente Conde
Evaluation of the demanded physical effort and posture of workers in forest nursery activity

Author(s): Eduardo da Silva Lopes | Felipe Martins de Oliveira
BECOMING A TOUR GUIDE: ANALYZING THE MOTIVATIONS

Author(s): Monika PRAKASH | Nimit CHOWDHARY | SUNAYANA
A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis

Author(s): Morampudi Naresh kumar | Datrika Srinivas Rao | D.Sravanthi
Save time & money - Smart Internet Solutions      Why do you need a reservation system?