To search, Click below search items.
All Published Papers Search Service
Title
The simple information security audit process: SISAP
Author
Bel G. Raggad, Emilio Collar
Vol. 6 No. 6 pp. 189-198
Keywords
Security audit, vulnerability assessment, threats, ISO 17799, nominal audit, risk assessment
Response Mechanism for Defending Computer Networks
C. Onwubiko, A.P. Lenaghan
Vol. 6 No. 8 pp. 36-42
Response mechanism, fuzzy responder, human assistance security threats, computer networks
On Recent Security Enhancements to Autoconfiguration Protocols for MANETs Real Threats and Requirements
A. Abdelmalek, M. Feham, A. Taleb-Ahmed
Vol. 9 No. 4 pp. 401-407
Autoconfiguration, Threats, Security Requirements, Mobile Ad Hoc Networks
A Secure Authentication System- Using Enhanced One Time Pad Technique
Raman Kumar, Roma Jindal, Abhinav Gupta, Sagar Bhalla, Harshit Arora
Vol. 11 No. 2 pp. 11-17
One Time Pad (OTP), Random, Attacks Security Threats, Cryptographic Techniques and Information Security