To search, Click below search items.
All Published Papers Search Service
Title
TSPass: A Dynamic User Authentication Scheme Based On Time and Space
Author
Xuguang Ren, Xin-Wen Wu, Kun Tang
Vol. 12 No. 10 pp. 45-53
Keywords
Password, Perfect-man-in-the-middle attack, Phishing attack, Reply attack, Dynamic user authentication, Time and space dynamism
A Hybrid Model to Detect Phishing-Sites using Clustering and Bayesian Approach
Bhushan Dasharath Dhamdhere, Kaushal Sudhakar Dhonde, Rohit Gopal Chinchwade
Vol. 15 No. 1 pp. 92-95
Anti Phishing Technique, Bayesian Approach, Data Mining, Database Clustering, Hybrid Model, and Phishing Attack
Cloud Based Security Center: To Protect Networking Attack by Forensic Scrutiny
Sankara Mahalingam M
Vol. 15 No. 2 pp. 50-54
Cloud Computing, Collaborative Network Security System, Computer forensics, Anti-Phishing, Hadoop File System, Eucalyptus
Vol. 16 No. 2 pp. 83-87
Cloud Computing, Collaborative Network Security System, Computer forensics, Anti-Phishing, Hadoop File System, Eucalyptus.