To search, Click below search items.
All Published Papers Search Service
Title
Stackelberg Game between Multi-Leader and Multi-Follower for Detecting Black Hole and Warm Hole Attacks In WSN
Author
S.Suganthi, and Dr.D.Usha
Vol. 23 No. 8 pp. 159-167
Keywords
Stackelberg Game, Black hole attack, warm hole attack, backtracking search optimization.
Ensuring Data Confidentiality and Privacy in the Cloud using Non-Deterministic Cryptographic Scheme
John Kwao Dawson, Dr. Frimpong Twum, Dr. Yaw Missah
Vol. 23 No. 7 pp. 49-60
Linear Congruential Generator, Sliding Window Algorithm, Good Prime Number, Cryptography, Symmetric Scheme, Confidentiality, Privacy.
A Survey of Cybersecurity Vulnerabilities in Healthcare Systems
Adwan Alownie Alanazi
Vol. 23 No. 6 pp. 155-161
healthcare; cyber security; attack; malware; patient; threat; Access data; attacker; vulnerability; malicious program; approach; authentication; challenges; intruder; encryption
FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention
Alwi M Bamhdi
Vol. 23 No. 5 pp. 177-190
Anomaly detection, cybersecurity, cyber-attacks, fuzzy logic, information & data security, intrusion detection & prevention, risk analysis & assessment.