To search, Click below search items.
All Published Papers Search Service
Title
Trust based Mutual Authentication Mechanism for Cloud Computing
Author
Mandeeep Kaur and Dr. Prachi Garg
Vol. 23 No. 12 pp. 81-90
Keywords
Access control, Mutual Authentication, Cloud Computing, Data Security, S-box.
Applying Artificial Intelligence Based on Fuzzy Logic for Improved Cognitive Wireless Data Transmission: Models and Techniques
Ahmad AbdulQadir AlRababah
Vol. 23 No. 12 pp. 13-26
wireless network; cognitive wireless network; radio frequency spectrum; operational frequencies; natural limitations of frequency; quality requirements; artificial intelligence; data transmission.
Securing SCADA Systems: A Comprehensive Machine Learning Approach for Detecting Reconnaissance Attacks
Ezaz Aldahasi and Talal Alkharobi
Vol. 23 No. 12 pp. 1-12
SCADA/ICS security; Reconnaissance attacks; Critical infrastructure; Imbalanced dataset handling techniques; Ensemble methods; Feature Engineering
Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication
Neha Pathak, Bobby Sharma
Vol. 23 No. 11 pp. 190-194
Cyber security, UNSW-NB 15 Dataset, Decision Tree, Gini Index, Information Entropy, Cross-validation, Accuracy, Execution Time.