To search, Click below search items.
All Published Papers Search Service
Title
Trust based Mutual Authentication Mechanism for Cloud Computing
Author
Mandeeep Kaur and Dr. Prachi Garg
Vol. 23 No. 12 pp. 81-90
Keywords
Access control, Mutual Authentication, Cloud Computing, Data Security, S-box.
Securing SCADA Systems: A Comprehensive Machine Learning Approach for Detecting Reconnaissance Attacks
Ezaz Aldahasi and Talal Alkharobi
Vol. 23 No. 12 pp. 1-12
SCADA/ICS security; Reconnaissance attacks; Critical infrastructure; Imbalanced dataset handling techniques; Ensemble methods; Feature Engineering
Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication
Neha Pathak, Bobby Sharma
Vol. 23 No. 11 pp. 190-194
Cyber security, UNSW-NB 15 Dataset, Decision Tree, Gini Index, Information Entropy, Cross-validation, Accuracy, Execution Time.
Comparison of Honeypot System, Types, and Tools
Muhammad Junaid Iqbal, Muhammad Usman Ahmed, Muhammad Asaf
Vol. 23 No. 11 pp. 169-177
Internet, information security, and bibliography research