To search, Click below search items.
All Published Papers Search Service
Title
Identification Security at Unauthorized Use of Information System
Author
Navpreet Kaur and Dhawaleswar Rao,
Vol. 16 No. 1 pp. 72-76
Keywords
Network Security, Honeypots, Firewall, Intrusion analysis, Attacks.
Automation the process of unifying the change in the firewall performance
Kirandeep kaur, Dhawaleswar Rao
Vol. 16 No. 1 pp. 77-80
Policy anomaly, Firewall, Firewall log analysis, Internet, Attacks
An Approach to Counteracting the Common Cyber-attacks According to the Metric-Based Model
Mohammad Sirwan Geramiparvar, Nasser Modiri
Vol. 16 No. 1 pp. 81-85
Metric-Based Model, Cyber-attacks, General Weaknesses, Countermeasures, XSS, SQL Injection
An Effective Efficient Reliable one Hop Broadcast in Mobile Adhoc Networks
Shinde Manisha K, V.R.Chirchi
Vol. 16 No. 1 pp. 86-92
one hop broadcast, hidden terminal , manet, MAC protocol , throughput , packet , efficient , reliable broadcast , node.