To search, Click below search items.
All Published Papers Search Service
Title
Novice Threat Model using SIEM System for Threat Assessment
Author
Arshad Khan, Farhan Nisar, Dr. Samad Baseer
Vol. 25 No. 2 pp. 117-124
Keywords
network security, SIEM, Latest security tool
Energy Efficient Resource Allocation Model for Cloud Using Ranking Algorithm
Dr S.Thilagamani, T.Sangeetha
Vol. 25 No. 2 pp. 125-128
Cloud computing; resource allocation, ranking algorithm; virtual machines.
Hybrid Approach for Optimised Intrusion Detection System
Mr.M.Mangaleswaran
Vol. 25 No. 2 pp. 129-134
Intrusion detection system; Hidden conditional Random Fields; Conditional random fields; Anomalous Activity; Layer-based Intrusion Detection System. .
Data Mining and Knowledge Discovery from Web
K.Narendra Kumar
Vol. 25 No. 2 pp. 135-140
Data Mining, Knowledge Discovery, Web, World Wide Web