To search, Click below search items.
All Published Papers Search Service
Title
Highly Efficient Kerberos Style Authentication and Authorization for Cloud Computing
Author
Sulochana. V, Parimelazhagan. R
Vol. 15 No. 2 pp. 7-10
Keywords
Security, Kerberos, Cloud Computing, Authentication, Authorization
Genetic Algorithm for Automatic Generation of Representative Test Suite for Mutation Testing
C. Prakasa Rao, P. Govindarajulu
Vol. 15 No. 2 pp. 11-17
Test suite generation, branch coverage, genetic algorithm, search based testing
Study on a Secure Wireless Data Communication in Internet of Things Applications
Chibiao Liu, Jinming Qiu
Vol. 15 No. 2 pp. 18-23
Internet of things, Wireless security attacks, Secure data transmission, Performance overhead
Application of an AODE Based Classifier to Detect DOS Attacks
Levent Koc, Alan D. Carswell
Vol. 15 No. 2 pp. 24-28
Averaged one-dependence estimators (AODE), Na?ve Bayes classifier, Denial of service (DOS) attack, Intrusion detection system (IDS)