To search, Click below search items.
All Published Papers Search Service
Title
Enhanced Analysis Method for Suspicious PDF Files
Author
Suleiman J. Khitan, Ali Hadi, Jalal Atoum
Vol. 15 No. 5 pp. 32-38
Keywords
Malware analysis, PDF documents, Malicious PDF, Suspicious PDF, Structure Scan.
Importance of Security in Database
Hamed Pourzargham
Vol. 15 No. 5 pp. 29-31
Database, Security, Excessive Rights, Denial of Service Access Control.
Performance Simulation Evaluation of Various Routing Protocols in Mobile Ad-Hoc Networks Using ns-2 Simulator
Mehemed Bashir Aliwa
Vol. 15 No. 5 pp. 19-28
Mobile ad-hoc, wireless networks, ns-2 simulator, metrics, routing protocols and performance evaluation
Enhanced Solutions for Misuse Network Intrusion Detection System using SGA and SSGA
Sabah A. Jebur, Hebah H. O. Nasereddin
Vol. 15 No. 5 pp. 12-18
Intrusion Detection System, Simple Genetic Algorithm, Steady State Genetic Algorithm