To search, Click below search items.
All Published Papers Search Service
Title
Smart Decision Making for Internal Attacks in Wireless Sensor Network
Author
Muhammad R Ahmed, Xu Huang, Hongyan Cui
Vol. 12 No. 12 pp. 15-23
Keywords
Wireless Sensor Network (WSN), internal attack, Abnormal Behavior Identification Mechanism (ABIM), Dempester Shafer Theory, Abnormal behavior
A Virtualised High Trust Zone (VHTZ) to Mitigate the Security and Privacy Issues in Cloud Computing
Tanveer A Zia, Bhupesh Mansukhani
Vol. 12 No. 12 pp. 6-14
Cloud security, high trust zone, infrastructure as a service, VM threats, network monitoring
Inadvertent Threat Detection According to Power System Components
Hyuk Kim, Jung-Chan Na
Vol. 12 No. 12 pp. 1-5
IEC 62351-7, Invalid Network Access, Inadvertent Threat, Component
A Compressed Anti IP Spoofing Mechanism Using Cryptography
S.Gavaskar, Dr.E.Ramaraj, R.Surendiran
Vol. 12 No. 11 pp. 138-141
IP spoofing, Compression, Cryptography