To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10775

Title

Camouflage in Malware: from Encryption to Metamorphism

Author

Babak Bashari Rad, Maslin Masrom, Suhaimi Ibrahim

Citation

Vol. 12  No. 8  pp. 74-83

Keywords

Camouflage in Malware, Malware Evolution, Malware Encryption, Malware Oligomorphism, Malware Polymorphism, Malware Metamorphism, Obfuscation Techniques


Title

Network based Security model using Symmetric Key Cryptography (AES 256? Rijndael Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)

Author

Nitin K. Jharbade, Rajesh Shrivastava

Citation

Vol. 12  No. 8  pp. 69-73

Keywords

AES, Rijndael, Diffie-Hellman, Primitive root, MIM


Title

A Novel Approach for Keyboard Dynamics Authentication based on Fusion of Stochastic Classifiers

Author

A. Rezaei, S. Mirzakochaki

Citation

Vol. 12  No. 8  pp. 60-68

Keywords

Authentication, Imposter, keyboard dynamics, Linear discriminant classifier (LDC), quadratic discriminat classifer (QDC), k-nearest neighbor classifier (K-NN), Classifier combination, Discriminant functions


Title

Proposing a New Approach to Applying Pervasive Computing in Agriculture Environments

Author

Mohammadreza Mohammadrezaei, Mahsa Fathi, Nima Attarzadeh

Citation

Vol. 12  No. 8  pp. 55-59

Keywords

pervasive computing, agriculture environment, sensor network, fuzzy logic


[1] ... [prev] [1851] [1852] [1853] [1854] [1855] [1856] [1857] [1858] [1859] [1860] [next] ... [2694]