To search, Click below search items.
All Published Papers Search Service
Title
Camouflage in Malware: from Encryption to Metamorphism
Author
Babak Bashari Rad, Maslin Masrom, Suhaimi Ibrahim
Vol. 12 No. 8 pp. 74-83
Keywords
Camouflage in Malware, Malware Evolution, Malware Encryption, Malware Oligomorphism, Malware Polymorphism, Malware Metamorphism, Obfuscation Techniques
Network based Security model using Symmetric Key Cryptography (AES 256? Rijndael Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)
Nitin K. Jharbade, Rajesh Shrivastava
Vol. 12 No. 8 pp. 69-73
AES, Rijndael, Diffie-Hellman, Primitive root, MIM
A Novel Approach for Keyboard Dynamics Authentication based on Fusion of Stochastic Classifiers
A. Rezaei, S. Mirzakochaki
Vol. 12 No. 8 pp. 60-68
Authentication, Imposter, keyboard dynamics, Linear discriminant classifier (LDC), quadratic discriminat classifer (QDC), k-nearest neighbor classifier (K-NN), Classifier combination, Discriminant functions
Proposing a New Approach to Applying Pervasive Computing in Agriculture Environments
Mohammadreza Mohammadrezaei, Mahsa Fathi, Nima Attarzadeh
Vol. 12 No. 8 pp. 55-59
pervasive computing, agriculture environment, sensor network, fuzzy logic