To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10775

Title

Pseudonym and Privacy Using Quantum Key Distribution (QKD) in E-business

Author

Sharipah Setapa, Norazah Abd Aziz, Mohd Aminudin Mohd Khalid, Muhammad Reza Zaba, Azimah Abd Kadir

Citation

Vol. 11  No. 8  pp. 151-155

Keywords

Privacy, Pseudonym, untraceable, linkable


Title

SCADA Implementation of Industrial Temperature Automation

Author

Haider Ali, Ahmed Ali, Riaz Ul Hassnain Syed, Qasim Rauf, Ihsanullah Khan

Citation

Vol. 11  No. 8  pp. 145-150

Keywords

SCADA (Supervisory Control And Data Acquisition), SETPOINT, FEEDBACK


Title

Implementing Rule based Genetic Algorithm as a Solution for Intrusion Detection System

Author

Shaik Akbar, K.Nageswara Rao, J.A.Chandulal

Citation

Vol. 11  No. 8  pp. 138-144

Keywords

IDS, Genetic Algorithm, KDDCUP dataset, rule set


Title

Beyond the Security Track: Embed Security Education across Undergraduate Computing Curricula Using M-Thread Approach

Author

Lydia Ray, Jianhua Yang

Citation

Vol. 11  No. 8  pp. 131-137

Keywords

Computer security, security education, computing curriculum, M-Thread, information assurance


[1] ... [prev] [1911] [1912] [1913] [1914] [1915] [1916] [1917] [1918] [1919] [1920] [next] ... [2694]