To search, Click below search items.
All Published Papers Search Service
Title
Pseudonym and Privacy Using Quantum Key Distribution (QKD) in E-business
Author
Sharipah Setapa, Norazah Abd Aziz, Mohd Aminudin Mohd Khalid, Muhammad Reza Zaba, Azimah Abd Kadir
Vol. 11 No. 8 pp. 151-155
Keywords
Privacy, Pseudonym, untraceable, linkable
SCADA Implementation of Industrial Temperature Automation
Haider Ali, Ahmed Ali, Riaz Ul Hassnain Syed, Qasim Rauf, Ihsanullah Khan
Vol. 11 No. 8 pp. 145-150
SCADA (Supervisory Control And Data Acquisition), SETPOINT, FEEDBACK
Implementing Rule based Genetic Algorithm as a Solution for Intrusion Detection System
Shaik Akbar, K.Nageswara Rao, J.A.Chandulal
Vol. 11 No. 8 pp. 138-144
IDS, Genetic Algorithm, KDDCUP dataset, rule set
Beyond the Security Track: Embed Security Education across Undergraduate Computing Curricula Using M-Thread Approach
Lydia Ray, Jianhua Yang
Vol. 11 No. 8 pp. 131-137
Computer security, security education, computing curriculum, M-Thread, information assurance