To search, Click below search items.
All Published Papers Search Service
Title
Artificial Immune Clonal Selection Algorithms: A Comparative Study of CLONALG, opt-IA, and BCA with Numerical Optimization Problems
Author
Khaled A. Al-Sheshtawi, H. M. Abdul-Kader, Nabil A. Ismail
Vol. 10 No. 4 pp. 24-30
Keywords
Clonal Selection Algorithms, CLONALG, opt-IA, BCA, numerical optimization
Survey on Awareness and Security Issues in Password Management Strategies
D.Santhi Jeslet, G.Sivaraman, M. Uma, K.Thangadurai, M.Punithavalli
Vol. 10 No. 4 pp. 19-23
Password management, security, user authentication, password composition and management
MANET Routing Protocols and Wormhole Attack against AODV
Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar, Bhavin I. Shah
Vol. 10 No. 4 pp. 12-18
Mobile Ad-hoc Network, Routing Protocols, Wormhole attack, Securing AODV, Countermeasures
Information Security Expenditures: a Techno-Economic Analysis
Theodosios Tsiakis
Vol. 10 No. 4 pp. 7-11
Risk, Information Security, Quantitative and Qualitative Analysis