To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10576

Title

Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms

Author

Y.Dhanalakshmi, I. Ramesh Babu

Citation

Vol. 8  No. 2  pp. 27-32

Keywords

Data Mining algorithms, Apriori, Fuzzy logic, Genetic algorithms


Title

New Hash Function Based on Chaos Theory (CHA-1)

Author

Mahmoud Maqableh, Azman Bin Samsudin, Mohammad A. Alia

Citation

Vol. 8  No. 2  pp. 20-26

Keywords

Hash Functions, SHA-1, Chaos Theory, Logistic Map and Collision Search Attacks


Title

An Optimal Sensor Architecture for Wi-Fi Intrusion Detection

Author

Zhiqi Tao, Baikunth Nath, Andrew Lonie

Citation

Vol. 8  No. 2  pp. 10-19

Keywords

Wi-Fi network security, IEEE 802.11 network, Network Monitoring, intrusion detection, clustering


Title

Using Elliptic Curves on RFID Tags

Author

Michael Braun, Erwin Hess, Bernd Meyer

Citation

Vol. 8  No. 2  pp. 1-9

Keywords

RFID, Authentication, Elliptic Curve Cryptography, Privacy


[1] ... [prev] [2331] [2332] [2333] [2334] [2335] [2336] [2337] [2338] [2339] [2340] [next] ... [2644]