abnormal. aodv attack authentication cloud computing ddos ddos attack dns reflection or amplification attack dos group testing http flood attack icmp flood manet mobile ad hoc networks network security ns2 packet flow phishing privacy protection m echanism secret sharing security syn flood udp flood vanet visual cryptography more…
8 bits microcontroller abnormal. ad hoc and sensor network security adhoc network aes agent based intrusion detection system (aids) all-optical network security and pso. and services. anomaly severity classification anomaly severity evaluation anonymity aodv aodv. application resource aran ariadne artificial intelligence attack attack graph attacks authentication autopsy bgp bgp protocol big data biometrics; biometric fusion; face; fingerprint; c black hole attack block cipher blue-tooth bluetooth bmp image file botnets brute force attack brute force attacks business intelligence caesar cipher canny ccmp cipher algorithms cloud cloud computing cloud security cloud service clustering coefficient of variance collaborative environments common control channel challenge computer computer network computerbased information system conditional entropy confidentiality cooperative transmission covert channel cpu crahn credits. critical infrastructures. cross site scripting cryptographic algorithm. cryptography cuda current distribution cyber defense dabechies4 data and grid room data density and encryption time data mining data security data size data type database and system security daugman db index. dct based steganography ddisjunct matrix. ddos ddos attack decision making denial of service denial of service (dos) denial-of-service attack dft digital forensics distributed ac distributed computing ditributed denial-of-service attack dll. llc dmt dns poising dns reflection or amplification attack dos dsr dst e-commerce economics emerging attack vectors encryption encryption/decryption encryption\decryption energy-aware routing erbium-doped fiber amplifier (edfa) gain adjustmen etc. fair exchange false positive rate (fpr) file upload finger print authentication firewall policy flash crowds fractal framework frequent itemset fuzzy c-means clustering fuzzy neural network gain game theory genetic algorithm gpu graphical password greying effect group testing hadoop hash function hash function . hashing. hdfs (hadoop distributed file system) hmac http flood attack hvac hybrid hybrid covert channel iaas& authentication icmp flood idpf image coding image encryption in order to the rapid growth of the network applic information hiding information retrieval information technology information theory input impedance integrity. interactive education. internet attacks internet casinos internet security & applications interweaving intruders intrusion detection and prevention intrusion detection system intrusion detection system (ids) intrusion detection system. ip falsifying ipsec iqim ir circuit iris it is necessary that this security concern must be it security k-means clustering key share. knowledge base knowledge-based authentication legitimate traffic. local authentication protocols low-resource lsb steganography malware analysis man-in-the-browser management manet map reduce mapreduce media access control mis mix mobile mobile ad hoc networks mobile agent mobile agents mobile banking mobile cloud computing mobile code mobile devices mobile network mobile payment mode of operation mog-hmm mom multi input multi output (mimo) multi-agent systems multi-anomalies evaluation. multi-channel mac multi-som multipath routing n-triples ndm netstat network and wireless network security network security network security. network security; malware propagation modelling; b network simulation tool network-level security and protection new kinds of network attacks are emerging endlessl non-adaptive group testing ns2 ns2 online social networks ontology opportunistic large array optical switch crosstalk owl paas packet broadcast packet flow parsing password path manipulation peer-to-peer network security performance evaluation. permutation pgp phishing physical layer polarization policy deployment porter stemmer prewitt privacy privacy protection profile cloning prognostic protection m echanism protocol qos routing quadratic residues quality quality of service quantitative evaluation radius random grids rdf. recommender system reputation-based resonant resource description framework(rdf) resource injection risk assessment risk planning role-based access control rotor cipher routing rsa rul sead secret image sharing secret sharing security security plan security protocol security risks security techniques security. semantic evaluation sensor network service discovery service oriented architecture sha-1 shares small business smt smurf attacks. sobel social engineering software vulnerabilities som source code analysis sparql sql injection ssl steganalysis steganography stemming study material subliminal channel support vector machine svm. swifi symmetric key syn flood syn flooding system information leak tcp sequence number attack tcpview temperature control temperature monitoring text steganography the sleuth kit (tsk) tkip trapdoors trust trusted third party twitter ubiquitous udp flood unreleased resource user authentication; group communication; secret s utm clinic vanet vanet architecture video upload virtual system visual cryptography vn vpn vswr wardriving we propose a novel distributed intrusion detection web security wi-fi wimax wire antennas wired equivalent privacy (wep). wireless local area network (wlan) wireless network wireless networks wireless sensor network (wsn) wireshark wlan wsn xacml z-transform; frequency domain; watermarking; mean zero cross …less
Content tagged "blue-tooth"
- AN INTEGRATED SOLUTION F… 1 year ago, 438 views