Computer and Network Security
7,802 Followers
Recent papers in Computer and Network Security
This work evaluates the performance of Consumed-Energy-Type-Aware Routing (CETAR) which incorporates the amount of energy consumed per type of operation for routing decision to extend the lifetime of the Wireless Sensor Networks (WSNs).... more
8th International Conference on Computer Networks & Data Communications (CNDC 2021) will provide an excellent international forum for sharing knowledge and results in theory and applications of Computer Networks and Data Communications.... more
The Network Packet Flow is analyzed and defined by the network administers in the company to assure the exact data flow in the networked systems. Currently, in the world the data flow is unreliable in the internet because of unreliability... more
Information security has become a necessity in securing an information asset in a company or organization. The government, which acts as a regulator, publishes an Information Security Management System (SMKI) and an Information Security... more
Anomaly detection is used for identifying data that deviate from 'normal' data patterns. Its usage on classical data finds diverse applications in many important areas like fraud detection, medical diagnoses, data cleaning and... more
Malware analysis forms a critical component of cyber defense mechanism. In the last decade, lot of research has been done, using machine learning methods on both static as well as dynamic analysis. Since the aim and objective of malware... more
Enterprise Security is a highly complex issue which is complicated further by conflicting views of the different elements of cyber security which are often represented as a while in terms of an architecture or model. In this paper we... more
Abstract Instant Messaging has become an important means of communication between people around the globe, providing an alternative to telephone and email conversations. The number of users using Instant Messenger products has been... more
Wireless sensor networks (WSNs) are considered to be one of the most important technologies of the 21st century. While a single sensor node may have limited computation and communication capabilities, putting a large number of them... more
This network design assignment is of great help to the organization in their endeavor for designing and execution of a comprehensive and advanced network design system.
Well-known approaches to risk analysis suggest considering the level of an information system risk as one frame in a film. This means that we only can perform a risk assessment for the current point in time. This article explores the idea... more
The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities. This paper... more
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the... more
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT. Authors are solicited to contribute to the... more
With the growth of the Internet and its potential, more and more people are getting connected to the Internet every day to take advantage of the e-Commerce. On one side, the Internet brings in tremendous potential to business in terms of... more
The use of mobile devices as learning aids is increasing due to availability and affordability of mobile phones, smartphones and tablets among students. Many learners use their handheld... more
Wireless communications, nowadays, becomes a vital element of people's daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities,... more
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more
Dengan disusunnya Laporan Kinerja (LKj) BSSN Tahun 2018 ini, merupakan perwujudan dan upaya BSSN dalam menjaga akuntabilitas kinerjanya serta kiranya dapat menjadi media komunikasi bagi masyarakat yang ingin mendapatkan informasi terkait... more
In this paper Weakness of EAP, T hreat analysis in wireless LAN and proposed solution firstly introduce EAP, its m ethods used in authentication and WLAN background . And secondly problems in this methods and proposed a solution for this... more
Today’s data networks are steadily growing in size and complexity. Especially in enterprise networks, these development lead to the requirement of a central network administration. With Software Defined Networking (SDN), this requirement... more
3rd International Conference on Networks, Blockchain and Internet of Things (NBIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Networks, Blockchain and... more
I am a professional lecturer in Texas university. I am teaching computer science, but besides that I am a virtual assistant and web researcher as well.
— Wireless sensor networks (WSN) are made up of sensor nodes that have constrained memory and energy. Sensor nodes or motes are devices which can effectively sense data wirelessly and transmit them to other such nodes or a central station... more
Since people use internet daily they have to take care about information security requirement more and more. In this wok a new algorithm for RGB based images steganography is presented. The algorithm uses LSB principle for hiding a... more
In this paper, we propose an efficient multiparty signature scheme for wireless networks where a given number of signees can jointly sign a document, and it can be verified by any entity who possesses the certified group public key. Our... more
Mobile cloud computing is a model in which mobile applications are built, powered and hosted using cloud computing technology. Mobile devices with there limited resources will be accessing a wide variety of these cloud-based services... more
Cyber and its related technologies such as Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without these all pervasive technologies. Despite being ubiquitous around the world, cyber... more
This paper is a survey of the work, done for making an IDS fault tolerant. Architecture of IDS that uses mobile Agent provides higher scalability. Mobile Agent uses Platform for detecting Intrusions using filter Agent, co-relater agent,... more
Keywords—Chaos Function; Keylogger; one-time password; database tables
Perkembangan teknologi infornasi pada saat ini sudah semakin maju, hal tersebut terbukti dengan banyaknya bermunculan software dan hardware mutakhir yang dapat menunjang kinerja kita sehari-hari. Sejalan dengan perkembangan teknologi... more
A selective forwarding attack in mobile wireless sensor networks is an attack that selectively drops or delivers event packets as the compromised node moves. In such an attack, it is difficult to detect the compromised node compared with... more
An overview from a board perspective of the governance challenges posed by changing and mutating cyber security threats and their implications and areas that boards need to address, including looking beyond technical/IT considerations,... more
This paper presents performance evaluation of an enhanced Least Significant Bit (LSB) audio steganographic model for secure electronic voting. The enhancement on the traditional LSB audio steganographic technique on the electronic vote... more
With the rapid development and application of the computer network technology, computer network system has brought many unsafe hidden dangers to the user. The computer network security has got more and more attentions of people.... more