Skip to main content
This work evaluates the performance of Consumed-Energy-Type-Aware Routing (CETAR) which incorporates the amount of energy consumed per type of operation for routing decision to extend the lifetime of the Wireless Sensor Networks (WSNs).... more
    • by 
    •   11  
      Wireless CommunicationsNetwork SecurityNetwork Security (Networks)Optical wireless Communications
8th International Conference on Computer Networks & Data Communications (CNDC 2021) will provide an excellent international forum for sharing knowledge and results in theory and applications of Computer Networks and Data Communications.... more
    • by 
    •   15  
      Social NetworksNetwork SecurityComputer NetworksData Communications
The Network Packet Flow is analyzed and defined by the network administers in the company to assure the exact data flow in the networked systems. Currently, in the world the data flow is unreliable in the internet because of unreliability... more
    • by 
    • Computer and Network Security
The Android operating system has become the most popular operating system for smartphones and tablets leading to a rapid rise in malware. Sophisticated Android malware employ detection avoidance techniques in order to hide their malicious... more
    • by  and +2
    •   13  
      Computer ScienceInformation SecurityComputer EngineeringMachine Learning
Information security has become a necessity in securing an information asset in a company or organization. The government, which acts as a regulator, publishes an Information Security Management System (SMKI) and an Information Security... more
    • by 
    •   4  
      Computer and Network SecurityCyber SecuritySIEMRouter
Anomaly detection is used for identifying data that deviate from 'normal' data patterns. Its usage on classical data finds diverse applications in many important areas like fraud detection, medical diagnoses, data cleaning and... more
    • by 
    •   4  
      Machine LearningQuantum ComputationAnomaly DetectionComputer and Network Security
    • by 
    •   2  
      LabVIEWComputer and Network Security
Malware analysis forms a critical component of cyber defense mechanism. In the last decade, lot of research has been done, using machine learning methods on both static as well as dynamic analysis. Since the aim and objective of malware... more
    • by 
    •   8  
      Information SystemsComputer ScienceInformation TechnologyInformation Security
Enterprise Security is a highly complex issue which is complicated further by conflicting views of the different elements of cyber security which are often represented as a while in terms of an architecture or model. In this paper we... more
    • by 
    •   8  
      Information SecurityComputer SecurityComputer and Network SecurityDigital Forensics
Abstract Instant Messaging has become an important means of communication between people around the globe, providing an alternative to telephone and email conversations. The number of users using Instant Messenger products has been... more
    • by 
    • Computer and Network Security
    • by 
    •   11  
      Computer ScienceInformation TechnologyWireless CommunicationsNetwork Security
Being a small country with a huge population Bangladesh is commonly known as an agriculture based nation. Per capita land in comparison to the number of people is very insignificant and hence the management of land system holds a vital... more
    • by  and +1
    •   4  
      Data MiningWireless Sensor NetworksComputer and Network SecuritySecurity and Privacy in Computer Networks
Wireless sensor networks (WSNs) are considered to be one of the most important technologies of the 21st century. While a single sensor node may have limited computation and communication capabilities, putting a large number of them... more
    • by 
    •   17  
      Operating SystemsProgramming LanguagesSocial NetworksInformation Security
This network design assignment is of great help to the organization in their endeavor for designing and execution of a comprehensive and advanced network design system.
    • by 
    •   8  
      Computer ScienceComputer NetworksWireless Networks (Computer Science)Computer and Network Security
A secure network depends in part on user authentication and regrettably the authentication systems currently in use are not completely safe. However, the user is not the only party that needs to be authenticated to ensure the security of... more
    • by  and +1
    •   7  
      Computer ScienceComputer Security And ReliabilityInformation SecurityComputer Security
Well-known approaches to risk analysis suggest considering the level of an information system risk as one frame in a film. This means that we only can perform a risk assessment for the current point in time. This article explores the idea... more
    • by 
    •   6  
      Information SecurityNetwork SecuritySecurityComputer Security
The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities. This paper... more
    • by 
    •   11  
      Information SecuritySocial MediaComputer SecuritySocial Computing
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the... more
    • by 
    •   3  
      Computer SecurityComputer and Network SecurityMobile Security
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT. Authors are solicited to contribute to the... more
    • by 
    •   18  
      Social NetworksSignal ProcessingWireless CommunicationsComputer Networks
With the growth of the Internet and its potential, more and more people are getting connected to the Internet every day to take advantage of the e-Commerce. On one side, the Internet brings in tremendous potential to business in terms of... more
    • by 
    •   20  
      Computer ScienceInformation SecurityComputer EngineeringNetwork Security
The use of mobile devices as learning aids is increasing due to availability and affordability of mobile phones, smartphones and tablets among students. Many learners use their handheld... more
    • by 
    •   6  
      Information SecurityMobile LearningMobile TechnologyMobile Computing
Wireless communications, nowadays, becomes a vital element of people's daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities,... more
    • by 
    •   17  
      Wireless CommunicationsNetwork SecurityComputer NetworksWireless Sensor Network Security
    • by 
    •   4  
      Computer ScienceInformation SecurityComputer SecurityComputer and Network Security
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more
    • by 
    •   30  
      Wireless CommunicationsNetwork SecuritySensor Network SecurityNext Generation Internet Research
Dengan disusunnya Laporan Kinerja (LKj) BSSN Tahun 2018 ini, merupakan perwujudan dan upaya BSSN dalam menjaga akuntabilitas kinerjanya serta kiranya dapat menjadi media komunikasi bagi masyarakat yang ingin mendapatkan informasi terkait... more
    • by 
    • Computer and Network Security
In this paper Weakness of EAP, T hreat analysis in wireless LAN and proposed solution firstly introduce EAP, its m ethods used in authentication and WLAN background . And secondly problems in this methods and proposed a solution for this... more
    • by 
    •   9  
      Computer ScienceComputer Security And ReliabilityCommunicationInformation Security
    • by 
    • Computer and Network Security
Today’s data networks are steadily growing in size and complexity. Especially in enterprise networks, these development lead to the requirement of a central network administration. With Software Defined Networking (SDN), this requirement... more
    • by 
    •   14  
      Computer EngineeringNetwork SecurityComputer NetworksComputer Security
Ecumenically, the fastest growing segment of Big Data is human biology-related data and the annual data creation is on the order of zetabytes. The implications are global across industries, of which the treatment of brain related... more
    • by  and +1
    •   4  
      Machine LearningBrain-computer interfacesComputer and Network SecurityBig Data / Analytics / Data Mining
3rd International Conference on Networks, Blockchain and Internet of Things (NBIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Networks, Blockchain and... more
    • by 
    •   14  
      Network SecurityComputer NetworksWireless Networks (Computer Science)Computers and Networks Engineering
I am a professional lecturer in Texas university. I am teaching computer science, but besides that I am a virtual assistant and web researcher as well.
    • by 
    •   9  
      Computer GraphicsArtificial IntelligenceHuman Computer InteractionComputer Networks
— Wireless sensor networks (WSN) are made up of sensor nodes that have constrained memory and energy. Sensor nodes or motes are devices which can effectively sense data wirelessly and transmit them to other such nodes or a central station... more
    • by 
    •   2  
      Computer ScienceComputer and Network Security
The research in the domain of ransomware is rapidly emerging, and the application of machine learning algorithms in ransomware detection is one of the recent breakthroughs. In this research, we constructed an experimental platform using... more
    • by  and +1
    •   11  
      Computer ScienceSoftware EngineeringInformation TechnologyInformation Security
Since people use internet daily they have to take care about information security requirement more and more. In this wok a new algorithm for RGB based images steganography is presented. The algorithm uses LSB principle for hiding a... more
    • by 
    •   14  
      Computer ScienceComputer Security And ReliabilityComputer SecurityNetwork Steganography
In this paper, we propose an efficient multiparty signature scheme for wireless networks where a given number of signees can jointly sign a document, and it can be verified by any entity who possesses the certified group public key. Our... more
    • by 
    •   4  
      Wireless CommunicationsComputer NetworksComputer and Network SecurityElliptic Curve Cryptography
Mobile cloud computing is a model in which mobile applications are built, powered and hosted using cloud computing technology. Mobile devices with there limited resources will be accessing a wide variety of these cloud-based services... more
    • by 
    •   10  
      CryptographyComputer and Network SecurityMobile SecurityMobile Cloud Computing
Cyber and its related technologies such as Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without these all pervasive technologies. Despite being ubiquitous around the world, cyber... more
    • by 
    •   82  
      Computer ScienceInformation TechnologyInternational RelationsCyberlaw
    • by 
    •   2  
      Network SecurityComputer and Network Security
This paper is a survey of the work, done for making an IDS fault tolerant. Architecture of IDS that uses mobile Agent provides higher scalability. Mobile Agent uses Platform for detecting Intrusions using filter Agent, co-relater agent,... more
    • by 
    •   15  
      Distributed ComputingNetwork SecurityIntrusion Detection SystemsWireless Sensor Network Security
In the era of information technology and connected world, detecting malware has been a major security concern for individuals, companies and even for states. The New generation of malware samples upgraded with advanced protection... more
    • by  and +1
    •   45  
      Mining EngineeringInformation SecurityData MiningNetwork Security
Abstrak Linux dapat dikatakan biasa digunakan untuk melakukan kegiatan pengujian penetrasi pada suatu sistem. Pada proyek akhir ini akan diperkenalkan cara baru untuk melakukan hacking atau pengujian penetrasi pada sebuah sistem dengan... more
    • by  and +1
    • Computer and Network Security
Keywords—Chaos Function; Keylogger; one-time password; database tables
    • by 
    •   3  
      Computer ScienceComputer EngineeringComputer and Network Security
    • by 
    • Computer and Network Security
Perkembangan teknologi infornasi pada saat ini sudah semakin maju, hal tersebut terbukti dengan banyaknya bermunculan software dan hardware mutakhir yang dapat menunjang kinerja kita sehari-hari. Sejalan dengan perkembangan teknologi... more
    • by 
    •   6  
      Information SecurityWireless CommunicationsNetwork SecurityComputer Security
A selective forwarding attack in mobile wireless sensor networks is an attack that selectively drops or delivers event packets as the compromised node moves. In such an attack, it is difficult to detect the compromised node compared with... more
    • by 
    •   12  
      Network SecurityFuzzy LogicFuzzy Logic ControlComputer and Network Security
An overview from a board perspective of the governance challenges posed by changing and mutating cyber security threats and their implications and areas that boards need to address, including looking beyond technical/IT considerations,... more
    • by 
    •   21  
      Computer Security And ReliabilityRisk GovernanceCorporate GovernanceGovernance
This paper presents performance evaluation of an enhanced Least Significant Bit (LSB) audio steganographic model for secure electronic voting. The enhancement on the traditional LSB audio steganographic technique on the electronic vote... more
    • by 
    •   3  
      E-GovernmentComputer and Network SecuritySiganl and Image Processing
With the rapid development and application of the computer network technology, computer network system has brought many unsafe hidden dangers to the user. The computer network security has got more and more attentions of people.... more
    • by 
    •   5  
      Computer ScienceComputer SecurityComputer and Network SecurityConfidentiality