Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 24, Issue 4-62015
Publisher:
  • Taylor & Francis, Inc.
  • 325 Chestnut St. Suite 800 Philadelphia, PA
  • United States
ISSN:1939-3555
EISSN:1939-3547
Reflects downloads up to 16 Nov 2024Bibliometrics
Skip Table Of Content Section
article
A Survey on Fast-flux Attacks

“Fast-flux” refers to rapidly assigning different IP addresses to the same domain name. Although there are some legitimate uses for this technique, recently it has become a favorite tool for cyber criminals to launch collaborative attacks. After it was ...

article
Automated Compliance Checking Methodology for Non-Log Operations

Compliance Management CM is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. The most complicated, time-consuming, and costly process in CM is compliance checking ...

article
Towards the Design of a Secure and Fault Tolerant Cloud Storage in a Multi-Cloud Environment

This paper addresses the problem of data security and fault tolerance in the Cloud. The application of the proposed model includes organizations, business groups, and establishments where the data are highly confidential and need to be kept in a very ...

article
On the Implementation of a Secured Digital Watermarking Framework

In this paper, a saliency-based digital watermarking system which employs a higher degree security by means of Symmetric Key Cryptography is proposed. The projected algorithm can implant more information into less perceptive areas within the original ...

article
An Overview of Modern Botnets

Botnets, a network of malware-infected computers, have been used for a range of malicious activities. Evolving from fast fluxing to employing anonymous networks, they have matured and have become exceedingly sophisticated over the years. Understanding ...

article
An Adaptive and Collaborative Server-Side SMS Spam Filtering Scheme Using Artificial Immune System

SMS Spam, which is an unsolicited or unwanted message, is a major problem with Global System for Mobile Communication GSM subscribers. Existing Spam filters have not been able to stop the SMS Spam problem due to frequent drift in spammer’s words, ...

article
An Authentication and Authorization Solution for a Multiplatform Cloud Environment

Providing security at all levels within the multiplatform cloud-computing environment is has not been properly solved due to a variety of problems arising from technical and human-based sources. This paper presents an authentication-and-authorization ...

article
QR Panopticism: User Behavior Triangulation and Barcode-Scanning Applications

The increasingly ubiquitous two-dimensional barcodes designed by the Denso Wave company, known as the QR code, were originally intended to track millions of parts as they moved about on high-speed assembly lines. Since then, these increasingly ...

article
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention

Literature in malware proliferation focuses on modeling and analyzing its spread dynamics. Epidemiology models, which are inspired by the characteristics of biological disease spread in human populations, have been used against this threat to analyze ...

article
Potential Problems with Information Security Risk Assessments

To protect the information assets of any organization, management must rely on accurate information security risk management. Management must access the risk to the organizations assets then develop information security strategies to reduce the risks. ...

article
Commutative Re-encryption Techniques: Significance and Analysis

Commutative re-encryption techniques are important tools for different applications where the encryption and decryption operations are performed in arbitrary order. These techniques also enable one to transfer information securely in a network without ...

article
Predicting Cyber Risks through National Vulnerability Database

Software vulnerabilities are the major cause of cyber security problems. The National Vulnerability Database NVD is a public data source that maintains standardized information about reported software vulnerabilities. Since its inception in 1997, NVD ...

article
Secure Graphical One Time Password GOTPass: An Empirical Study

The traditional text-based password has been the default security medium for years; however, the difficulty of memorizing secure strong passwords often leads to insecure practices. A possible alternative solution is graphical authentication, which is ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.