Version-4 (May-June 2014)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7 Ver-8 Ver-9
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Selective Encryption of Plaintext Using Multiple Indexing |
Country | : | India |
Authors | : | Soumya Balachandran , Sangeeta Sharma |
: | 10.9790/0661-16340105 |
Keywords: Advanced Encryption Standard; Cipher Complexity; Linear Congruential Theorem; Prime Number indexing; Pythagorean Theorem; Selective Encryption
[1] W. Zeng, J. Wen, M. Severa , Format-compliant selective scrambling for multimedia access control, Proc. of the International Conference on Information Technology: Coding and Computing, 2002 , p. 77.
[2] Marc Van Droogenbroeck and Raphaël Benedett, Techniques for a Selective Encryption of Uncompressed and Compressed images, Proc. of Advanced Concepts for Intelligent Vision Systems, September 9-11, 2002
[3] A Massoudi, F Lefebvre, C De Vleeschouwer, B Macq and J-J Quisquater , Overview on Selective Encryption of Image and Video: Challenges and Perspectives, EURASIP Journal on Information Security,Vol.2008,Article id.17929, 2008
[4] Stallings,William, Cryptography and Network Security: Principles and Practice( Pearson, 5th Edition,2006, p. 226).
- Citation
- Abstract
- Reference
- Full PDF
Keywords: WBAN, Health monitoring system (HMS) , Path Attenuation , Body sensor network, security
[1] Joonyoung Jung, et al.,"Wireless Body Area Network in a Ubiquitous Healthcare System for Physiological Signal Monitoring and Health consulting", International Journal of Signal Processing, Image Processing and Pattern Recognition, 2008.
[2] Emil Jovanov, et al., "Body Area Networks for Ubiuitous Healthcare Applications: Opportunities and Challenges", J Med Syst(2011) 35:1245- 1254, 2011.
[3] P. S. Hall, et al., "Antennas and Propagation for On-Body Communication Systems", IEEE Magazine on Antennas and Propagation. vol. 49 (3), pp. 41-58, 2007.
[4] Ulla, S., et al., "A Review of Wireless Body Area Networks (WBANs) for Medical Applications", International Journal of Communications, Network and System Sciences (IJCNS), Vol. 2,No. 8, pp797-803. 2009.
[5] Wan-Young Chung, et al., "A Wireless Sensor Network Compatible Wearable U-healthcare Monitoring System Using Integrated ECG, Accelerometer and SpO2", 30th Annual International IEEE EMBS Conference vancouver, British Columbia, Canada, August 20-24, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: CPU scavenging, Open Grid Forum (OGF), Object Management Group (OMG), Sensor grid, Supercomputers.
[1]. "SETI@Home Credit overview". BOINC. Retrieved April 21, 2010.
[2]. "A Gentle Introduction to Grid Computing and Technologies" (PDF). Retrieved May 6, 2005.
[3]. Hingne, V.; Joshi, A.; Houstis, E.; Michopoulos, J. On the Grid and Sensor Networks. In Proc. Of International Workshop on Grid Computing. Pages 166-173. Nov. 2003.
[4]. H.B. Lim, et al. Sensor Grid: Integration of Wireless Sensor Networks and the Grid, In Proc. of the IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05), October 2005.
[5]. GGF, http://www.ggf.org.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Video Object Tracking Mechanism |
Country | : | India |
Authors | : | R. Sathya Bharathi |
: | 10.9790/0661-16342026 |
Index Terms: Color histograms, localsteeringkernels, and visualobjecttracking
[1]. A. Cavallaro, O. Steiger, and T. Ebrahimi, ―Tracking video objects in cluttered background,‖ IEEE Trans. Circuits Syst. Video Technol., vol. 15, no. 4, pp. 575–584, Apr. 2005.
[2]. D. Roller, K. Daniilidis, and H. H. Nagel, ―Model-based object tracking in monocular image sequences of road traffic scenes,‖ Int. J. Comput. Vision, vol. 10, pp. 257–281, Mar. 1993.
[3]. C. Yang, R. Duraiswami, and L. Davis, ―Efficient mean-shift tracking via a new similarity measure,‖ in Proc. IEEE Comput. Soc. Conf. Comput. Vision Pattern Recogn., vol. 1, Jun. 2005, pp. 176–183.
[4] A. Yilmaz, X. Li, and M. Shah, ―Contour-based object tracking with occlusion handling in video acquired using mobile cameras,‖ IEEE Trans. Pattern Anal. Mach. Intell., vol. 26, no. 11, pp. 1531–1536, Nov.2004.
[5] Y. Wang and O. Lee, ―Active mesh—a feature seeking and tracking image sequence representation scheme,‖ IEEE Trans. Image Process., vol. 3, no. 5, pp. 610–624, Sep. 1994
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Model predictive control, Autonomous Ground Vehicle, Optimization, Interior-point Quadratic Programming.
[1] L. Cunjia, C. Wen-Hua, and J. Andrews. Optimisation based control framework for autonomous vehicles: Algorithm and experiment. In Mechatronics and Automation, pp. 1030-1035, 2010.
[2] T. Keviczky, P. Falcone, F. Borrelli, J. Asgari, and D. Hrovat. Predictive control approach to autonomous vehicle steering. In American Control Conference, 2006.
[3] J. A. Rossiter. Model-Based Predictive Control: A practical approach (CRC Press, 2003).
[4] J. M. Maciejowski. Predictive Control with Constraints(Pearson Education Limited,2002).
[5] E. F. Camacho and C. Bordons. Model Predictive Control (Springer-Verlag, 2nded. 2004).
[6] C. Bordons, E. F. Camacho. Model Predictive Control. Advanced Textbooks in Control and Signal Processing (Springer-Verlag, London, 1999)..
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Evolutionary algorithm, genetic algorithm, regression testing, regression test case, regression test case prioritization, system dependence graph.
[1] S. P. Roger, Software engineering: A practitioner's approach (Fifth Edition. McGraw-Hill Publisher, New York, America, 2001).
[2] G. Rothermel and M. Harrold, Selecting regression tests for object-oriented software, International Conference on Software Maintenance, Victoria, CA, September 1994, 14–25.
[3] G. Rothermel, , M.J. Harrold, A safe, efficient regression test selection technique, ACM Transactions on Software Engineering Methodology, 6(2), 1997, 173–210.
[4] A. Orso, N. Shi, and M. Harrold. Scaling regression testing to large software systems,ACM SIGSOFT, Twelfth International Symposium on Foundations of Software Engineering, 29(6), 2004, 241–251.
[5] J. M. Kim, and A. Porter, A history-based test prioritization technique for regression testing in resource constrained environments, In Proceedings of the 24th International Conference on Software Engineering, 2002, New york, NY, USA, 119-129..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Efficient Information Retrieval System with Higher Priority for User Preference |
Country | : | India |
Authors | : | T.GnanaJanani , M.SivaKumar |
: | 10.9790/0661-16344854 |
Keywords: click through data, geo-web, ontology, re-ranking, web search engine, re-ranking
[1]. Kenneth.W.L, Dik.L,(2013), "Personalized mobile search engine",IEEE Transaction on Knowledge And Data Engineering, Vol 25, No. 4.
[2]. Wilson D. (2000). "Human Information Behavior", informing science,vol. 3 No.2 ,pp.2-3.
[3]. A. MarkoItz, Y.-Y. Chen, T. Suel, X. Long, and B. Seeger. , (June 2000) "Design and implementation of a geographic search engine". In 8th Int. Workshop on the web and Databases (webDB).
[4]. Joachims, T. (2002) "Optimizing search engines using Click through data", ACM 1-58113-567-X/02/0007.
[5]. Comtet, L. (2005) "Advanced Combinatorics: The Art of Finite and Infinite Expansions", rev. enl. ed. Dordrecht, Netherlands: Reidel, pp. 176- 177.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Efficient Weather Prediction By Back-Propagation Algorithm |
Country | : | India |
Authors | : | Manisha Kharola, Dinesh Kumar |
: | 10.9790/0661-16345558 |
Keywords: ANN, Back Propagation, Weather Prediction
[1] Raúl Rojas," The back propagation algorithm of Neural Networks - A Systematic Introduction, "chapter 7, ISBN 978-3540605058
[2] Saduf, Mohd Arif Wani,"Comparative study of Back Propagation Learning Algorithm for Neural Networks,"IJARCSSE,Volume:3,Issue:12,Dec2013.
[3] Shital Solanki,H.B.Jethva "A review on back propagation algorithms for Feedforward Networks" GRA Volume : 2 | Issue : 1 Volume : 2 | Issue : 1 | Jan 2013.
[4] Gunjan Goswami, "Introduction to Artificial Neural Network".
[5] Singh, Bhambri and Gill, "Time Series based Temperature Prediction using Back Propagation with Genetic Algorithm Technique",IJCSI,Volume:8,Issue5,No.3,Sep2011.
- Citation
- Abstract
- Reference
- Full PDF
[1] A. M. Eskiciogluand E. J. Delp, "An Overview of Multimedia Content Protection in Consumer Electronics Devices," Elsevier Signal Processing: Image Communication, vol.1 6, pp.681–699, 2001.
[2] D.W. Trainor J.P. Heron* and R.F. Woods, White paper on "IMPLEMENTATION OF THE 2D DCT USING A XILINX XC6264 FPGA", Department of Electrical Integrated Silicon Systems Ltd and Electronic Engineering Chlorine Gdn‟s The Queen's University of Belfast N. Ireland( Page 9)
[3] H. Berghel, "Watermarking Cyber space," Communications of the ACM, vol.40, no.11, pp.19–24, November1997.
[4] IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No 1, July 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 Watermarking of Digital Video Stream for Source Authentication Kesavan Gopal, Dr. M. Madhavi Latha, Team Leader, Infotech Enterprises Limited Bangalore, Karnataka, India (Page 1,6)
[5] I.J.Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, vol.6, no.12, pp.1673–1687, Dec1997.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Document Retrieval, Fuzzy Logic, OWA Operators, HTML Tags, Multi-criteria decision making Problem, Trapezoidal Fuzzy numbers.
[1] Guiwa Wei & wende Yi, Induced Trapezoidal Fuzzy Ordered Weighted Harmonic Averaging Operator. Journal of information & Computational Science, vol. 7, issue no. 3, 2010, pp. 625-360.
[2] R.R. Yager, D.P. Filev, Operations for granular computing: Mixing words and numbers. In: Proceedings of the FUZZ-IEEE World Congress on Computational Intelligence, Anchorage, vol. 1, 1998, pp. 123–128.
[3] Youssef Bassil & Paul Semaan , Semantic-Sensitive Web Information Retrieval Model for HTML Document. European Journal of Scientific Research, ISSN 1450-216X, vol. 69(4), 2012.
[4] Ronald R. Yager , On Ordered Weighted Averaging Aggregation Operators Multi-criteria Decision making. IEEE Transactions on Systems, Man, And Cybernetics, vol 18, issue no. 1, 1988, pp. 183-190.
[5] Jiawei Deng and Lihui Chen, Web Documents Categorization Using Fuzzy Representation and HAC. In: Proceedings of the IEEE First International Conference, vol. 2, 2000, pp. 24-28
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure Keyword Search Using TRSE Scheme over Cloud Data |
Country | : | India |
Authors | : | A. Libana Mary, Ms. R.Asmetha Jeyarani, M.Tech |
: | 10.9790/0661-16347579 |
Index Terms: TRSE, Top-K, order Preserving Encryption, Vector Space Model, Homomorphic Encryption
[1] Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao Xue and Minglu Li "Towards Secure Multi- Keyword Top-k Retrieval over Encrypted Cloud Data" - IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING, 2013
[2] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, and M. Zaharia, "A View of Cloud Computing," Comm. ACM, vol. 53, no. 4, pp. 50-58,2010.
[3] M. Arrington, "Gmail Disaster: Reports of Mass Email Deletions,"http://www.techcrunch.com/2006/12/28/gmaildisasterreportsof-mass-email-deletions/, Dec. 2006.
[4] Amazon.com, "Amazon s3 Availability Event: July 20, 2008,"http://status.aws.amazon.com/s3-20080720.html, 2008.
[5] RAWA News, "Massive Information Leak Shakes Washington over Afghan War,"http://www.rawa.org/ temp/runews/2010/08/20/ massive-information-leak-shakes-washington-overafghan-war.html, 2010
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhanced Security Algorithm using Hybrid Encryption and ECC |
Country | : | India |
Authors | : | A. P Shaikh , V. kaul |
: | 10.9790/0661-16348085 |
Keywords: AES, Blowfish(BF), enhanced AES, Elliptic Curve Cryptography, ECDH, ECDSA andMD5
[1]. T. Nie, C. Song and X. Zhi," Performance Evaluation of DES and Blowfish Algorithms, Biomedical Engineering and computer Science International Conference, IEEE, 2010.
[2]. A. Nadeem and M.Y Javed., "A Performance Comparison of Data Encryption Algorithms," IEEE Information and Communication Technologies, 2005. ICICT 2005. First International Conference, 2006, pp. 84- 89.
[3]. J. Daemen and V. Rijmen, "AES submission document on Rijndael, Ver2", September 1999.
[4]. "Announcing the Advance Encryption Standard", FIPS Publication, 2001.
[5]. M.J.B. Robshaw and Y. L. Yin, "Elliptic Curve Cryptosystems", RSA Laboratories Technical Note, 1997
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A text analysis method is introduced which processes the unstructured information from document collection in order to support efficient text classification and information extraction. The Information extraction helps the system to discover useful knowledge for the users. The keyword based information search method fails due to the generation of many false positives. It leads to inaccurate generation of user expected result for many applications where context sense plays a major role while identifying the relevant features. The method developed can solve this problem by using combination of techniques from machine learning and natural language processing. The text contents are preprocessed and applied with entity tagging component. The proposed method performs accurate information extraction by improving precision and recall value. The automatic generation of rules provides an easy way to predict the effects of nutrient on malnutrition. The bottom-up scanning of key-value pairs helps to speed up the content finding to generate relevant items to the task. Our method can outperform other methods by eliminating sub tree which has an overestimating heuristic. Our approach will be useful to prevent errors generated through misinterpretation of available facts and improves the accuracy of information extraction in many text analysis applications.
Keywords: Classification, Knowledge discovery, Machine learning, Semantic relevance, Term extraction
[1]. Wang Wei, Payam Barnaghi and Andrzej Bargiela, Probabilistic Topic Models for Learning Terminological Ontologies, IEEE Transactions on Knowledge and Data Engineering, 2010, pp.1028-1040.
[2]. Qinbao Song, Jingjie Ni and Guangtao Wang,A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data, Journal IEEE Transactions on Knowledge and Data Engineering, 10(10), 2011,pp.1-14.
[3]. Hong Huang and Hailiang Feng,Gene Classification Using Parameter-free Semi-supervised Manifold Learning,IEEE/ACM Transactions on Computational Biology and Bioinformatics, 10(10),2011,pp.1-13
[4]. Ahmed Rafea, Hesham A. Hassan, Mohamed Yehia Dahab, TextOnto Ex: Automatic Ontology Construction from Natural English Text,International conference of Artificial Intelligence and Machine Learning,2006.
[5]. Topon Kumar Paul and Hitoshi Iba,Prediction of Cancer Class with Majority Voting Genetic Programming Classifier Using Gene Expression Data,IEEE/ACM transactions on computational biology and bioinformatics, 6,2009, pp.353-367.
- Citation
- Abstract
- Reference
- Full PDF
Index Terms: cardiovascular disease classification, ECG, Wavelet transforms, artificial neural networks (ANN), hidden markov model (HMM).
[1] A. Taddei et al., "The European ST-T database: Standard for evaluating systems for the analysis of ST-T changes in ambulatory electrocardiography, "Euro. Heart J., vol. 13, pp. 1164–1172, 1992.
[2] "MIT-BIH database distributor," Tech. Rep., Beth Israel Hospital, Biomed. Eng., Division KB-26, Boston, MA.
[3] J. J. Bailey et al., "Recommendations for standardization and specification in automated electrocardiography: Bandwidth and digital signal processing," Circulation, vol. 81, 1990.
[4] R. Silipo, A. Taddei, and C. Marchesi, "Continuous monitoring and detection of ST-T changes in ischemic patients," IEEE Comput. Cardiol.,pp. 225–228, 1994.
[5] M. Bianchini, P. Frasconi, and M. Gori, "Learning in multilayered networks used as autoassociators," IEEE Trans. Neural Networks, vol.6, pp. 512–515, 1995.
- Citation
- Abstract
- Reference
- Full PDF
Asking questions to databases in natural language is a very convenient and easy method of data access, especially for casual users who do not understand complicated database query languages such as SQL. Input of system is an English statement that will be converted into equivalent SQL query and SQL query will be fired on related database to get final output. Our system provides intelligence to the natural language processing in terms of lexicon processing, query formulation and automatic generation of SQL code which can be easily modified and reuse.
Keywords: Natural language Processing, Semantic Grammar, POS
[1]. Gauri Rao, Chanchal Agarwal, Snehal Chaudhry, Nikita Kulkarni, Dr. S.H. Patil, "Natural Language Query Processing using Semantic Grammar", (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 02, 2010, 219-223.
[2]. Valentin Tablan, Danica Damljanovic, and Kalina Bontcheva ,"A Natural Language Query Interface to Structured Information", Department of Computer Science University of SheieldRegent Court.
[3]. Mrs.Vidya Dhamdhere, Nijesh Hirpara, Kalpesh Surana, Karishma Gangwani, Chirayu Bootley, "A Natural Language Query Processor for Database Interface", Int.J.Computer Technology & Applications,Vol 3 (1), 378-382.
[4]. Gauri Rao, S.H.Patil,"Natural Language Query Processing based on Probabilistic Context Free Grammar" Department of Computer Engineering Bharati Vidyapeeth College of Engineering, Pune , India.
[5]. David Taniar, Hui Yee Khaw a, Haorianto Cokrowijoyo Tjioe a, Eric Pardede ,"The use of Hints in SQL-Nested query optimization",Clayton School of Information Technology, Monash University Clayton, Vic. 3800, Australia Department of Computer Science& Computer Engineering, La Trobe University, Bundoora, Vic. 3083, Australia
- Citation
- Abstract
- Reference
- Full PDF
Keywords: PCCP with dynamic user blocks, Persuasive technology, Password registration, User login process.
[1]. S.Chiasson, E.Stobert, A.Forget, R.Biddle,and P.van Oorschot," Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism", IEEE DEPENDABLE AND SECURE COMPUTING, March/Arril 2012
[2]. Zhi Li, Qibin Sun, Yong Lian, and D. D. Giusto, 'An association-based graphical password design resistant to shoulder surfing attack‟, International Conference on Multimedia and Expo (ICME), IEEE.2005
[3]. S. Akula and V. Devisetty, "Image Based Registration and Authentication System," in Proceedings ofMidwes Instruction and Computing Symposium, 2004.
[4]. L. Sobrado and J.-C. Birget, "Graphical passwords," The Rutgers Scholar, An Electronic Bulletin for Undergraduate Research, vol. 4, 2002.
[5]. S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R. Biddle, "Multiple Password Interference in Text and Click-Based Graphical Passwords," Proc. ACM Conf. Computer and Comm. Security (CCS), Nov. 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Resource Aware Node Authentication Framework for Secure MANET |
Country | : | India |
Authors | : | Komal Naik (Joshi), Arati Dixit |
: | 10.9790/0661-1634109113 |
Abstract: MANET comprises mobile nodes, which are links to each other by wireless connections without any base infrastructure. MANETs are vulnerable to security attack due to their features such as autonomous nature, infrastructure-less network and multi-hop communication. Therefore every node in MANET must be secure; node security can be provided by using node authentication techniques. Every node in MANET consists of resources such as battery power, bandwidth, and a memory to keep routing information. These resources provided by the MANET node are limited resources. A MANET faces various security attacks; one of them is flooding attack whose aim is to drain off limited resources of MANET node by continuously sending Route Request control Packet, false route information or fake data packets. The main goal of our approach is to provide resource aware node authentication framework to prevent flooding attack in MANET.
Keywords: AODV, Flooding Attack, MANET, Node authentication.
[1]. Pushpender Singh and Manik Chandra Pandey, "Evaluation of certificate-based authentication in Mobile Ad-hoc networks",
International Conference on Recent Trends in Engineering and Technology, 2012, 69-74.
[2]. Jaydip Sen, "Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks", Computational Intelligence,
Modelling and Simulation (CIMSiM), 2010 Second International Conference on, 2010, 476-481.
[3]. C. Perkins et al., (2001, 07), "Ad Hoc On-Demand Distance-Vector Routing (AODV)", IETF draft, 2001.
[4]. Djamal DJENOURI, Nadjib BADACHE, "Survey on security issues in Mobile Ad-hoc Networks ", IEEE communications surveys,
2005
[5]. Nikos Komninos, Dimitris Vergados, Christos Douligeris, "A Two-Step Authentication Framework in Mobile Ad-Hoc Networks,
China Communication Journal, 4(1), 2007, 28-39. Available: openaccess.city.ac.uk/2512/1/TwoStep%20Authentication.pdf
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Data mining; Clustering; Grid; k-nn method
[1] Han, P.N., Kamber, M.: Data Mining: Concepts and Techniques,2nd (2006).
[2] Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining (2006).
[3] http://www.cs.put.poznan.pl/jstefanowski/sed/DM-7clusteringnew.pdf
[4] Damodar Reddy Edla and Prasanta K. Jana "A Grid Clustering Algorithm Using Cluster Boundaries" IEEE World Congress on Information and Communication Technologies 2012
[5] https://www.google.co.in/?gfe_rd=cr&ei=k719U5PTMc_N8gfYvoGwBg#q=dm_clustering2.ppt
[6] H. Darong and W. Peng, "Grid-based DBSCAN Algorithm with Referential Parameters," Proc. International Conference on Applied Physics and Industrial Engineering (ICAPIE-2012), Physics Procedia, vol. 24(B), pp. 1166-1170, 2012
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Simulation of Denial of Service (DoS) Attack using Matlab and Xilinx |
Country | : | India |
Authors | : | Mukhopadhayay, S Polle, P Naskar |
: | 10.9790/0661-1634119125 |
Keywords: Denial of service (DoS), neural network tool (nntool), distributed denial of service (DDoS
[1]. Don Holden, "A Rule Based Intrusion Detection System", published in the proceeding of the IFIP TC11. ISBN: 0-444-89699-6
[2]. I. Kotenko and A. Ulanov, "Simulation of internet DDoS attacks and defense," in Information Security, pp. 327–342, Springer, 2006.
[3]. I. Kotenko, A. Alexeev, and E. Man'kov, "Formal framework for modeling and simulation of DDoS attacks based on teamwork of hackers-agents," in Intelligent Agent Technology, 2003. IAT 2003. IEEE/WIC International Conference on, pp. 507–510, IEEE, 2003.
[4]. L. Li and G. Lee, "DDoS attack detection and wavelets," Telecommunication Systems, vol. 28, no. 3-4, pp. 435–451, 2005.
[5]. H. Debar, B. Dorizzi, "An Application of a Recurrent Network to an Intrusion Detection System," International Joint Conference on Neural Networks. 1992, pp. (II) 478-483.
[6]. H. Debar, M. Becke, D. Siboni, "A Neural Network Component for an Intrusion Detection System, " IEEE Symposium on Research in Security and Privacy, 1992.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Web Penetration Testing using Nessus and Metasploit Tool |
Country | : | India |
Authors | : | Indraneel Mukhopadhyay, Shilpam Goswami, Eshita Mandal |
: | 10.9790/0661-1634126129 |
General Terms: Web Penetration Tool, Vulnerability Scanner, Security
Keywords: Web Penetration Tool, Vulnerability Scanner, Nessus, Metasploit, Kali Linux, ethical hacking
[1]. Joseph Muniz Aamir Lakhani. "Web Penetration Testing with Kali Linux", PACKT publishing. September 2013.
[2]. Andrey Petukhov, Dmitry Kozlov "Detecting Security Vulnerabilities in Web Applications Using Dynamic Analysis with Penetration Testing", https://www.owasp.org/images/3/ 3e/OWASP-AppSecEU08-Petukhov.pdf
[3]. William G. J. Halfond1,Shauvik Roy Choudhary and Alessandro Orso "Improving penetration testing through static and dynamic Analysis". http://www-bcf.usc.edu/~halfond/ papers/halfond11stvr.pdf
[4]. Nuno Antunes and Marco Vieira, "Penetration Testing For Web Services", http://ieeexplore.ieee.org/stamp/stamp .jsp?tp=&arnumber=6681866
[5]. William G.J. Halfond, Shauvik Roy Choudhary, and Alessandro Orso "Penetration Testing with Improved Input Vector identification", http://www.cs.columbia.edu/~junfeng /reliable-software/papers/pen-test.pdf
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Adaptive Network-based Fuzzy Interface, ANFIS, Decision Support System, Fuzzy logic, neural network.
[1]. Park, Yong-tae, An empirical investigation of the effects of data warehousing on decision performance, Information & Management Journal 2005, 51-61.
[2]. G. M. Marakas, Decision Support Systems in the 21st century, 2nd Edition (New Jersey: Prentice Hall, 2002).
[3]. Shaw, J. Michael, and A. James, Gentry, Using an Expert System with Inductive Learning to Evaluate Business Loans, Financial Management, 1988, 45-56.
[4]. SAMA, About SAMA, 2010. Last access January 2014, Retrieved from: http://www.sama.gov.sa/sites/samaen/aboutus.aspx.
[5]. Eletter, S. Fathi, & S. G. Yaseen, Applying Neural Networks for Loan Decisions in the Jordanian Commercial Banking System, International Journal of Computer Science and Network Security, 10, 2010, 209-214.
[6]. A. AlShamiy, A. Lotfiy, E. Laiy, S. Coleman, Unified Knowledge Economy Competitiveness Index Using Fuzzy Clustering Model, IEEE Symposium on Computational Intelligence for Financial Engineering and Economics (CIFEr), 2011, 1-6.