computer security 2014
Development Review on Phishing: A Computer Security Threat
free download
Abstract: Phishing is kinds of attack in which criminals are use spoofed emails and fraudulent websites to trick people into giving up personal information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an
A Guide
free download
ABSTRACT Academic institutions worldwide embrace communication network and Internet services for their academic activities and collaboration. Communication network enable members of institutions to collaborate with each other and as well access Internet.
PicoCTF: a game-based computer security competition for high school students
free download
Abstract The shortage of computer security experts is a critical problem. To encourage greater computer science interest among high school students, we designed and hosted a computer security competition called PicoCTF. Unlike existing competitions, PicoCTF
Crowdsourcing Computer Security Attack Trees
free download
Abstract:This paper describes an open-source project called RATCHET whose goal is to create software that can be used by large groups of people to construct attack trees. The value of an attack tree increases when the attack tree explores more scenarios.
Computer security clinical trials: Lessons learned from a 4-month pilot study
free download
Abstract In order for the field of computer security to progress, we need to know the true value of different security technologies and understand how they work in practice. It is important to evaluate their effectiveness as they are being used in an ecologically valid
Computer Security Incident Response Teams (CSIRTs) An Overview
free download
Abstract Following the pioneering work at Carnegie-Mellon University in the US, national Computer Emergency Response Teams (CERTs) have been established worldwide to try to address the evergrowing threats to information systems and their use. The problem they
{Mismorphism: a Semiotic Model of Computer Security Circumvention (Extended Version)}
free download
Abstract In real world domains, from healthcare to power to finance, we deploy computer systems intended to streamline and improve the activities of human agents in the corresponding non-cyber worlds. However, talking to actual users (instead of just
A New Approach to Enhance Avalanche Effect in Aes to Improve Computer Security
free download
Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. The 9th International Workshop on Security (IWSEC 2014) was held at Hakkoda Hall, Hirosaki University, in Hirosaki, Japan, during August 27–29, 2014. The workshop was co- organized by ISEC in ESS of IEICE (Technical Committee on Information Security in
The Construction Research of Security Computer Network System Based on the Distributed Intrusion Detection Technology
free download
Abstract This paper aimed at the actual situation of the difficult of getting a lot of the training sample of the security computer network system in the distributed intrusion detection. In this paper, we studied how to increase the intrusion detection accuracy in the case of small
Computer Ethics And Security Awareness Behaviour Of Tertiary Institution Students In South-Western, Nigeria
free download
Abstract As the digital revolution takes over all facet of socio-economic life of people in this 21st century, it is becoming obvious that remarkable benefits of the cyberspace are being challenged by menace of cyber-crime in Nigeria and other African countries. Thus,
Soft Systems Methodology for the Strategic Planning of the Enterprise Computer Security
free download
Abstract. Soft Systems Methodology (SSM) is a problem-solving methodology employing systems thinking. SSM has been applied to the management, planning, health and medical systems, information systems planning, human resource management, analysis of the
Teaching Computer Security
free download
Abstract:Computer security is a tremendously challenging area of engineering. Our society finds itself increasingly reliant on computer systems, even while these systems regularly succumb to malicious attacks. Thus we must better prepare future engineers and scientists RAND Corporation computer scientist and AFIPS’ first president Willis H. Ware, pictured here in 1979, was arguably the foremost scholar of computer security and privacy between the mid-1960 and the mid-1970s. (Courtesy of Charles Babbage Institute Archives, University
WIRELESS WI-FI COMPUTER NETWORK AND SECURITY WI-FI NETWORK
free download
This essay deals with the Wi-Fi technology, application and security Wi-Fi networks. Institute of electrical and electronics engineers-IEEE International body, 1997th year brings specification 802.11, because it is observed that the government had started to happen
The UWF Cyber Battle Lab: A Hands-On Computer Lab for Teaching and Research in CyberSecurity
free download
Abstract-With a dramatic increase in cyber threats over the last decade, government and industry alike have recognized the pressing need to combat the ever growing cyber attacks on networks and systems. Educational institutions play an important role in researching
METHODS OF THE DATA MINING AND MACHINE LEARNING IN COMPUTER SECURITY
free download
ABSTRACT Due to the expansion of high-speed Internet access, the need for secure and reliable networks has become more critical. Since attacks are becoming more sophisticated and networks are becoming larger there is a need for an efficient intrusion detection
ANALYSIS OF THE SOFTWARE BEHAVIOUR USING FORENSIC METHODS FOR COMPUTER SECURITY PURPOSES
free download
ABSTRACT Abstract: Static analysis of malicious software is a complicated process. This complication stems from the fact that the process of analysis has to be carried out on the malicious binary file which is represented in assembly language and therefore lacks
Evaluation of computer network security based on attack graphs and security event processing
free download
Abstract The paper is devoted to the security assessment problem. Authors suggest an approach to the security assessment based on the attack graphs that can be implemented in contemporary Security Information and Event Management (SIEM) systems. Key feature of
Guest Editorial: Special Issue on Frontiers of Trust, Security and Privacy for Computer and Communication Networks
free download
With the rapid development and increasing complexity of computer and communication networks, user requirements for trust, security, and privacy are becoming more and more demanding. This special issue presents the frontiers of trust, security and privacy for
Computer Code Algorithms and Encryption Laws for Security
free download
ABSTRACT Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and
A Comparative Assessment of Computer Security Incidence Handling
free download
Incidence response and handling has become quite a crucial, indispensible constituent of informationtechnology 2 security management, as it provides an organised way of handling the aftermaths of a security breach. It presents an 3 organisation’s reaction to illegitimate
Research and Maintenance of Computer Network Security
free download
Desktop Computer Virtualization for Improvement Security, Power Consumption and Cost by SBC (Server Based Computer)
free download
Abstract It is possible for virtualization of desktop to dramatically reduce maintenance costs and improve the security using various virtualization techniques rather than previous desktop environments. Also, with blocking beforehand the information leakage caused by
Research on the Computer Network Crime and Information Security
free download
Grid computing based RSA security in Telemedicine Centre using Computer Communication Network
free download
Abstract: HTTP is the communication protocol between the PCs and the canter of telemedicine server. Even if some form of encryption is used in transit, the medical data usually reside in an unencrypted format on the enrolled PC. This limits the nature of the
Smart Snort Enhanced Security in Computer Networks
free download
Abstract: Snort is a Network based intrusion detection system which uses signatures of attacks for pattern matching. It creates rules using rule set language for matching patterns. Snort by default is an intrusion detection system and requires additional plug-ins to work
Research on the Computer Network Security
free download
Analysis of Firewall Technology in Computer Network Security
free download
Abstract:In computer security, a firewall is a device that blocks illegal access to an organization’s network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls frequently used to prevent illegal interne t users from
ANALYSIS AND ASSESSMENT THE SECURITY VULNERABILITY IN COMMUNICATION PROCESSES IN A GIVEN COMPUTER NETWORK
free download
ABSTRACT: The analysis and assessment the security vulnerability communication processes is very important and obligatory on each network and computer system administrator and cyber-professionals. In this paper, a detailed listening of the UDP
USING HTTP FILTER TO ANALYZE AND MONITOR THE VULNERABILITY AND SECURITYSTATES IN DETERMINED COMPUTER NETWORK
free download
ABSTRACT: In this paper, an advanced content analyzing and monitoring using http filter is made. Most of the vulnerabilities with e-mail messages, Web content pages, downloaded and upload files, instant messages and voice conversations are connected. Therefore, it is
PRESENTATION OF OUTSTANDING SOFTWARE SOLUTIONS AVAILABLE FOR COMPUTERPROTECTION AGAINST SECURITY THREATS ON THE
free download
Abstract: The protection of personal computers and corporate systems against more and more ingenious, more sophisticated and harmful security threats is an integrated complex of activities to be carried out continuously and with increased intensity, with the help of
PROPERTIES OF COMPLETE METRIC SPACES AND THEIR APPLICATIONS TO COMPUTER SECURITY, INFORMATION AND COMMUNICATION
free download
Information and Communication Technology has faced a lot of challenges in terms of security of data and information. The aim of this paper is to prove some common fixed point theorems for expansive type mappings, firstly for a continuous mapping and secondly for a
Strategies for Computer Networks Security
free download
Knowledge obtained from investigation, study, or instruction, intelligence, news, facts, data, a signal or character (as communication system or computer) representing data, something (as message, experimental data, or a picture) which justifies change in a construct (as a
A Review on Security Issues Related to Computer Networks
free download
Abstract: As we know that number of computers connected to the network are increasing. At the same time numbers of threats that attack our systems are also increasing. So, it is necessary to understand the fundamentals of security in networking. In this globalized
Analysis of Packet Filtering Technology in Computer Network Security
free download
Abstract:in today’s networks are becoming more complex, and the demands on bandwidth are through the roof. In achieving visibility for the best network performance, monitoring the right data is critical. Explore a network monitoring switch tool that provides advanced
Detection of SSL-related security vulnerabilities in Android applications Computer Science Tripos, Part II Pembroke College
free download
Android is an operating system which is designed for use on mobile devices such as mobile phones and tablets. It is primarily developed by Google, with most of the code available under an open-source license. Android is installed on hundreds of millions of devices