Version-5 (May-June 2014)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7 Ver-8 Ver-9
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhancement Caesar Cipher for Better Security |
Country | : | Iraq |
Authors | : | Programmer Enas Ismael Imran, Programmer Farah abdulameerabdulkareem |
: | 10.9790/0661-16350105 |
Keywords: Cryptography, Encryption, Decryption, Plaintext, Ciphertext
[1]. SomdipDey, JoyshreeNath and AshokeNath, "An Advanced Combined Symmetric Key Cryptographic Method using Bit Manipulation, Bit Reversal, Modified Caesar Cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm", International Journal of Computer Applications (IJCA). Vol. 46, No. 20. Pp. 46-53, May, 2012.
[2]. Gaurav Sharma, Ajay Kakkar, "Cryptography Algorithms and approaches used for data security", International Journal of Scientific & Engineering Research Vol. 3, Issue 6, 2012.
[3]. Hamdan.O.Alanazi, B.B.Zaidan and A.A.Zaidan, "New Comparative Study Between DES, 3DES and AES within Nine Factors", JOURNAL OF COMPUTING. Vol.2 , Issue 3. Pp.152-157, MARCH, 2010.
[4]. S G Srikantaswamy, Dr. H D Phaneendra, "Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption", International Journal on Cryptography and Information Security (IJCIS). Vol. 2, No.4. pp. 39-49, December 2012.
[5]. "CRYPTOGRAPHY", https://en//.wikipedia.org/wiki/cryptography.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Mammograms, Pre-processing, Region of Interest (ROI).
[1] Boucher, A., Jouve, P.E., Cloppet, F. and Vincent, N., Segmentation du muscle pectoral sur une mammographie, Congrès des jeunes chercheurs en vision par ordinateur, ORASIS'09, 2009, Trégastel, France.
[2] Ponraj, D.Narain, Jenifer, M.Evangelin Poongodi, P., and Manoharan, J.Samuel, A Survey on the Preprocessing Techniques of Mammogram for the Detection of Breast Cancer, Journal of Emerging Trends in Computing and Information Sciences, 2(12), 2011, ISSN 2079-8407.
[3] Bandyopadhyay, Kumar, Samir, pre-processing of Mammogram Images, International Journal of Engineering Science and Technology, 2(11), 2010, 6753-6758.
[4] Gupta, R., and Undril, P.E., The use of texture analysis to delineate suspicious masses in mammography", Phys.Med.biol. 40, 1995, 835-855.
[5] Suckling, J., Dance, D., Moskovic, E., Lewis, D. and Blacker, S., Segmentation of mammograms using multiple linked self-organizing neural networks", Med. Phys, 22, 1995, 145-52.
- Citation
- Abstract
- Reference
- Full PDF
Index Terms: Security testing, Misuse deployment diagrams, threat trees, Misuse cases, test sequence
[1]. Open Web Application Security project (OWASP) www.owasp.org/index.php/Top_10_2013-Top_10
[2]. Susan J Lincke, Timothy H. Knautz and Misty D.Lowery, " Designing System Security with UML Misuse Deployment Diagrams ", in 2012 IEEE Sixth International Conference on Software Security and Reliability Companion, 978-0-7695-4743-5/12 IEEE, pp 57 – 61.
[3]. Frank Swiderski and Window Snyder, Threat Modeling: Microsoft Professional, 2004.
[4]. Charles B. Haley, Robin Laney, Jonathan D Moffett and Bashar Nuseibeh, " Security requirements engineering: A Framework for Representation and Analysis," in IEEE Transactions on Software Engineering, vol. 34, No. 1, 0098-5589/08 IEEE, Jan.-Feb, 2008, pp 133 – 153.
[5]. Fabricio A Braz, Eduardo B Fernandez, and Michael Van Hilst, " Eliciting Security requirements through Misuse activities " in 19th International Conference on Database and Expert Systems Application, 1529-4188/08 IEEE, 2008, pp 328 – 333.
[6]. Percy A. Pari Salas, Padmanabhan Krishnan, and Kelvin J. Ross, "Model-based Security Vulnerability Testing", in Australian Software Engineering Conference (ASWEC'07), 0-7695-2778-7/07, IEEE, 2007. pp 284 – 296.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Use of Data Mining in Various Field: A Survey Paper |
Country | : | India |
Authors | : | Smita, Priti Sharma |
: | 10.9790/0661-16351821 |
Keywords: Association, Clustering, Data mining, data mining application, knowledge discovery database
[1] Yongjian Fu " data mining: task, techniques and application"
[2] Er. Rimmy Chuchra "Use of Data Mining Techniques for the Evaluation of Student Performance:A Case Study" International Journal of Computer Science and Management Research Vol 1 Issue 3 October 2012
[3] J. Han and M. Kamber. "Data Mining, Concepts and Techniques", Morgan Kaufmann, 2000.
[4] Aakanksha Bhatnagar, Shweta P. Jadye, Madan Mohan Nagar" Data Mining Techniques & Distinct Applications: A Literature Review" International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 9, November- 2012
[5] Brijesh Kumar Baradwaj, Saurabh Pal "Mining Educational Data to Analyze Students Performance" (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 6, 2011
[6] Data mining white paper, www.ikanow.com
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Securing IPv6's Neighbour and Router Discovery, using Locally Authentication Process |
Country | : | India |
Authors | : | Simanta Sarma |
: | 10.9790/0661-16352231 |
Keywords : Stateless Address Auto-configuration, Neighbour Discovery, Cryptographically Generated Address (CGA), MYSEA, IPsec, MLS, IP next generation, Multilevel security, Router Discovery, Secure Neighbour Discovery (SEND), Public Key Infrastructure (PKI), Digital Certificate, Security Attacks in IPv6.
[1]. Al-Radhi, A, A. 2011. IPv6 Promised Role in Mitigating Cyber Attacks: Really it's Time!.Swiss Cyber Storm-International IT Security Conference, Switzerland.
[2]. Fundamental Benefits of IPv6, http://www.ipv6now.com.au/primers/benefits.php
[3]. Minoli, D. Kouns, J. 2009. Security in an IPv6 Environment. CRC Press, USA.
[4]. T. Aura; Request for Comments: 3972; March 2005; Cryptographically Generated Addresses (CGA)
[5]. S. Thomson, T. Narten and T. Jinmei; Request for Comments: 4862; September 2007; "IPv6 Stateless Address Autoconfiguration "
[6]. Stefano M.Faccin and Franck Le ; ―A Secure and Efficient solution to the IPv6 address ownership problem‖; 0-7803-7605-6/02 ,2002 IEE Page : 162 -166
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Cross-layer Design, Quality-of-Service, MANETs, routing, QoS routing, QoS framework, multicast QoS
[1] Subir KS, TG Basavaraju, C Puttamadappa. "Adhoc Mobile Wireless Networks, Principles, Protocols and Applications" Auerbach Publications, 2008
[2] S. Lohier, Sidi MS, Yacine GD, et al. "QoS routing in adhoc networks", 2003
[3] Quin Zhang, Ya-qin Zhang. "Cross-Layer Design for QoS Support in Multihop Wireless Networks", Vol.96, No.1, Jan 2008, IEEE Proceedings.
[4] Ghalib A. Shah, Weifa Liang, et al. "Cross-Layer Design for QoS Support in Wireless Multimedia Sensor Networks",Globecom, 2010, IEEE Proceedings.
[5] Maria Canales, Jose Ramon Gallego, et al. "Cross-layer proposal for QoS routing in Mobile Ad-hoc Networks", WPMC, Denmark, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Novel Approach for Code-Base Fault Localization Technique |
Country | : | India |
Authors | : | Suvajit Mandal, Arup Abhinna Acharya |
: | 10.9790/0661-16353538 |
Index Terms: Testing, Debugging, Slicing, SAFL
[1]. W. Eric Wong, Vidroha Debroy, Yihao Li, and Ruizhi Gao. Software Fault Localization Using DStar (D). In IEEE Sixth International Conference on Software Security and Reliability (2012), vol. 2.
[2]. Yu-Min Chung,Chin-Yu-Huangg. A Study of Modified Testing-Based Fault Localization Method, vol. 2. 2008.
[3]. ]Jirong Sun, Zshu Li, J. N. F. Y. Software Fault Localization Based On Testing Requirement and Program Slice. In International Conference On Network- ing,Architechture and Storage, IEEE (2007), vol. 1.
[4]. Nimit Singhania. Survey Of Software Fault Localization. In IBM India Research
Laboratory, New Delhi,110070,India (2012).
[5]. ] Dan Hao, Lu Zhang, H. M. J. S. Towards Interactive Fault Localization Using Test Information. In XIII ASIA PACIFIC SOFTWARE ENGINEERING CONFER- ENCE,IEEE (2006), vol. 2.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Gait recognition, Gait recognition approaches, multiple discriminant analysis, neural network, outermost contour, support vector machine.
[1]. Liu, Yilong Yin, Wei Qin & Ying Li: "Gait Recognition Based on Outermost Contour", International Journal of Computational Intelligence Systems, 4:5, 1090-1099 (2011).
[2]. Amit Kale, Aravind Sundaresan, A. N. Rajagopalan, Naresh P. Cuntoor, Amit K. Roy-Chowdhury, Volker Kruger, and Rama Chellappa "Identification of Humans Using Gait"(IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 9, SEPTEMBER 2004):.
[3]. S John C. Russ.‑‑ Russ, John C, The image processing handbook 5th ed. (2007).
[4]. ChewYean Yam, Mark S. Nixon, John N. Carter: "A Model-Based Approach Gait" Gait Recognition by Walking and Running: (January 2002,)
[5]. Sanjeev Sharma, Ritu Tiwari, Anupam shukla and Vikas Singh (2011): "Identification of People Using Gait Biometrics International Journal of Machine Learning and Computing", Vol. 1, No. 4, October 2011
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Segmentation to Sound Conversion |
Country | : | India |
Authors | : | Anindita Chatterjee, Himadri Nath Moulick |
: | 10.9790/0661-16354448 |
Keywords: Segmentation, sound, acoustic pattern, speech recognizer, signal
[1]. H. M¨uller, N. Michoux, D. Bandon, and A. Geissbuhler,―A Review of Content-Based Image Retrieval Systemsin Medical Applications Clinical Benefits andFuture Directions,‖ International Journal of MedicalInformatics, vol. 73, pp. 1–23, 2004.
[2]. R.H. Choplin, J.M. Boehme, and C.D. Maynard,―Picture archiving and communication systems: anoverview,‖ RadioGraphics, vol. 12, pp. 127–129,1992.
[3]. Y. Liua, D. Zhang, G. Lu, and W.Y. Ma, ―A survey ofcontent-based image retrieval with high-level semantics,‖Pattern Recogntion, vol. 40, pp. 262–282, 2007.
[4]. [W. Hsu, S. Antani, L.R. Long, L. Neve, and G.R.Thoma, ―SPIRS: a Web-based Image Retrieval SystemFor Large Biomedical Databases,‖ InternationalJournal of Medical Informatics, vol. 78, pp. 13–24,2008.
[5]. H. M¨uller, T. Deselaers, E. Kim, C. Kalpathy, D.Jayashree, M. Thomas, P. Clough, and W. Hersh,―Overview of the ImageCLEFmed 2007 Medical Retrievaland Annotation Tasks,‖ 8th Workshop of theCross-Language Evaluation Forum (CLEF 2007),Proceedings of LNCS, vol. 5152, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Mobile Ad hoc Networks (MANETs), Secure Intrusion- Detection Systems (SIDS), Malicious Nodes.
[1]. EAACK – A Secure Intrusion Detection System for MANETs Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang and Tarek R. Sheltami, Member, IEEE
[2]. Investigating Intrusion and Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes Marjan Kuchaki Rafsan,Ali Movaghar and Faroukh Koroupi,World Academic of Science Engineering and Technology 44 2008.
[3]. Mishra Amitabh, Nadkarni Ketan M., and Ilyas Mohammad,2003."Chapter 30:Security in wireless ad- hoc networks, the handbook of Ad hoc wireless network". CRC PRESS Publisher
[4]. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255–265.
[5]. "A study of different types of attacks on multicast in mobile ad hoc networks" Hoang Lan Nguyen, Uyen Trang Nguyen, Elsevier AdHoc Networks(2008) 32-46. [7] D. Johnson and D. Maltz, "Dynamic Source Routing in ad hoc wireless networks," in Mobile computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181.
- Citation
- Abstract
- Reference
- Full PDF
General Terms: Firewall, Policy anomaly management framework, Segmentation, Threshold value
[1]. E. Al-Shaer and H. Hamed, "Discovery of Policy Anomalies in Distributed Firewalls," IEEE INFOCOM '04, vol. 4, pp. 2605-2616, 2004.
[2]. A. Wool, "Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese," IEEE Internet Computing, vol. 14, no. 4,
pp. 58-65, July/Aug. 2010
[3]. L. Yuan, H. Chen, J. Mai, C. Chuah, Z. Su, P. Mohapatra, and C. Davis, "Fireman: A Toolkit for Firewall Modeling and Analysis," Proc. IEEE Symp. Security and Privacy, p. 15, 2006.
[4]. L. Yuan, C. Chuah, and P. Mohapatra, "ProgME: Towards Programmable Network Measurement," ACM SIGCOMM Computer Comm. Rev., vol. 37, no. 4, p. 108, 2007.
[5]. A. El-Atawy, K. Ibrahim, H. Hamed, and E. Al-Shaer, "Policy Segmentation for Intelligent Firewall Testing," Proc. First Workshop
Secure Network Protocols (NPSec '05), 2005
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Wireless network security, spoofing attack, attack detection, localization
[1]. Jie Yang, Yingying Chen, and Jerry Cheng, ―Detection and Localization of Multiple Spoofing Attackers in Wireless Networks‖ in IEEE 2012.
[2]. J. Bellardo and S. Savage, ―802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,‖ in Proceedings of the USENIX Security Symposium, 2003, pp. 15 – 28.
[3]. F. Ferreri, M. Bernaschi, and L. Valcamonici, ―Access points vulnerabilities to dos attacks in 802.11 networks,‖ in Proceedings of the IEEE Wireless Communications and Networking Conference, 2004.
[4]. D. Faria and D. Cheriton, ―Detecting identity-based attacks in wireless networks using signalprints,‖ in Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2006.
[5]. Q. Li and W. Trappe, ―Relationship-based detection of spoofing-related anomalous traffic in ad hoc networks,‖ in Proc. IEEE SECON, 2006.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: MANET, flooding, Delay Tolerant Networking
[1]. Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks. In:Mobile Computing. Volume 353. (1996)
[2]. Perkins, C.: Ad-hoc On-Demand Distance Vector Routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA (1999) 90
[3]. Haas, Z., Pearlman, M.: The Performance of Query Control Schemes for Zone Routing Protocol. In: ACM SIGCOMM, Vancouver, Canada (1998)
[4]. Royer, E., Toh, C.: A Review of Current Routing Protocols for Ad-hoc Mobile Wireless Networks. IEEE Personal Communications Magazine 6 (1999)
[5]. Perkins, C., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In: ACM SIGCOMM, London, England (1994)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Tutorial of Mobile Ad-Hoc Network (Manet) Routing Protocols |
Country | : | India |
Authors | : | Palki Dhawan |
: | 10.9790/0661-16357174 |
Keywords: MANET, routing, network, communication
[1] Miguel Luis, Luis Bernardo, Rui Dinis, Paulo Pinto Rodolfo Oliveira, "The Impact of Node's Mobility on Link-detection based on Routing Hello Messages," in Wireless Communications and Networking Conference (WCNC), Sydney, NSW, 18-21 April 2010, pp. 1 - 6.
[2] Ingrid Moerman, Bart Dhoedt and Piet Demeester Jeroen hoebeke, "An Overview of Mobile Ad Hoc Networks: Applications and Challenges," JOURNAL OF THE COMMUNICATIONS NETWORK, vol. 3, pp. 60-66, july 2004.
[3] M.B.,Al-Dubai, A.Y. and Buchanan, W. Khalaf, "A new adaptive broadcasting approach for mobile ad hoc networks," in Wireless Advanced (WiAD), 2010 6th Conference on, London, 27-29 June 2010, pp. 1 - 6.
[4] V.C, Singhal, M Giruka, "Hello protocols for ad-hoc networks: overhead and accuracy tradeoffs," in World of Wireless Mobile and Multimedia Networks, 2005. WoWMoM 2005. Sixth IEEE International Symposium on a, 13-16 June 2005, pp. 354 - 361.
[5] Aashish Choudhary, "Modified Adhoc on Demand Routing Protocol in Mobile Ad hoc Network," National Institute of Technology , Rourkela, Odisha, 769008, India, Thesis in Master of Technology July,2013
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | PARS: Position based Anonymous Routing Scheme in MANETs |
Country | : | India |
Authors | : | Remya S, Lakshmi K S |
: | 10.9790/0661-16357582 |
Index Terms: Anonymous routing, position-based routing, random forwarder, zone partition
[1]. A. Pfitzmann, M. Hansen, T. Dresden, and U. Kiel,"Anonymity, Unlinkability, Un observability, Pseudonymity, andIdentity Management a Consolidated Proposal for Terminology,Version0.31",technicalreport,2005.
[2]. Z.Zhiand Y.K. Choong,"Anonymizing Geographic AdHoc Routing for Preserving Location Privacy,",Proc.Third Intl Workshop Mobile Distributed Computing (ICDCSW),2005.
[3]. V.Pathak,D.Yao,and L.Iftode,"Securing Location Aware Services over VANETUsing Geographical Secure Path Rout- ing,",Proc.IEEE Intl Conf. Vehicular Electronics and safety (ICVES),2008.
[4]. K.E. Defrawy and G. Tsudik, "ALARM: Anonymous Location- Aided Routing in Suspicious MANETs,",Proc. IEEE Intl Conf. Network Protocols (ICNP), 2007.
[5]. X.Wu,J.Liu,X.Hong, and E.Bertino,"Anonymous Geo- Forwarding in MANETs through Location Cloaking,", IEEE Trans.Parallel and Distributed Systems,vol.19,no.10,pp.1297-1309,Oct.2008.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Topology structures, Search, Load Sharing, unstructured P2P networks
[1]. IPOQUE, "Ipoque Internet Study 2007: P2P File Sharing Still Dominates the Worldwide Internet," http://www.ipoque.com/ news-and-events/news/archive/2007, 2011.
[2]. S. Sen and J. Wang, "Analyzing Peer-to-Peer Traffic Across Large Networks," IEEE/ACM Trans. Networking, vol. 12, no. 2, pp. 219- 232, Apr. 2004.
[3]. Gnutella, http://rfc-gnutella.sourceforge.net/, 2011.
[4]. Y. Liu, J. Han, and J. Wang, "Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 3, pp. 464-475, Mar. 2011.
[5]. H. Chen, H. Jin, Y. Liu, and L.M. Ni, "Difficulty-Aware Hybrid Search in Peer-to-Peer Networks," IEEE Trans. Parallel and Distributed Systems, vol. 20, no. 1, pp. 71-82, Jan. 2009.