A Novel Evaluation Approach to Finding Lightweight Machine Learning Algorithms for Intrusion Detection in Computer Network Yuchen Wang1, Shuxiang Xu2 and Qiongfang Huang1, 1Zhejiang University of Technology, China and 2University of Tasmania, Australia
A Machine Learning Approach to Anomaly-Based Detection on Android Platforms Joshua Abah, Waziri O.V, Abdullahi M.B, Arthur U.M and Adewale O.S, Federal University of Technology Minna, Nigeria
A System for Validating and Comparing Host-Based Ddos Detection Mechanisms Nguyen Hong Son, Post and Telecommunication Institute of Technology, Vietnam
ANDROINSPECTOR: A System for Comprehensive Analysis of Android Applications Babu Rajesh V, Phaninder Reddy, Himanshu P and Mahesh U Patil, Centre for Development of Advanced Computing, India
Improved Steganographic Security by Applying an Irregular Image Segmentation and Hybrid Adaptive Neural Networks with Modified Ant Colony Optimization Nameer N. El. Emam1 and Kefaya S. Qaddoum2, 1Philadelphia University, Jordan and 2Warwick University, UK
An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing P.S.Jagadeesh Kumar, S.Meenakshi Sundaram and Ranjeet Kumar,
Don Bosco Institute of Technology, India
Deterring Hacking Strategies via Targeting Scanning Properties Saad Alsunbul1,2, Phu Dung Le1, Jefferson Tan1, 1Monash University, Australia and 2King Abdullaziz for Science and Technology, Saudi Arabia
Providing End-To-End Secure Communications in GSM Networks Heshem A.El Zouka, Arab Academy for Science & Technology and Maritime Transport, Egypt
Security Challenges as a Factor Affecting the Security of Manet: Attacks and Security Solutions Nabeel Zanoon1, Nashat Albdour2, Hatem S. A. Hamatta1 and Rasha Moh'd Al-Tarawneh1, 1Al-Balqa Applied University, Jordan and 2Tafila Technical University, Jordan
An ANN Approach for Network Intrusion Detection using Entropy based Feature Selection AshalataPanigrahi and ManasRanjanPatra, Berhampur University, India
A Performance Evaluation Of Common Encryption Techniques With Secure Watermark System (Sws) Ashraf Odeh1, Shadi R.Masadeh1 and Ahmad Azzazi2, 1Isra University, Jordan and 2Applied Science University, Jordan
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channel In Secured Communication Anjan K1, Srinath N K1 and Jibi Abraham2, 1R V College of Engineering, India and 2College of Engineering Pune, India
Exploiting Rhetorical Relations to Multiple Documents Text Summarization N.Adilah Hanin Zahri1, Fumiyo Fukumoto2, Matsyoshi Suguru2 and Ong Bi Lynn1, 1University of Malaysia Perlis, Malaysia and 2University of Yamanashi, Japan
An Interactive Visualization Tool for Animating Behavior of Cryptographic Protocols Mabroka Maeref1, Fatma Algali1, Ahmed Patel2 and Zarina Shukur2, 1Sebha University Libya and 2The National University of Malaysia, Malaysia
A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection Odai M.Al-Shatanawi and Nameer N.El.Emam, Philadelphia University, Jordan
Certificate Less Key Management Scheme in Manet Using Threshold Cryptography Shaheena Khatoonand Balwant Singh Thakur, Pt.Ravishankar Shukla University, India
Comprehensive Survey of Possible Security Issues on 4G Networks Sumant Ku Mohapatra, Biswa Ranjan Swain and Pravanjan Das, Trident Academy of Technology, India
Multi-Facet Trust Model for Online Social Network Environment Liu Ban Chieng1, Manmeet Mahinderjit Singh1, Zarul Fitri Zaaba1 and Rohail Hassan2, 1University Sains Malaysia, Malaysia and 2Universiti Teknologi Petronas, Malaysia
Accessing Secured Data in Cloud Computing Environment Hasan Omar Al-Sakran, King Saud University, Saudi Arabia
Service Oriented Configuration Management of Software Architecture Razie Alidoosti, Shahrouz Moaven and Jafar Habibi, Sharif University of Technology, Iran
Runtime Potential Updater File(S) Identification: Does Your Software Updates Automatically With Application Whitelisting? Janardhan Reddy, Amit Kumar Jha and Sandeep Romana, Centre for Development of Advanced Computing, India
Strong Zero-Knowledge Authentication Based on the Session Keys (SASK) Younes ASIMI, Abdellah AMGHAR, Ahmed ASIMI and Yassine SADQI, Laboratoire des Systemes informatiques et Vision (LabSiV), Morocco
A New Secret Handshakes Scheme with Dynamic Matching Based on ZSS Preeti Kulshrestha and Arun Kumar Pal, G.B. Pant University of Agriculture and Technology, India
A New DNA Based Approach of Generating Key-Dependent Shift Rows Transformation Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and Nur Izura Udzir, Universiti Putra Malaysia, Malaysia