Computers and Networks Security

<![if !vml]>b.jpg<![endif]>

 

 

ID

Title

Author

Country

616

Using genetic algorithms to break a simple transposition cipher.

A. S. Al-khalid, S. S. Omran, dalal.  A. Hammood

Iraq

623

Efficient undeniable threshold proxy signature schem.

Sattar J Aboud and Sufian Yousef

UK

713

Comparison study between classic-lsb, slsb and dslsb image steganography.

Mohammed Abbas Fadhil Al-Husainy

Jordan

767

Methods to test web application scanners.

Fernando Román Muñoz, Luis Javier García Villalba

Spain

768

Evolutions of evasion techniques against network intrusion detection systems.

Jorge Maestre Vidal, Jaime Daniel Mejía Castro, Luis Javier García Villalba

Spain

769

Techniques for source camera identification.   

Ana Lucila Sandoval Orozco, Jocelin Rosales Corripio, David Manuel Arenas González, Luis Javier García Villalba, Julio César Hernández Castro

UK

770

Taxonomy of network intrusion detection system based on anomalies.

Jaime Daniel Mejía Castro, Jorge Maestre Vidal, Lucila Sandoval Orozco, Luis Javier García Villalba

Spain

771

Derivations of traffic data analysis.

Alejandra Guadalupe Silva Trujillo, Javier Portela García-Migue, Luis Javier García Villalba

Spain

779

Contextual adaptation of a security framework.

Anthony Ijeh, Ahmad Al Dahoud , Babatunde Ali Alao,Stephen .A. Reames

Oman

781

Optimization of davidson model based on recent rf measurement conducted in uhf/vhf bands.

Nasir Faruk, Yunusa. A. Adediran, Adeseko A. Ayeni

Nigeria

783

A new approach for resolving cyber crime in network forensics based on generic process model.

Mohammad Rasmi, Aman Jantan, Hani Al-Mimi

Malaysia