696,478 research outputs found
Comments on "Routh Stability Criterion"
In this note, we have shown special case on Routh stability criterion, which
is not discussed, in previous literature. This idea can be useful in computer
science applications.Comment: Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS February 2010, ISSN 1947 5500,
http://sites.google.com/site/ijcsis
Phases vs. Levels using Decision Trees for Intrusion Detection Systems
Security of computers and the networks that connect them is increasingly
becoming of great significance. Intrusion detection system is one of the
security defense tools for computer networks. This paper compares two different
model Approaches for representing intrusion detection system by using decision
tree techniques. These approaches are Phase-model approach and Level-model
approach. Each model is implemented by using two techniques, New Attacks and
Data partitioning techniques. The experimental results showed that Phase
approach has higher classification rate in both New Attacks and Data
Partitioning techniques than Level approach.Comment: 7 pages; (IJCSIS) International Journal of Computer Science and
Information Security, Vol. 10, No. 8, 201
Proposed platform for improving grid security by trust management system
With increasing the applications of grid system, the risk in security field
is enhancing too. Recently Trust management system has been recognized as a
noticeable approach in enhancing of security in grid systems. In this article
due to improve the grid security a new trust management system with two levels
is proposed. The benefits of this platform are adding new domain in grid
system, selecting one service provider which has closest adaption with user
requests and using from domains security attribute as an important factor in
computing the trust value.Comment: 6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis
A Survey on the Security of Blockchain Systems
Since its inception, the blockchain technology has shown promising
application prospects. From the initial cryptocurrency to the current smart
contract, blockchain has been applied to many fields. Although there are some
studies on the security and privacy issues of blockchain, there lacks a
systematic examination on the security of blockchain systems. In this paper, we
conduct a systematic study on the security threats to blockchain and survey the
corresponding real attacks by examining popular blockchain systems. We also
review the security enhancement solutions for blockchain, which could be used
in the development of various blockchain systems, and suggest some future
directions to stir research efforts into this area.Comment: Published in Journal: Future Generation Computer Systems (2020
A Novel Method on ISO 27001 Reviews: ISMS Compliance Readiness Level Measurement
Security is a hot issue to be discussed, ranging from business activities,
correspondence, banking and financial activities; it requires prudence and high
precision. Since information security has a very important role in supporting
activities of the organization, we need a standard or benchmark which regulates
governance over information security. The main objective of this paper is to
implement a novel practical approach framework to the development of
information security management system (ISMS) assessment and monitoring
software, called by I-SolFramework. System / software is expected to assist
stakeholders in assessing the level of their ISO27001 compliance readiness, the
software could help stakeholders understood security control or called by
compliance parameters, being shorter, more structured, high precision and
measured forecasting.Comment: Computer Science Journal (ISSN: 2221-5905) Volume 2, Issue 1, April
201
Complete Security Framework for Wireless Sensor Networks
Security concern for a Sensor Networks and level of security desired may
differ according to application specific needs where the sensor networks are
deployed. Till now, most of the security solutions proposed for sensor networks
are layer wise i.e a particular solution is applicable to single layer itself.
So, to integrate them all is a new research challenge. In this paper we took up
the challenge and have proposed an integrated comprehensive security framework
that will provide security services for all services of sensor network. We have
added one extra component i.e. Intelligent Security Agent (ISA) to assess level
of security and cross layer interactions. This framework has many components
like Intrusion Detection System, Trust Framework, Key Management scheme and
Link layer communication protocol. We have also tested it on three different
application scenarios in Castalia and Omnet++ simulator.Comment: 7 pages, International Journal of Computer Science and Information
Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.42
A Survivability Strategy in Route Optimization Mobile Network by Memetic Algorithm
The capability to provide network service even under a significant network
system element disruption is the backbone for the survival of route optimize of
mobile network Technology in today s world. Keeping this view in mind, the
present paper highlights a new method based on memetic algorithm.Comment: IEEE format, International Journal of Computer Science and
Information Security, IJCSIS January 2010, ISSN 1947 5500,
http://sites.google.com/site/ijcsis
Mobile Agent Systems, Recent Security Threats and Counter Measures
Mobile agent technology offers a dramatically evolving computing paradigm in
which a program, in the form of a software agent, can suspend its execution on
a host computer, transfers itself to another agent-enabled host on the network,
and resumes execution on the new host. It is 1960's since mobile code has been
used in the form of remote job entry systems. Today's mobile agents can be
characterized in a number of ways ranging from simple distributed objects to
highly organized intelligent softwares. As a result of this rapid evolvement of
mobile agents, plenty of critical security issues has risen and plenty of work
is being done to address these problems. The aim is to provide trusted mobile
agent systems that can be easily deployed and widely adopted. In this paper, we
provide an overview of the most recent threats facing the designers of agent
platforms and the developers of agent-based applications. The paper also
identifies security objectives, and measures for countering the identified
threats and fulfilling those security objectives.Comment: international journal of computer science issues, march 201
Performance Evaluation of WiMAX (802.16) Using Different Encoding Schemes
This paper deals with the performance of Worldwide Interoperability for
Microwave Access (WiMAX), when we enhance its physical layer attributes with
help of different encoding techniques. For this evaluation Space Time Block
Codes (STBC) and Turbo codes are separately introduced into the architecture of
WiMAX that works on adaptive modulation technique.Comment: 5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS November 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis
TTSS Packet Classification Algorithm to enhance Multimedia Applications in Network Processor based Router
The objective of this paper is to implement the Trie based Tuple Space
Search(TTSS) packet classification algorithm for Network Processor(NP) based
router to enhance multimedia applications. The performance is evaluated using
Intel IXP2400 NP Simulator. The results demonstrate that, TTSS has better
performance than Tuple Space Search algorithm and is well suited to achieve
high speed packet classification to support multimedia applications.Comment: 6 Pages, International Journal of Computer Science and Information
Security (IJCSIS
- …