System Security
780 Followers
Recent papers in System Security
An intrusion is defined as a violation of the security policy of the system, and hence, intrusion detection mainly refers to the mechanisms that are developed to detect violations of system security policy. Recently, data mining... more
In this paper, a hand biometric system for verification and recognition purposes is presented. The method is based on three keys. Firstly, the system is based on using a Natural Reference System (NRS) defined on the hand’s natural layout.... more
It was recently discovered that mammalian skin can produce serotonin and transform it into melatonin. Pathways for the biosynthesis and biodegradation of serotonin and melatonin have been characterized in human and rodent skin and in... more
In this work, several security features available on the Windows Embedded operating system were reviewed for their relevance in security achievement in case of protecting the classified data. The prevention of usage of unwanted keyboard... more
The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of security gadgets and locks still need the attention of researchers to find a permanent solution to the well being of lives and properties of... more
The development of radio networks has brought the problem of security specifically related to mobility of terminals sharply into focus, and has created the need for radio network operators to implement new security functionalities. The... more
Today, as systems become more and more complex, safety is becoming critical. Reducing the risk to an acceptable level with a complete risk management activity is necessary. This paper more precisely focuses on risk analysis; its... more
Page 1. 201 Ethical Hacking as a risk management technique Syed A. Saleem MSIS Student, Kennesaw State University 134 Parkmont Way, Dallas GA 30132 404-316-1441 [email protected] ABSTRACT The rapid growth ...
During the past decade Defence Research and Development Canada - Atlantic has been investigating the use of underwater deployable systems and autonomous vehicles. Both of these fixed and mobile systems are dependent on reliable underwater... more
Notice of Violation of IEEE Publication Principles"A Dynamic Distributed Diagnosis Algorithm for an Arbitrary Network Topology with Unreliable Nodes and Links,"by Pabitra Mohan Khilar and Sudipta Mahapatra,in the Proceedings of the... more
Multifaceted nature of frameworks are growing bit by bit. This prompts a consistently expanding number of weaknesses in the Systems. Assailants utilize these weaknesses for abusing the arrangement of casualty. It is more brilliant to find... more
Economic growth and information technology development has stimulated customer demand for foreign travel. In an intensely competitive and dynamic travel market, it is necessary for travel agencies to adopt innovative forms of information... more