Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
    • by 
    •   4  
      RFIDSensorMicrocontrollerSystem Security
    • by 
    •   9  
      Distributed ComputingFormal AnalysisComputer SoftwareHuman nature
An intrusion is defined as a violation of the security policy of the system, and hence, intrusion detection mainly refers to the mechanisms that are developed to detect violations of system security policy. Recently, data mining... more
    • by 
    •   11  
      Data MiningNetwork Intrusion Detection & PreventionIntrusion DetectionDecision Table
    • by 
    •   211  
      ManagementEcological EngineeringOptical EngineeringBiochemistry
    • by 
    •   7  
      Access ControlOPERATING SYSTEMOpen SourceSystem Architecture
    • by 
    •   5  
      Access ControlTrusted ComputingOPERATING SYSTEMData Privacy
    • by 
    •   7  
      Systems EngineeringComputer SecurityCybersecuritySystem Engineering
    • by 
    •   8  
      Mechanical EngineeringNetwork SecurityEnergyDemand Response
    • by 
    •   222  
      ManagementEngineeringEcological EngineeringOptical Engineering
    • by 
    •   10  
      Power SystemArtificial Immune SystemVoltage StabilitySystem Security
    • by  and +1
    •   4  
      RFIDSensorMicrocontrollerSystem Security
    • by 
    •   11  
      Computer ScienceVisualizationUsabilityPrivacy
    • by 
    •   9  
      Distributed ComputingNetworksComputer SecurityDomain Name System
In this paper, a hand biometric system for verification and recognition purposes is presented. The method is based on three keys. Firstly, the system is based on using a Natural Reference System (NRS) defined on the hand’s natural layout.... more
    • by 
    •   7  
      Control ApplicationSimilaritySystem SecurityScale Invariant Feature Transform
    • by  and +1
    •   7  
      Electricity MarketReal Time SystemsReal TimeSystem Security
    • by 
    •   14  
      Power SystemUser interfacesCyber SecurityHuman Machine Interface
    • by 
    •   211  
      ManagementEcological EngineeringOptical EngineeringBiochemistry
It was recently discovered that mammalian skin can produce serotonin and transform it into melatonin. Pathways for the biosynthesis and biodegradation of serotonin and melatonin have been characterized in human and rodent skin and in... more
    • by 
    •   14  
      PhysiologySerotoninMelatoninHumans
In this work, several security features available on the Windows Embedded operating system were reviewed for their relevance in security achievement in case of protecting the classified data. The prevention of usage of unwanted keyboard... more
    • by 
    •   30  
      Information SystemsComputer ScienceOperating SystemsInformation Security
    • by 
    •   20  
      Computer ScienceSoftware Systems SecurityEmbedded Systems SecurityPower System Security
    • by 
    •   6  
      Computer ScienceSecurityGrounded TheoryPasswords
The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of security gadgets and locks still need the attention of researchers to find a permanent solution to the well being of lives and properties of... more
    • by 
    •   20  
      Computer ScienceSoftware Systems SecurityEmbedded Systems SecurityPower System Security
    • by 
    •   15  
      Computer SciencePrivacyElectronic VotingSoftware Development
    • by 
    •   205  
      ManagementMarketingEngineeringEcological Engineering
    • by 
    •   223  
      ManagementEngineeringEcological EngineeringOptical Engineering
The development of radio networks has brought the problem of security specifically related to mobility of terminals sharply into focus, and has created the need for radio network operators to implement new security functionalities. The... more
    • by 
    •   8  
      Mobile SystemsMobile telecommunicationStandardisationSystem Security
    • by 
    •   13  
      AlgorithmsArtificial IntelligenceComputer SecurityBiometry
Today, as systems become more and more complex, safety is becoming critical. Reducing the risk to an acceptable level with a complete risk management activity is necessary. This paper more precisely focuses on risk analysis; its... more
    • by 
    •   9  
      EngineeringSoftware EngineeringRisk ManagementSafety
Page 1. 201 Ethical Hacking as a risk management technique Syed A. Saleem MSIS Student, Kennesaw State University 134 Parkmont Way, Dallas GA 30132 404-316-1441 [email protected] ABSTRACT The rapid growth ...
    • by 
    •   12  
      Computer ScienceInformation SecurityNetwork SecurityRisk Management
    • by 
    •   8  
      Analog CircuitsSignal ProcessingCommunication SystemDigital Systems
    • by 
    •   16  
      Genetic AlgorithmsDynamic controlparallel Genetic algorithmPower Generation
    • by 
    •   213  
      ManagementMarketingEngineeringEcological Engineering
    • by 
    •   226  
      ManagementMarketingEngineeringEcological Engineering
During the past decade Defence Research and Development Canada - Atlantic has been investigating the use of underwater deployable systems and autonomous vehicles. Both of these fixed and mobile systems are dependent on reliable underwater... more
    • by 
    •   13  
      Mobile SystemsNetwork codingResearch and DevelopmentData Fusion
Notice of Violation of IEEE Publication Principles"A Dynamic Distributed Diagnosis Algorithm for an Arbitrary Network Topology with Unreliable Nodes and Links,"by Pabitra Mohan Khilar and Sudipta Mahapatra,in the Proceedings of the... more
    • by 
    •   38  
      Information TechnologyWind EnergyFuzzy LogicPower System
    • by 
    •   182  
      ManagementEcological EngineeringOptical EngineeringBiochemistry
    • by 
    •   222  
      ManagementEngineeringEcological EngineeringOptical Engineering
    • by 
    •   211  
      ManagementEcological EngineeringOptical EngineeringBiochemistry
    • by 
    •   212  
      ManagementEcological EngineeringOptical EngineeringBiochemistry
    • by 
    •   5  
      Information TechnologyInformation SecurityNetwork SecuritySystem Security
    • by 
    •   4  
      RFIDSensorMicrocontrollerSystem Security
    • by 
    •   2  
      EngineeringSystem Security
Multifaceted nature of frameworks are growing bit by bit. This prompts a consistently expanding number of weaknesses in the Systems. Assailants utilize these weaknesses for abusing the arrangement of casualty. It is more brilliant to find... more
    • by 
    •   5  
      Penetration TestingSystem SecurityVulnerability assessmentCyber Defence
    • by 
    •   5  
      EngineeringProfitabilityHandwriting RecognitionSystem Security
    • by 
    •   10  
      EngineeringGame TheoryEducationComputer Science Education
Economic growth and information technology development has stimulated customer demand for foreign travel. In an intensely competitive and dynamic travel market, it is necessary for travel agencies to adopt innovative forms of information... more
    • by 
    •   12  
      MarketingInformation TechnologyEconomic GrowthMarketing Strategy
    • by 
    •   15  
      Decision MakingRisk assessmentInformation Systems SecuritySecurity Requirements
    • by 
    •   196  
      ManagementEngineeringEcological EngineeringOptical Engineering
    • by 
    •   198  
      ManagementEcological EngineeringOptical EngineeringBiochemistry
    • by 
    •   225  
      ManagementEngineeringEcological EngineeringOptical Engineering