Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   17  
      Computer NetworksServant LeadershipApplied ResearchOPERATING SYSTEM
The destruction due to computer security incidents warns organizations to adopt security measures. In addition to technological measures, individual’s information security awareness is also necessary. Different psychological theories have... more
    • by 
    •   6  
      Information SecurityComputer SecurityBest practiceEnvironmental awareness
    • by 
    •   5  
      Phase SynchronizationInformation Assurance and SecurityVector controlSpectrum
    • by 
    •   7  
      EngineeringInformation Assurance and SecuritySteady stateHigh Power
    • by 
    •   8  
      Robust controlDigital ControlInformation Assurance and SecurityRobust stability
The purpose of this paper is to identify the threats that exist in Healthcare Information Systems (HIS). The study has been carried out in three different departments namely, Information Technology Department (ITD), Medical Record... more
    • by 
    •   12  
      Information TechnologyInformation SecurityHealth CareHigh Frequency
    • by 
    •   3  
      FingerprintInformation Assurance and SecurityMessage Authentication
Information Security and Assurance materials
    • by 
    • Information Assurance and Security
    • by 
    •   3  
      Digital ForensicsSystematic Literature ReviewInformation Assurance and Security
    • by 
    •   17  
      EngineeringDesignPower SystemsPower System
Nowadays, an Electronic Examination Online (e-Exam) has become one of alternative for examination platform in education and teaching domain. However, security is still lacking in the implementation of e-Exam such as the reliability of the... more
    • by 
    •   4  
      Information Security ManagementInformation Assurance and SecurityStudent Motivation ModelEExam Assessment Model
12 th International Conference on Computer Science, Engineering and Applications (ICCSEA 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of computer science,... more
    • by 
    •   9  
      Operating SystemsSoftware EngineeringProgramming LanguagesMachine Learning
    • by 
    •   5  
      Information SecurityComputer SecurityInformation AssuranceInformation Assurance and Security
A new feature of services in Nagios has been added to the existing system which has no such services. The bandwidth monitoring and notification system are configured for alerting the network administrators when the bandwidth of the... more
    • by 
    •   9  
      OPERATING SYSTEMQuality of ServiceCase StudyNetwork monitoring
This research paper aims at comparing two multi-core processors machines, the Intel core i7-4960X processor (Ivy Bridge E) and the AMD Phenom II X6. It starts by introducing a single-core processor machine to motivate the need for... more
    • by 
    •   18  
      Computer ArchitectureSoftware EngineeringSoft ComputingInformation Security, Assurance and Audit
    • by 
    •   4  
      SteganographyData PrivacyInformation Assurance and SecurityDesign and Implementation
    • by 
    •   7  
      Edge DetectionWavelet TransformReal TimeInformation Assurance and Security
    • by 
    •   5  
      Information SecurityComputer SecurityInformation AssuranceInformation Assurance and Security
    • by 
    •   8  
      Network Intrusion Detection & PreventionIntrusion DetectionCross ValidationInformation Assurance and Security
Cyber defense competitions (CDCs) simulate a real-world environment, where the competitors must protect the information assets of a fictional organization. These competitions are becoming popular at the high school and college levels, as... more
    • by  and +1
    •   6  
      Information SecurityInformation AssuranceCybersecurityInformation Assurance and Security
    • by 
    •   18  
      InformaticsStabilityDampingReactive Power
    • by 
    •   8  
      Access ControlRelationship ManagementAccess Control ModelsInformation Assurance and Security
    • by 
    •   9  
      Audio Signal ProcessingSteganographyWavelet TransformsInformation Hiding
    • by 
    •   9  
      Information Security and AssuranceControl systemPerformance EvaluationVoltage sag
    • by 
    •   8  
      Information SecuritySecurityGenetic AlgorithmRisk Analysis
    • by  and +2
    •   5  
      High VoltageInformation Assurance and SecurityHigh PowerBoolean Satisfiability
e-Exam is an electronic resource platform for students to take examinations through online. Since, the process of taking the exams are executed through internet, therefore security consideration become vital in e-Exam. Due to lack of... more
    • by  and +1
    •   4  
      Information Security ManagementInformation Assurance and SecurityE-Exam Assessment ModelStudent Motivation Model
This paper presents the design and analysis of an area efficient Blue Midnight Wish compression function with digest size of 256 bits (BMW-256) on FPGA platforms. The proposed architecture achieves significant improvements in system... more
    • by  and +1
    •   5  
      CryptographyField-Programmable Gate ArraysFPGA implementationInformation Assurance and Security
    • by 
    •   17  
      EngineeringDesignPower SystemsPower System
    • by 
    •   6  
      Group TheoryPublic key cryptographyInformation Assurance and SecurityGalois Fields
    • by 
    •   17  
      Computer ScienceExpert SystemsData MiningComputer Networks
    • by 
    •   11  
      Network SecurityComputer NetworksOpen SourcePerformance Evaluation
8th International Conference on Computer Science, Information Technology and Applications (CSITA 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer... more
    • by 
    •   19  
      Programming LanguagesModeling and SimulationDatabase And Data MiningPerformance Evaluation (Computer Science)
    • by 
    •   14  
      Network SecuritySix SigmaDistributed Denial of Service AttackInformation Assurance
    • by 
    •   7  
      Optimal ControlOptimal Control theoryInformation Assurance and SecurityVariable Structure Systems
    • by 
    •   11  
      Computer ScienceOptimal ControlInformation Security and AssuranceOptimal Control theory
    • by 
    •   17  
      Computer ScienceExpert SystemsData MiningComputer Networks
    • by 
    •   18  
      CryptographyInformation AssuranceImage QualityData Hiding
    • by 
    •   8  
      Path planningHuman BehaviourAutonomous navigationHuman Robot Interaction
    • by 
    •   7  
      Access ControlAccess To InformationAccess Control ModelsInformation Assurance and Security
Wireless Sensor Networks (WSN) security issues are getting more attention by researchers due to deployment circumstances. They are usually deployed in unattended and harsh environments that make them susceptible for many kinds of attacks.... more
    • by 
    •   11  
      Information SystemsCognitive ScienceNetwork SecurityWireless Sensor Networks
    • by 
    •   19  
      Applied MathematicsOptimal ControlPerformanceDigital Control
    • by  and +1
    •   13  
      TerrorismWireless Sensor NetworksMemory ManagementSensor networks
    • by 
    •   2  
      Information AssuranceInformation Assurance and Security
    • by 
    • Information Assurance and Security
    • by 
    •   6  
      Information SecurityComputer SecurityBest practiceEnvironmental awareness
The aim of this paper is to present a theoretical approach of the stray flux analysis in a three-phase squirrel-cage induction machine for stator and rotor electrical faults detection. Initially, the stray flux is analyzed in a point... more
    • by 
    •   8  
      EngineeringHarmonic AnalysisPhysicsFault Detection
International Conference on Computing and Information Technology (COIT 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science and Information... more
    • by 
    •   8  
      Software EngineeringText MiningModeling and SimulationMobile and Ubiquitous Computing
Abstract: This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher... more
    • by 
    •   2  
      InformationInformation Assurance and Security