# communication protocol # bandwidth #wirelessnetworks #mobilenetworks #cryptography #wirelesscomputing #mobilecomputing #adhocsensornetworks # telecommunications # network service Submit Your Research Articles ...!!! 15th International Conference on Wireless & Mobile Networks (WiMoNe 2023) June 17 ~ 18, 2023, Sydney, Australia Webpage URL - https://cseit2023.org/wimone/index Submission Deadline : April 08,2023 Submission URL - https://cseit2023.org/submission/index.php Contact Us : wimone@cseit2023.org
Popular posts from this blog
Paper Title Randomness Evaluation Framework of Cryptographic Algorithms Authors Cristina-Loredana Duta, Bogdan-Costel Mocanu, Florin-Alexandru Vladescu and Laura Gheorghe, University Politehnica of Bucharest, Romania Abstract Nowadays, computer systems are developing very rapidly and become more and more complex, which leads to the necessity to provide security for them. This paper is intended to present software for testing and evaluating cryptographic algorithms. When evaluating block and stream ciphers one of the most basic property expected from them is to pass statistical randomness testing, demonstrating in this way their suitability to be random number generators. The primary goal of this paper is to propose a new framework to evaluate the randomness of cryptographic algorithms: based only on a .dll file which offers access to the encryption function, the decryption function and the key schedule function of the cipher that has to be tested (block cipher or strea...
A DEFENSE MECHANISM FOR CREDIT CARD FRAUD DETECTION
A DEFENSE MECHANISM FOR CREDIT CARD FRAUD DETECTION M.Sasirekha , Sumaiya Thaseen and Saira Banu School of Computing Science and Engineering, VIT University, Tamil Nadu, India. ABSTRACT Computer security is one of the key areas where lot of research is being done. Many intrusion detection techniques are proposed to ensure the network security, protect network resources and network infrastructures. Intrusion detection systems (IDS) attempt to detect attacks by gathering network data and analyze the information from various areas to identify the possible intrusions. This paper proposes a defense mechanism combining three approaches such as anomaly, misuse and decision making model to produce better detection accuracy and a decreased false positive rate. The defense mechanism can be built to detect the attacks in credit card system using Hidden Markov approach in the anomaly detection module. The credit card holder’s behaviours are taken as attributes and t...

Comments
Post a Comment