Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Rishi Kushwah"'
Publikováno v:
ACCENTS Transactions on Information Security. 5:36-41
In this paper an efficient intrusion detection mechanism based on particle swarm optimization and KNN has been presented. In our approach experimentation has been performed for the intrusion detection considering NSL-KDD dataset. Then the selected we
Publikováno v:
ACCENTS Transactions on Information Security. 5:26-31
In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation h
Publikováno v:
ACCENTS Transactions on Information Security. 5:32-35
In this paper an analytical survey on the role of machine learning algorithms in case of intrusion detection has been presented and discussed. This paper shows the analytical aspects in the development of efficient intrusion detection system (IDS). T
Publikováno v:
ACCENTS Transactions on Information Security. 5:11-18
In this paper an efficient logistic regression and ant colony optimization-based object-oriented quality prediction has been presented. The dataset has been considered based on the object-oriented codes. The code considered here are completely equipp
Publikováno v:
ACCENTS Transactions on Information Security. 5:19-25
An efficient data handling mechanism has been applied based on epoch-based k-means associated fuzzy clustering (EKFC). In the first phase weights have been assigned to individual data segment presented based on the classification key metrics. It has
Publikováno v:
ACCENTS Transactions on Information Security. 5:1-5
Software quality estimation is an important aspect as it eliminates design and code defects. Object- oriented quality metrics prediction can help in the estimation of software quality of any defects and the chances of errors. In this paper a survey a
Publikováno v:
ACCENTS Transactions on Information Security. 5:6-10
This paper explores different security aspects in cloud computing environment. It includes data sharing mechanism, inter cloud communication, data breaches, data control, user-cloud relationship along with the cloud data management with standard secu
Publikováno v:
ACCENTS Transactions on Information Security. 4:23-28
Publikováno v:
ACCENTS Transactions on Information Security. 4:17-22
Publikováno v:
ACCENTS Transactions on Information Security. 4:11-16