Privacy Protection System for Secure Authentication and Internal Intrusion Detection System
Abstract
Full Text:
PDFReferences
Fang-Yie Leu, Kun-Lin Tsai, Member, IEEE, Yi-Ting Hsiao, and ChaoTung
Yang, Intrusion detection and identification system using data
mining and forensic techniques, Adv. Inf. Comput. Security, vol. 4752,
pp. 137152, 2015.
B. Sayed, I. Traore, I. Woungang, and M. S. Obaidat, Biometric authentication
using mouse gesture dynamics, IEEE Syst. J., vol. 7, no. 2, pp.
, Jun. 2013.
Z. Shan, X. Wang, T. Chiueh, and X. Meng, Safe side effects commitment
for OS-level virtualization, in Proc. ACM Int. Conf. Autonomic Comput.,
Karlsruhe, Germany, 2011, pp. 111120.
H. S. Kang and S. R. Kim, A new logging-based IP traceback approach
using data mining techniques, J. Internet Serv. Inf. Security, vol. 3, no.
/4, pp. 7280, Nov. 2013.
J. Choi, C. Choi, B. Ko, D. Choi, and P. Kim, Detecting web based DDoS
attack using MapReduce operations in cloud computing environment, J.
Internet Serv. Inf. Security, vol. 3, no. 3/4, pp. 2837, Nov. 2013
Shui Yu, Senior Member, IEEE, Keshav Sood, and Yong Xiang, Senior
Member, IEEE,An Effective and Feasible Traceback Scheme in Mobile
Internet Environment,IEEE COMMUNICATIONS LETTERS, VOL. 18,
NO. 11, NOVEMBER2014.
Qian Chen ,Sherif Abdelwahed,A Model-based Approach to SelfProtection
in SCADA Systems,In 2011.
Cormac Herley and Dinei Florencio Microsoft Research, Redmond,How
To Login From an Internet Cafe Without Worrying About Keyloggers,2014.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology