Computing Other Research
Recent Submissions
-
Performance Comparison of Defense Mechanisms Against TCP SYN Flood DDoS Attack
(ICUMT, 2014)The TCP SYN DDoS attack and defense prevention mechanisms is studied. Each prevention mechanism has some exclusive pros and cons over the others. In this paper, we have compared various defence mechanisms for preventing ... -
Biologically Inspired Techniques for Data Mining: A Brief Overview of Particle Swarm Optimization for KDD. Alam
(Information Science Reference, 2014-02-02)Knowledge Discovery and Data (KDD) mining helps uncover hidden knowledge in huge amounts of data. However, recently, different researchers have questioned the capability of traditional KDD techniques to tackle the information ... -
Security of Wireless Devices using Biological-Inspired RF Fingerprinting Technique
(IGI Global, 2014-11-23)Radio Frequency (RF) fingerprinting is a security mechanism inspired by biological fingerprint identification systems. RF fingerprinting is proposed as a means of providing an additional layer of security for wireless ...