Alert
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
Alert Correlation
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
Artificial Bee Colony
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
Attack
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
Attack Scenario
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
B
Botnet Detection
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
Botnet Lifecycle
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
C
Chaos Theory
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
Chaotic Maps
A chaos-based video watermarking algorithm [Volume 4, Issue 1, 2012, Pages 77-86]
Combination of Data Hiding and Cryptography
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
Command and Control Channel
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
Confidence
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
Confidence Estimation
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
Critical Degrees of Freedom
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
D
Difference Families
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
Digital Evidence
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
Digital Forensic Artifacts
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
Digital Forensics
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
Distinguishing Attacks
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
Double Random Phase Encoding (DRPE)
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
Encryption
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
F
Fractal Image Generation
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
G
Geometric Transformation
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
Graph
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
Graphic Design Applications
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
I
IDS
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
Internal State Transition
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
Intrusion
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
Intrusion Detection
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
Intrusion Detection System
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
J
Julia Set
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
L
Low-Density Parity-Check Codes
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
Mandolrot Set
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
Mobile Ad Hoc Network
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
Monte Carlo Integration
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
Multi _ Chi-square Test
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
N
Negative Selection
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
O
Online Clustering
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
Tagging Image CAPTCHA
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
Trivium
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
Trust
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
Trust Aggregation
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
Trust Interval
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
Trust Propagation
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
Two-Dimensional Coupled Logistic Map
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]