A
-
A5/1
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
-
Alert
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
-
Alert Correlation
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
-
Artificial Bee Colony
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
-
Attack
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
-
Attack Scenario
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
B
-
Botnet Detection
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
-
Botnet Lifecycle
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
C
-
Chaos Theory
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
-
Chaotic Maps
A chaos-based video watermarking algorithm [Volume 4, Issue 1, 2012, Pages 77-86]
-
Combination of Data Hiding and Cryptography
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
-
Command and Control Channel
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
-
Confidence
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
-
Confidence Estimation
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
-
Correlation Matrix
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
-
Critical Degrees of Freedom
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
D
-
Difference Families
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
-
Digital Evidence
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
-
Digital Forensic Artifacts
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
-
Digital Forensics
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
-
Distinguishing Attacks
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
-
Double Random Phase Encoding (DRPE)
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
E
-
Eigenvalues Analysis
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
-
Encryption
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
F
-
Fractal Image Generation
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
G
-
Geometric Transformation
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
-
Graph
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
-
Graphic Design Applications
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]
I
-
IDS
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
-
Internal State Transition
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
-
Intrusion
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
-
Intrusion Detection
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
-
Intrusion Detection System
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]
J
-
Julia Set
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
L
-
Low-Density Parity-Check Codes
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
-
LSB Embedding
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
M
-
Mandolrot Set
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
-
Mobile Ad Hoc Network
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
-
Monte Carlo Integration
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
-
Multi _ Chi-square Test
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
N
-
Negative Selection
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
O
-
Online Clustering
BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]
P
-
Precomputed Table
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
-
Privacy Preserving
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
-
Private Key Search
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
Q
-
Query on Encrypted Data
Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]
R
-
Random Guessing
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
-
Rao-Nam Secret Key Cryptosystem
Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]
-
Rate Estimation
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
-
Routing Attack
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]
S
-
Security
A chaos-based video watermarking algorithm [Volume 4, Issue 1, 2012, Pages 77-86]
-
SEIMCHA
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
-
Semantic Image CAPTCHA
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
-
Steganalysis
Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]
T
-
Tagging Image CAPTCHA
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
-
Trivium
On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]
-
Trust
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
-
Trust Aggregation
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
-
Trust Interval
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
-
Trust Propagation
A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]
-
Two-Dimensional Coupled Logistic Map
Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]
U
-
Ultimately Periodic
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]
-
Upright Orientation
SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]
-
Useless States
Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]