Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 19
Page No. 3846 - 3851

Stream Life Estimation Based on the End Point Elimination Technique to Restrict Client Side Script for Secure Computing

Authors : P. Malathi and P. Vivekanandan

References

Akinyelu, A.A. and A.O. Adewumi, 2014. Classification of phishing email using random forest machine learning technique. J. Appl. Math., Vol. 2014,

Chung, C.J., P. Khatkar, T. Xing, J. Lee and D. Huang, 2013. NICE: Network intrusion detection and countermeasure selection in virtual network systems. IEEE. Trans. Dependable Secure Comput., 10: 198-211.
CrossRef  |  Direct Link  |  

Dunning, L.A. and R. Kresman, 2013. Privacy preserving data sharing with anonymous ID assignment. Inf. Forensics Secur. IEEE. Trans., 8: 402-413.
CrossRef  |  Direct Link  |  

Gurses, S. and C. Diaz, 2013. Two tales of privacy in online social networks. IEEE. Secur. Privacy, 11: 29-37.
CrossRef  |  Direct Link  |  

Islam, R. and J. Abawajy, 2013. A multi-tier phishing detection and filtering approach. J. Network Comput. Appl., 36: 324-335.
CrossRef  |  

Kirda, E. and C. Kruegel, 2005. Protecting users against phishing attacks with antiphish. Proceedings of the 29th Annual International Conference on Computer Software and Applications (COMPSAC'05), July 26-28, 2005, IEEE, Vienna, Austria, ISBN: 0-7695-2413-3, pp: 517-524.

Layton, R., P. Watters and R. Dazeley, 2010. Automatically determining phishing campaigns using the uscap methodology. Proceedings of the Conference on ECrime Researchers Summit (eCrime), October 18-20, 2010, IEEE, Ballarat, Australia, ISBN: 978-1-4244-7760-9, pp: 1-8.

Lee, S. and J. Kim, 2013. Warningbird: A near real-time detection system for suspicious urls in twitter stream. Dependable Secure Comput. IEEE. Trans., 10: 183-195.
CrossRef  |  Direct Link  |  

Singh, I., M. Butkiewicz, H.V. Madhyastha, S.V. Krishnamurthy and S. Addepalli, 2013. Twitsper: Tweeting privately. IEEE. Secur. Privacy, 11: 46-50.
Direct Link  |  

Singh, N.H. and A. Kayalvizhi, 2013. Combining cryptographic primitives to prevent jamming attacks in wireless networks. Proceedings of the 2013 International Conference on Information Communication and Embedded Systems (ICICES), February 21-22, 2013, IEEE, India, ISBN: 978-1-4673-5786-9, pp: 251-255.

Yagan, O. and A.M. Makowski, 2013. Modeling the pairwise key predistribution scheme in the presence of unreliable links. IEEE. Trans. Inf. Theor., 59: 1740-1760.
CrossRef  |  Direct Link  |  

Zhang, H., G. Liu, T.W.S. Chow and W. Liu, 2011. Textual and visual content-based anti-phishing: A bayesian approach. IEEE Trans. Neural Networks, 22: 1532-1546.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved