Volume 5 Number 1 June 2018

    
A Novel Approach to Measure the Quality of Cluster and Finding Intrusions Using Intrusion Unearthing and Probability Clomp Algorithm

Azhagiri. M

https://doi.org/10.6025/isej/2018/5/1/11-23

Abstract Objectives: Network security is used to monitor and prevent unauthorized access, deployment, enhancement, or contradiction of a network of computers. Network security is a primary issue in processing on the grounds that numerous assortments of assaults are expanding step by step. Despite the fact that, more number of research works were completed in the past for system security yet at the same time... Read More


Nested Tunnel: Information Security in Hybrid Cloud Computing

Dinesh Taneja, S S Tyagi

https://doi.org/10.6025/isej/2018/5/1/24-28

Abstract Virtual Private Network, VPN is communication channel between two networks and is used for network security between two networks. In this era of cloud computing, data is accessed from anywhere anytime. For security concerns, data is exposed while data is at rest and data is in motion. Data in motion is referred to data in transition as it is moved from a... Read More