Volume 5 Number 1 March 2014

    
Javascript Defender: Malicious Javascript based Drive by Download Attack Analyzer and Defender

Ravi Kishore K, Mallesh M, Jyostna G, P R L Eswari, Samavedam Satyanadha Sarma

https://doi.org/

Abstract Now-a-days, most of the people are relying on internet for their day to day activities. Attackers are taking this high usage of internet as an advantage and trying to attack the users. Attackers are infecting the vulnerable web applications by injecting malicious code into its webpages. Whenever user browses the infected website knowingly or unknowingly, the malicious code is downloaded... Read More


Secure Two-Party Computation: Generic Approach and Exploiting Specific Properties of Functions Approach

A. Anasuya Threse Innocent, K. Sangeeta

https://doi.org/

Abstract Introduced by Yao in early 1980s, secure computation is being one among the major area of research interest among cryptologists. In three decades of its growth, secure computation which can be called as two-party computation, or multiparty computation depending on the number of parties involved has experienced vast diversities. Research has been carried out by exploiting specific properties of functionalities... Read More


Comparison of the Intelligent Techniques for Data Mining in Spam Detection to Computer Networks

Kelton Costa, Patricia Ribeiro, Atair Camargo, Victor Rossi, Henrique Martins, Miguel Neves, Ricardo Fabris, João Paulo Papa

https://doi.org/

Abstract Anomalies in computer networks has increased in the last decades and raised concern to create techniques to identify the unusual traffic patterns. This research aims to use data mining techniques in order to correctly identify these anomalies. Weka is a collection of machine learning algorithms for data mining tasks which was used to identify and analyze the anomalies of a... Read More