Volume 5 Number 3 September 2014

    
Boosting Authentication Security by Building Strong Password and Individualizing Easy to Remember Techniques

Nooruldeen Qader

https://doi.org/

Abstract Newly released researches disclose the need of canceling the incorrect opinion; security by Password (PW) is dead and proves that these believe has been actually hurtful. And recommended a campaign prioritize strategies of building PW. Considering the PW features such as costless, maturity and vast experiences, and usability PW continues to be the most used options in information security... Read More


Preventive and Detective Mechanism for Forensic Readiness Secure Network Architecture for WBAN

Abdul Fuad Abdul Rahman, Madihah Zulfa Mohamad, Rabiah Ahmad

https://doi.org/

Abstract Wireless Body Area Network (WBAN) was developed based on Bodynet which enables sensor nodes that is utilized to monitor any bodily part and body motion through wireless network. The idea is to extend wired sensor node connectivity to wireless, to provide the ability for healthcare professionals to monitor patients remotely. To date, since WBAN requires it to be a low... Read More


Low Rate TCP Shrew Attacks: Threats and Solutions

Heshem A. El Zouka

https://doi.org/

Abstract On the global Internet, the main function of TCP is to provide a reliable byte stream process to process communication. Today, TCP is the most widespread protocol used for exchanging data in the Internet and almost responsible for more than 90 percent of the world’s total data traffic on the Internet. Despite its widespread usage, many of the TCP protocols... Read More


EPlag: A Two Layer Source Code Plagiarism Detection System

Omer Ajmal, M. M. Saad Missen, Tazeen Hashmat, M. Moosa, Tenvir Ali

https://doi.org/

Abstract In academic environments where students are partly evaluated on the assignments, it is necessary to discourage the practice of copying assignments of other students. The detection of plagiarism in code from large source code repositories, manual detection is fairly complex, if not impossible. Therefore, for fair evaluation there must be a fast, efficient and automated/ semi-automated way to detect the assignments... Read More