Volume 6 Number 1 March 2015

    
Kullback-Leibler Divergence Based Detection of Repackaged Android Malware

Hossain Shahriar, Victor Clincy

https://doi.org/

Abstract Android applications are widely used by millions of users to perform many activities. Unfortunately, legitimate and popular applications are targeted by malware authors and they repackage the existing applications by injecting additional code intended to perform malicious activities without the knowledge of end users. Thus, it is important to validate applications for possible repackaging before their installation to safeguard end users. This... Read More


Public Auditability and Privacy preserving in Cloud Storage

Kishan Lathkar, Ambulgekar H. P

https://doi.org/

Abstract Cloud computing is a revolutionary new approach to how computing services are produced and consumed. It is a concept of sharing resources and giving them as essential resources. Using cloud computing resources, data, computations, and services can be shared over scalable network of nodes; these nodes may represent the datacenters, cloud users and web services. On the same note cloud storage talk... Read More


A Novel Robust Watermarking Scheme using Cubic Product Codes

Atta Rahman, Neelam Saba, Noor-ul Ain

https://doi.org/

Abstract In this paper, a novel technique for robust digital image watermarking is proposed using cubic product codes (CPC). Cubic product codes are three dimensional product codes where the constituent codes in each dimension are linear block codes. The structure of CPC makes them suitable for the proposed scheme. The embedded watermark is vulnerable to various attacks on the image like compression, noise and... Read More


Applying Hopfield Artificial Network and Simulating Annealing for Cloud Intrusion Detection

Bashair Al-Shdaifat, Wafa’ Slaibi Alsharafat, Mohmmad el-bashir

https://doi.org/

Abstract Recently, Cloud Computing is a new paradigm trend in network environments that handles and manages a vast number of users by sharing services and data, for achieving this mission; safety and security of shared services and data are the main concerns for this type of environment. Intrusion Detection is an effective technique used to deal with security violations in such environment. Here, an... Read More