Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Meena, S.
- Identity Recognition in Network Security Using Laser Pumer Technology and Fingerprint
Abstract Views :199 |
PDF Views:7
Authors
Affiliations
1 M. Kumarasamy College of Engineering, Karur, Tamil Nadu, IN
1 M. Kumarasamy College of Engineering, Karur, Tamil Nadu, IN
Source
International Journal of Emerging Trends in Science & Technology, Vol 3, No 2 (2017), Pagination: 26-28Abstract
This research work focuses on the cyber crime for the illegal activities which is potentially large. To save the information the Laser Pumer technology is used. By using this involves the scanning process more than one for various eye patterns and fingerprint, permission can be given for access after recognition and restrict the access from intruders. The sensor device reads the fingerprints at any angle and it does not require power supply. The USB Port capability makes it truly plug-and-play and makes an easy access.Keywords
Cyber Crime, Finger Print, Laser Pumer.References
- G. Aaron, K. A. Bostik, E. Chung, and R. Rusmussen, “Protecting the web: Phishing, malware, and other security threats,” Proceeding of the 17th International Conference on World Wide Web 2008, WWW’08, Beijing, China, pp. 1253-1254, 2008.
- I. I. Amit, “The attack almanac,” Engineering and Technology, vol. 4 , no. 1, pp. 68-69, 2009.
- Z. Anwar, M. Montanari, A. Gutierrez, and R. H. Campbell, “Budget constrained optimal security hardening of control networks for critical cyber-infrastructures,” International Journal of Critical Infrastructure Protection, vol. 2, no. 1-2, pp. 13-25, 2009.
- Y. Ben-Itzhak, “Organised cybercrime and payment cards,” Card Technology Today, vol. 21, no. 2, pp. 10-11, 2009.
- J. S. Bhatia, R. Sehgal, B. Bhushan, and H. Kaur, “Multilayer cyber attack detection through honeynet,” Proceedings of New Technologies, Mobility and Security Conference and Workshops, NTMS’08, 5-7 November 2008.
- C. J. Blakeley, “Cybercrime law: International best practices,” Doha Information Security Conference, Doha, Qatar, 10-11 June 2008.
- D. M. Downs, I. Ademaj, and A. M. Schuck, “Internet security: Who is leaving the ‘virtual door’ open and why?,” First Monday, vol. 14, no. 1-5, 2009.
- D. Dwyer, “Chinese cyber-attack tools continue to evolve,” Network Security, vol. 2009, no. 4, pp. 9-11, 2009.
- N. Gilman, “Hacking goes pro,” Engineering and Technology, vol. 4, no. 3, pp. 26-29, 2009.
- A. Jenik, “Cyberwar in Estonia and the Middle East,” Network Security, vol. 2009, no. 4, pp. 4-6, 2009.
- J.-S. Kim, D.-G. Kim, and B.-N. Noh, “A fuzzy logic based expert system as a network forensics,” Proceedings of the 2004 IEEE International Conference on Fuzzy Systems, vol. 2, pp. 879-884, 25-29 July 2004.
- T. F. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. Neumann, and C. Jalali, “IDES: A progress report,” Proceedings of the 6th Annual Computer Security Applications Conference, 1990.
- S. F. Owens, and R. R. Levary, “An adaptive expert system approach for intrusion detection,” International Journal of Security and Networks, vol. 1, no. 3-4, pp. 206-217, 2006.
- A. Peiravi, and M. J. Rahimzadeh, “A novel scalable and storage-efficient architecture for high speed exact string matching,” ETRI Journal, vol. 31, no. 5, pp. 545-553, 2009.
- M. Qi, Y. Wang, and R. Xu, “Fighting cybercrime: Legislation in China,” International Journal of Electronic Security and Digital Forensics, vol. 2, no. 2, pp. 219-227, 2009.
- G. Rasche, E. Allwein, M. Moore, and B. Abbott, “Model-based cyber security,” Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer Based Systems, ECBS’07, pp. 405-412, 26-29 March 2007.
- B. Rodrigues, “The cyber-crime threat to online transactions,” Network Security, vol. 2009, no. 5, pp. 7-8, 2009.
- A. Yassir, and S. Nayak, “Cybercrime: A threat to network security,” International Journal of Computer Science and Network Security, vol. 12, no. 2, February 2012.
- A. Peiravi, and M. Peiravi, “Internet security - cyber crime paradox,” Journal of American Science, vol. 6, no. 1, pp. 15-24, 2010.
- S. Yadav, T. Shree, and Y. Arora, “Cyber crime and security,” International Journal of Scientific and Engineering Research, vol. 4, no. 8, pp. 856-861, August 2013.
- R. Moore, Cybercrime: Investigating High-Technology Computer Crime, Cleveland, Mississippi: Anderson Publishing, 2005.
- S. W. Brenner, Cybercrime: Criminal Threats from Cyberspace, ABC-CLIO, 2010.
- Enhancing the Graphical Password With Sound Signature
Abstract Views :137 |
PDF Views:0
Authors
Affiliations
1 Department of MCA, M. Kumarasamy College of Engineering, Karur, Tamil Nadu, IN
1 Department of MCA, M. Kumarasamy College of Engineering, Karur, Tamil Nadu, IN
Source
International Journal of Emerging Trends in Science & Technology, Vol 5, No 2 (2019), Pagination: 01-03Abstract
A graphical password system is based on cued click point. In this scheme contains a cued-recall graphical password technique. Users Click on one pixel per image for a sequence of images. The second image is based on the previous pixel. Compared with other graphical password methods performance and accuracy was very good in terms of speed. Users preferred pixel point to passed click Points. It is easy to remembering only one pixel for one image. Here each picture triggered their memory of where the corresponding pixel was located. Cued Click Point also provides higher security than Pass Points because it increases the workload for attackers.Keywords
Graphical password, Security, Sound signature.- Effective Web Data Presentation and Extraction Using XML Technologies
Abstract Views :286 |
PDF Views:0
Authors
Affiliations
1 Department of Master of Computer Applications, M. Kumarasamy College of Engineering, Karur, Tamil Nadu, IN
1 Department of Master of Computer Applications, M. Kumarasamy College of Engineering, Karur, Tamil Nadu, IN
Source
International Journal of Emerging Trends in Science & Technology, Vol 6, No 1 (2020), Pagination: 30-33Abstract
The SGML is not supporting in web browsers, to avoid this problem SGML content is converted into HTML. The biggest barrier is reuse, interchange and automation. Several computers are having the in unsupported formats. That is the case exchanging data between the two systems is the longest process for web developers. Most of the time a very wide amount of data must be lost due to unsupported file format. The XML is the highly efficient derived from SGML. The main goal of XML is to specifying SGML elements are supported in web browsers then it is easy to publish SGML content on the web.Keywords
DTD, HTML, SGM, XML, XSD, XSLT.References
- https://www.w3schools.com/xml/xml_whatis.asp
- https://www.tutorialspoint.com/xml/index.html
- https://www.w3schools.com/xml/xml_xlink.asp
- https://whatis.techtarget.com/definition/XML-Extensible -Markup-Language
- Controlling Personal Computer through Mobile Phones using Non Cellular Networks
Abstract Views :89 |
PDF Views:0
Authors
Affiliations
1 Department of MCA, M. Kumarasamy College of Engineering, Karur, Tamil Nadu, IN
1 Department of MCA, M. Kumarasamy College of Engineering, Karur, Tamil Nadu, IN
Source
International Journal of Emerging Trends in Science & Technology, Vol 6, No 2 (2020), Pagination: 42-44Abstract
This paper is titled as Controlling personal computer through Mobile phones using Non cellular Networks and its developed by using android progra-mming Android application that works smarter by controlling a personal computer with all the details. This application mainly used to connect the personal computer through wirelessly the performance of a personal computer with an android user phone. The application is made using Android. With the keypad, the user can type in any word processor and can launch any app. The app when installed and running on an android based phone shows the mouse settings screen to control mouse sensitivity. This application requires the data such that IP address, physical address and its corresponding protocols.Keywords
Android, Connection, IP Address, Wi-FiReferences
- J.-P. Espada, V. García-Díaz, R. G. Crespo, O. S. Martínez, B. C. P. G-Bustelo, and J. M. C. Lovelle, “Mobile web-based system for remote-controlled electronic devices and smart objects,” Mobile Networks and Applications, vol. 19, pp. 435-447, May 2014.
- M. A. Qadeer, R. Agrawal, A. Singhal, and M. S. Umar, “Application remote control using bluetooth (ARC),” 2008 4th IEEE/IFIP International Conference on Central Asia on Internet, Tashkent, Uzbekistan, Sep. 23-25, 2008.
- A. G. Villan, and J.-J. Estev, “Remote control of mobile devices in android platform,” IEEE Transactions on Mobile Computing, 2011.
- J. B. Chintalapati, and T. Y. S. Srinivasa Rao, “Remote computer access through android mobiles,” IJCSI International Journal of Computer Science Issues, vol. 9, issue 5, no. 3, pp. 363-369, Sep. 2012.
- Y. Yildirim, and I. Korpeoglu, “Pocketdrive: A system for mobile control of desktop PC and its applications using PDAs,” 2007 22nd International Symposium on Computer and Information Sciences, Ankara, Turkey, Nov. 7-9, 2007.
- B. Koo, T. Ahn, J. In, Y. Park, and T. Shon, “R-URC: RF4CD-based universal remote control framework using smartphone,” 2010 International Conference on Computational Science and its Applications, 2010, pp. 311-314.