Loading...
  • Home
  • Search Results
59-60 of 4327 Papers

HOST-BASED INTRUSION DETECTION AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACKS

Published In: INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, COMMUNICATION AND NETWORKS
Author(s): HARMEET KAUR

Abstract: One of the greatest threats that network security faces nowadays is Distributed Denial of Service attacks. A newer version of the Denial of Service attack, also called Distributed Denial of Service attack or DDoS. In a distributed denialof- service (DDoS) attack, an attacker may use your computer to attack another computer. An attacker may attempt to: “flood” a network and thus reduce a legitimate user‟s bandwidth, prevent access to a service, or disrupt service to a specific system or a user. I

  • Publication Date: 03-Jun-2011
  • DOI: 10.15224/978-981-07-1847-3-1027
  • Views: 0
  • Downloads: 0

SECURITY ISSUE OF E-GOVERNANCE

Published In: INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, COMMUNICATION AND NETWORKS
Author(s): POOJA AGRAWAL , SURESH KASHYAP , VIKAS CHANDRA PANDEY , MINAKSHI AGRAWAL

Abstract: his is the age of information and technology. There are numerous opportunities for organizations to shape the future by providing efficient services and obtaining a competitive advantage for handling products and services. Egovernance refers to application of information technology tools in the administration to provide quick and transparency of information of programmes and policies of the governments to its citizens. The adoption of existing information technologies in the government administr

  • Publication Date: 03-Jun-2011
  • DOI: 10.15224/978-981-07-1847-3-1027
  • Views: 0
  • Downloads: 0