Category Archives: JIS

Exploring the Effects of Gap-Penalties in Sequence-Alignment Approach to Polymorphic Virus Detection

Authors: Vijay Naidu, Jacqueline Whalley, Ajit Narayanan ABSTRACT Antiviral software systems (AVSs) have problems in identifying polymorphic variants of viruses without explicit signatures for such variants. Alignment-based techniques from bioinformatics may provide a novel way to generate signatures from consensuses … Continue reading

Posted in JIS | Leave a comment

Using the Analytical Hierarchy Process Model in the Prioritization of Information Assurance Defense In-Depth Measures?—A Quantitative Study

Author: Rodney Alexander ABSTRACT Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information … Continue reading

Posted in JIS | Leave a comment

Enhancing Mobile Cloud Computing Security Using Steganography

Author(s): Hassan Reza, Madhuri Sonawane ABSTRACT Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the … Continue reading

Posted in JIS | Tagged , , , , , , | 85 Comments

Enhancing Mobile Cloud Computing Security Using Steganography

Author(s): Hassan Reza, Madhuri Sonawane ABSTRACT Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the … Continue reading

Posted in JIS | Tagged , , , , , , | 1 Comment