SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The International Conference on Computer Security and Digital Investigation (ComSec2014)
-
Using Genetic Algorithm to Supporting Artificial Neural Network for Intrusion Detection System
Due to the recent trend of technologies to use the network based systems, detecting them from threats become a crucial issue. This paper investigates applying the following methods to detect the ...Authors: Amin Dastanpour, Suhaimi Ibrahim, Reza Mashinchi
Year Published: Mar. 2014 | 1-13 | ComSec2014 -
A Game Theory Based Approach to the Generation of Optimal DDoS Defending Strategy
With the growing threat of DDoS attacks, new attack-ing mechanisms emerge every day. In order to confront the ever-evolving DDoS attacks, it is insufficient to select defending strategy merely from ...Authors: Liang Huang, Dengguo Feng, Yifeng Lian, Yingjun Zhang, Yuling Liu
Year Published: Mar. 2014 | 14-20 | ComSec2014 -
Cyber Security of Smart Grid Systems Using Intrusion Detection Methods
The wide area monitoring of power systems is implemented at a central control center to coordinate the actions of local controllers. Phasor measurement units (PMUs) are used for the collection of ...Authors: Ata Arvani, Vittal S. Rao
Year Published: Mar. 2014 | 21-28 | ComSec2014 -
CC-Case Based on System Development Life-Cycle Process
Secure system design faces many risks such as information leakage and denial of service. We propose a method named CC-Case to describe security assurance cases based on the security structures and ...Authors: Tomoko Kaneko, Shuichiro Yamamoto, Hidehiko Tanaka
Year Published: Mar. 2014 | 29-35 | ComSec2014 -
Novel Performance Enhancement of University's Network Exploiting Cisco Network Design Model: Study Case on IUKL Network
Designing a campus university network or any type of network by improving the performance, security, scalability, manageability is something all the designer desperately attempts to achieve. The very ...Authors: Yaser Miaji, Mufind Mukaz Ebedon
Year Published: Mar. 2014 | 36-41 | ComSec2014