In the virtual and widely distributed network, the process of handover sensitive data from the distributor to the trusted third parties always occurs regularly in this modern world. It needs to safeguard the security and durability of service based on the Continue reading
Get Latest Final Year Computer Projects in your Email
Security Projects
Tapjacking Threats and Mitigation Techniques for Android Applications
With the increased dependency on web applications through mobile devices, malicious attack techniques have now shifted from traditional web applications running on Continue reading
Secure Fingerprint Verification based on Image Processing Segmentation using Computational Geometry Algorithms
In this paper, fingerprint segmentation for secure Internet verification purposes is investigated. The novel application of computational geometry algorithms in the fingerprint segmentation stage showed that the Continue reading
Design and Implementation of an Environment to Support Development of Methods for Security Assessment
There is no debate over the importance of IT security. Equally important is the research on security assessment; methods for evaluating the security of IT systems. The Swedish Defense Research Agency has for Continue reading
Modeling the Worm and Detection of the Camouflaging Worm
Active worms major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise Continue reading
Privacy-Invasive Software
As computers are increasingly more integrated into our daily lives we become more dependent on software. This situation is exploited by villainous actors on the Internet that distribute malicious software in search for fast financial gains on the expense of Continue reading
A Robust and Efficient Real Time Network Intrusion Detection System Using Artificial Neural Network In Data Mining
Today, intrusion detection is one of the major concern in the task of network administration and security. There is a need to safeguard the networks from known vulnerabilities and at the same time take steps to detect new and unseen, but possible, system abuses by Continue reading
A Java Based Network Intrusion Detection System
The number of hacking and intrusion incidents is increasing alarmingly each year as new technology rolls out. Unfortunately in today’s digitally connected world, there is no place to hide. DNS, NSlookup, Newsgroups, web site trawling, e-mail properties etc. are just some Continue reading
A Correlation-Based Fingerprint Verification System
In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this system directly uses the Continue reading
Java Card Security
Java Card is a new, but fast growing technology that enhances the world of smart cards with a whole set of exciting new possibilities. Until a few years ago all smart card manufacturers had their own Continue reading
A Fingerprint Verification System Based on Triangular Matching and Dynamic Time Warping
An effective fingerprint verification system is presented. It assumes that an existing reference fingerprint image must validate the identity of a person by means of a test Continue reading