Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CVSS Based Approach
Journal Title: International Research Journal of Computer Science - Year 2017, Vol 0, Issue 0
Abstract
This paper analysis vulnerability of known attacks on WLAN cipher suite, authentication mechanisms and credentials using common vulnerability scoring system (CVSS).
Authors and Affiliations
David Gitonga Mwathi, William Okelo-Odongo, Elisha Opiyo
Block Based Algorithms for Estimating Motion
In this paper we are discussing about ME in video compression that to specifically about the algorithms used for it. Here we can see the different types of BMA which are implemented and compared, which includes from some...
Design and Implementation of Lecturer Evaluation System Using ELECTRE Method in Web-based Application
In order to improve the performance of human resources (in this case is a lecturer) at the Faculty of Computer Science University of Mercu has conducted a lecturer's performance evaluation at the end of each semesterBuan...
ANALYSIS ON THE QUALITY OF THREE-PHASE TRANSFORMER OIL
Tangent delta is an electrical diagnostic method to determine the condition of the insulation. One of the insulation to know is transformer oil being a liquid insulation. In a transformer, insulation is an important part...
A MECHANISM FOR PREVENTING DUPLICATE FILES IN CLOUD
cloud computing provides a way of storing a voluminous data and can be easily accessed anywhere. This work deals about the prevention of a duplicate file storage in cloud. Here there are three important components in our...
The False Positive Alert Reduction Using Data mining Techniques in Intrusion Detection System
Information security is a vital aspect of any organization. Most of the organizations relay and trust on the intrusion Detection System (IDS) which play important role in detecting intrusions in data network environment....