Learn More
The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality(More)
Security is the biggest challenge in MANET. MANET presents various types of security attacks on data exchanges taking place between source and destination. In this misbehavior detection schemes for conventional wireless networks has opposed black hole attack and malicious node occur routing, this proposed technique as a great challenges in networks. In this(More)
The future mobile communication system will be distinguished by high integration of services, flexibility and higher throughput. Thus, the rapid growth in traffic volume and increase in new services has begun to change the configuration and structure of wireless networks. In the past, WiMAX has gained lot of interest for providing broadband communication.(More)
In recent days terrorism poses a threat to homeland security. The major problem faced in network analysis is to automatically identify the key player who can maximally influence other nodes in a large relational covert network. The existing centrality based and graph theoretic approach are more concerned about the network structure rather than the node(More)
In recent day's terrorism poses a threat to homeland security. It's highly motivated by the “net-war” where the extremist are organized in a network structure. The knowledge discovery process in network analysis has been done using supervised and unsupervised techniques which helps us to differentiate overt and covert nodes in a social(More)
This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-" voice over internet protocol (IP) "(More)
IEEE 802.11ac is the fifth generation in Wi-Fi networking standard which will be a boom to the next generation wireless networks. It will bring fast, high quality video streaming and nearly instantaneous data syncing and backup to notebooks, tablets and mobile phones that have become our everyday companions co-existing with the other legacy 802.11(More)
In this paper, the authors propose a naïve methodology, IBeH, for detecting the community structure of the covert network. Unlike most of the existing methods, IBeH, considers the roles, contribution metric and similarity of the actor profiles. The proposed method computes the reciprocating factor among the actors using the contribution metric rather(More)
The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality(More)