Learn More
The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality(More)
The future mobile communication system will be distinguished by high integration of services, flexibility and higher throughput. Thus, the rapid growth in traffic volume and increase in new services has begun to change the configuration and structure of wireless networks. In the past, WiMAX has gained lot of interest for providing broadband communication.(More)
In recent days terrorism poses a threat to homeland security. The major problem faced in network analysis is to automatically identify the key player who can maximally influence other nodes in a large relational covert network. The existing centrality based and graph theoretic approach are more concerned about the network structure rather than the node(More)
In recent day's terrorism poses a threat to homeland security. It's highly motivated by the “net-war” where the extremist are organized in a network structure. The knowledge discovery process in network analysis has been done using supervised and unsupervised techniques which helps us to differentiate overt and covert nodes in a social(More)
Security is the biggest challenge in MANET. MANET presents various types of security attacks on data exchanges taking place between source and destination. In this misbehavior detection schemes for conventional wireless networks has opposed black hole attack and malicious node occur routing, this proposed technique as a great challenges in networks. In this(More)
This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-" voice over internet protocol (IP) "(More)
In this paper, the authors propose a naïve methodology, IBeH, for detecting the community structure of the covert network. Unlike most of the existing methods, IBeH, considers the roles, contribution metric and similarity of the actor profiles. The proposed method computes the reciprocating factor among the actors using the contribution metric rather(More)
The law enforcement analyst had a necessity for a new type of network analysis to understand the structure of the organization behind such brutal and well executed attacks so that experts could identify the involved key players. The network analysis which studies who is related to whom based on what relation called as Social Network Analysis (SNA) is(More)
The homeland security has become a very significant consideration for all the Governments throughout the world. To improve the OPerational SECurity (OPSEC), multi relational graphs were introduced for Covert Network Analysis (CNA). In this paper, proposed SpyNetMiner system identifies the key players who maximally influence the covert network. Abnormality(More)