Detecting Phishing Using Machine Learning IJTSRD
Phishing is a social engineering Technique which they main aim is to target the user Information like user id, password, credit card information and so on. Which result a financial loss to the user. Detecting Phishing is the one of the challenge problem that relay to human vulnerabilities. This paper proposed the Detecting Phishing Web […]
REST based API IJTSRD
Simple Object Access Protocol (SOAP) and Representational State Transfer (REST) are two answers to the same question: how to access Web services. The choice initially may seem easy, but at times it can be surprisingly difficult. SOAP is a standards-based Web services access protocol that has been around for a while and enjoys all of […]
A Game Based Graphical Password Authentication System to Prevent Shoulder-Surfing IJTSRD
In order to prevent intruders from looking into sensitive data in smartphones users will have their own security measures, but those security measures are traditionally available measures one among them is finger based pattern doodling which became quite popular among users, also studies show that it is easy to remember and use than alphanumeric text […]
An Identity-Based Mutual Authentication with Key Agreement IJTSRD
Now days mobile networks are rapid development by performing the e-commerce transaction such as online shopping, internet banking and e- payment. So that to provide secure communication, authentication and key agreement is important issue in the mobile networks. Hence, schemes for authentication and key agreement have been studied widely. So that to provide efficient and […]
Survey on Identification of Hacker by Trapping Mechanism IJTSRD
Advanced persistence threat (APT) attack is to steal data rather than to cause damage to the network or organization. It is one of the initial phases in successful hacking of a system. Here, user’s behaviour is analysed based on previous behaviour such as posted data, time of posting, IP address and location of usage of […]