Accepted Papers

  • Automatic Detection For Online Games Bot With App
    Chin-Ling Chen1 , Chang-Cheng Ku2 ,Yong-Yuan Deng3 and Woei -Jiunn Tsau4, 1,2,3Department of Computer Science Information Engineering Chaoyang University of Technology,Taiwan, 4 Computer Center National Taipei,University, Taiwan,
    ABSTRACT

    With the popularity of online games continues to grow, the degree of risk is increasing. Attack usually may use various means to defraud the players to get the player's virtual property or personal data. Currently robot online game plug detection has many ways. But the related studies are still unable to make a truly effective and comprehensive prevention mechanism. Especially the criminal behavior for online games still cannot effectively curb, mainly due to share with other players account, using illegal plugin spread viruses, Trojans, exploit security vulnerabilities game or other malicious virtual property illegally acquired players. We proposed a new way to scanning and resist bot, we developed an APP to scan and detect bot, The APP will scan and detect application, the plug-in filter out and the bot will be shut down. The proposed method can delete effectively the online game bot..

  • Hybrid Knapsack Publick Keycryptographic-Steganography System
    Dr.Eng. Saad M. Khalifa and M.Sc.Eng. Tamara Saad , Alturath Colledge University, M.Sc.Eng. Tamara Saad .Baghdad-Iraq.
    ABSTRACT

    In this system we made a combination between a cryptography and steganographic we use the technique which is called least significant bit (LSB). A cryptographic system which we used it is a knapsack public key crypto system "[8]. First we used the cryptographic system to generate the ciphertext and second is the steganography which is embedded the ciphertext in it . In this paper we gave explanation of this hybrid system and gave a computer example to represent the system .In this case we strengthen the knapsack system by the steganography system.

  • Towards An Assessment Of Cloud E-Health Project Risk: An Empirical Study
    Bouchaib Bahli1 ,Ryerson University, Canada
    ABSTRACT

    The introduction of information technology and telecommunications (ITC) in the health care sector has brought so many benefits to the health operators, managers, and patients. However, the increasing use and the application of ITC to the management and delivery of health care well known as e-health has been associated with several e-health risks that need to be examined. In this paper we point out several shortcomings of current risk conceptualization and operationalization, particularly they do not address the integration of a variety of risk components, which are crucial for capturing the essence of e-health risks. To fill this gap and drawing on risk analysis perspective we present and discuss a formal framework for e-health cloud computing project risks that captures potential scenarios, their likelihood and, the associated negative consequences. E-health risks were identified in the literature and a cluster analysis was used to classify different risks into several risk domains according to the developed e-health risk framework. Results show several domains including privacy, security, safety, liability, operational, project and business e-health risks. Implications for researchers and managers are also discussed.