International Journal of Information Technology Infrastructure
Latest Publications


TOTAL DOCUMENTS

6
(FIVE YEARS 6)

H-INDEX

0
(FIVE YEARS 0)

Published By The World Academy Of Research In Science And Engineering

2320-2629

The malicious code detection is critical task for in the field of security. The malicious code detection can be possibly by using convolutional neural network (CNN).Themalicious code can be categorized in to different families. The malicious code identification helps to identify the affected malware on the system. Malicious code theft data from our system and it yields high security issues in real time. The neural network architecture classifies the malicious code based on the collected dataset. The dataset contains different families of malicious code. The malicious code detection can be done with the help of model created from CNN architecture


Password Management System is used for file protection and encryption file process can be done in computer application especially through the cloud computing environment. This approach has been adapted or implemented in various managements to secure application incomputing. This system functions to help the applicationcomputing users to protect information using priority password without having difficulty. The system had done for protection system information process. An activation to encrypt files to increase the best and systematic services to the organization management in application computing. After all, the result was reached the goals that punctual the file protection to encrypt file through cloud computing environment.


Two factor authentications had two entry levels for authentication’s mechanism. This study had used Short Messaging Service (SMS) technology as a second factor in doing authentication on the web application. It can minimize the problems that occur regarding to the illegal access over the user privacy information on the Internet. The system that uses two factor authentications is capable to give the priority and safety in aspect of user’s privacy information from the web based applications


Sign in / Sign up

Export Citation Format

Share Document