@incollection{, FD34BDD8C418BB40ABC674357980B8A3 , author={{Dr. AshokKoujalagi} and {Bagalkot Rani Channamma University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}184111 } @incollection{b0, , title={{Utility Function Security in Artificially Intelegent Agent}} , author={{ RVYampolskiy }} 10.1080/0952813X.2014.895114 , journal={{Journal of Experimental & Theoretical Artificial Intelligence. Sep2014}} 26 17 , year={2014} } @incollection{b1, , title={{An Intelligent Approach Based on Neuro Fuzzy Detachment Scheme for Preventing, Jamming Attack in Wireless Networks}} , author={{ SRRatna } and { RRavi } and { BShekhar }} 10.3233/IFS-141363 , journal={{Journal of Intelligent & Fuzzy Systems}} 28 12 , year={2015. 2015} } @book{b2, , title={{Instantiated first order Qualitative Choice Logic for an efficient handling of alerts correlation. Intelligent Data Analysis}} , author={{ BLBouzar } and { TTBouabana } and { SBenferhat }} 10.3233/IDA-140693 , year={2015. 2015} 19 25 } @incollection{b3, , title={{Development of Information and management System for laboratory based on Open Source Licensed Software with Security Logs Extension}} , author={{ PBlazek } and { KKuca } and { DJun } and { OKrejcar }} 10.3233/JIFS-169145 , journal={{Journal of Intelligent & Fuzzy Systems}} 32 12 , year={2017. 2017} } @incollection{b4, , title={{Endpoint Firewall for Local Hardening in Academic Research Environment}} , author={{ VSobeslav } and { LBalik } and { OHornig } and { JosefHoralek } and { OKrejcar }} 10.3233/JIFS-169143 , journal={{Journal of Intelligent & Fuzzy Systems}} 32 10 , year={2017. 2017} } @book{b5, , title={{Computer Network}} } @book{b6, , title={{Computer Security Principles and Practice}} , author={{ WStallings } and { LBrown }} Second. 2012 } @incollection{b7, , title={{Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information}} , author={{ CAnderson } and { RLBaskerville } and { MKaul }} , journal={{Journal of Management Information Systems}} 34 , year={2017. 2017} } @incollection{b8, , title={{}} , journal={{Issue}} 4 1 , note={31p. 4 Diagrams, 2 Charts} } @book{b9, , title={{}} 10.1080/07421222.2017.1394063 } @incollection{b10, , title={{Security Management Benefit at Work in Monitoring Individual Protection Equipment (IPE) and Collective Security Systems (CSS), Procedures and Methods in Industry Construction}} , author={{ DeSouza } and { CS PDa Silva } and { SJose } and { A }} , journal={{Business Management Dynamics}} 6 8 , year={2017. Jan 2017} } @incollection{b11, , title={{Endpoint Firewall for Local Security Hardening in Academic Research Environment}} , author={{ VSobeslav } and { LBalik } and { OHornig } and { JHoralek } and { OKrejcar }} 10.3233/JIFS-1691 , journal={{Journal of Intelligent & Fuzzy Systems}} 32 10 , year={2017. 2017} } @incollection{b12, , title={{Cyber security Tips to Keep Your Firm Safe}} , author={{ NYrvina }} , journal={{Journal of Financial Planning}} 30 , year={2017. Jan 2017} } @incollection{b13, , title={{Secure and Efficient Anonymization of Distributed Confidential Databases}} , author={{ JHerranz } and { JNin }} 10.1007/s10207-014-0237-x , journal={{International Journal of Information Security}} 13 16 , year={2014. Nov2014} } @incollection{b14, , title={{A Severity -Based Quantification of Data Leakages in Database Systems}} , author={{ SVavilis } and { MPetkovic } and { NZannone }} 10.3233/JCS-160543 , journal={{Journal of Computer Security}} 24 25 , year={2016. 2016} } @incollection{b15, , title={{Security and Searchability in Secret Sharing-Based Data Outsourcing}} , author={{ MHadavi } and { RasoolJalili } and { EDamiani } and { SCimato }} DOI: 10.1007/s 10207-015-0277-x , journal={{International Journal of Information Security. Nov2015}} 14 17 , year={2015} } @book{b16, , author={{ IChaniotis } and { KIKyriakou } and { NTselikas }} 10.1007/s00607-014-0394-9 , title={{is Node. Js a Visible Option for Building Modern Web Applications? A Performance Evaluation Study. Computing. Oct2015}} , year={2015} 97 }