Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Network Security"

ADD TO MY LIST
 
Security issues in e-learning platforms

Author(s): Defta (Ciobanu) Costinela – Luminita
Discriminant Analysis based Feature Selection in KDD Intrusion Dataset

Author(s): Dr.S.Siva Sathya | Dr. R.Geetha Ramani | K.Sivaselvi
Multilevel Security for Integrated Financial Mobile Web Services using Federated ESB

Author(s): Dr. S. Britto R.Kumar | Dr. S. Albert Rabara
Mechanisms for Security and Authentication of WiFi devices

Author(s): Gajraj Singh | Dr. P.K. Yadav
Dynamic Video Conferencing with Fully Secured Encryption Algorithms

Author(s): Y.V. Srinivasa Murthy | Dr. S. C. Satapathy | Ch Rajesh | P Tejnadh Reddy
Stream Data Mining and Anomaly Detection

Author(s): Mohammadjafar Esmaeili | Arwa Almadan
Intrusion Detection System for Ad hoc Mobile Networks

Author(s): Muhammad Nawaz Khan | Muhammad Ilyas Khatak | Muhammad Faisal
Securing OLSR and STAR Routing Protocols Against Packet Dropping by Malicious Nodes

Author(s): Harish Shakywar | Sanjeev Sharma | Santoh Sahu
DNA Computing based Elliptic Curve Cryptography

Author(s): P. Vijayakumar | V. Vijayalakshmi | G. Zayaraz
Security Agents: A Mobile Agent Based Trust Model for Cloud Computing

Author(s): Priyank Singh Hada | Ranjita Singh | Mukul Manmohan
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator

Author(s): H. A. Esmail | M. R. Khalili Shoj | Hossein gharaee
A Comparison of Trojan Virus Behavior in Linux and Windows Operating System

Author(s): Ghossoon. M. W. Al-Saadoon | Hilal M.Y. Al-Bayatt
A Dynamic Approach for Anomaly Detection in AODV

Author(s): P.VIGNESHWARAN | R. DHANASEKARAN
Security threats in Wireless Sensor Networks

Author(s): Sona Malhotra | Rahul Kadian
SECURITY ISSUES IN COMPUTER NETWORK ARCHITECTURE

Author(s): Dr. M. Lilly Florence
Cloud Computing

Author(s): Rahul Pareek
An Application of Face Recognition System using Image Processing and Neural Networks

Author(s): Rakesh Rathi | Manish Choudhary | Bhuwan Chandra
Security Enhancement in Dynamic Telecast Routing

Author(s): Dr. GVN Prasad | M.Senthilkumar
Cloud Computing Security Issues and Challenges

Author(s): Kuyoro 'Shade O., Ibikunle Frank, Awodele Oludele
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks

Author(s): Manal AL-Bzoor, Laiali Almazaydeh, Syed S Rizvi
Maintenance of Network Connectivity Across Process Migration

Author(s): Mehdi Bahrbegi, Hadi Bahrbegi, Amir Azimi Alasti Ahrabi & Elnaz Safarzadeh
Detection of Botnets using Honeypots and P2P Botnets

Author(s): Rajab Challoo & Raghavendra Kotapalli
Dynamic Audio-Visual Client Recognition modelling

Author(s): Tijjani Adam Shuwa, U. Hashim
STUDY OF ELECTRONIC MUNICIPALITY’S ESTABLISHMENT AND DEVELOPMENTS PLATFORMS IN ZAHEDAN WITH THE BENCHMARKING

Author(s): Noormohammad Yaghobi | Habiballah Salarzehi | Mokhtar Shahraki
Wireless Sensor Network Safety Study

Author(s): M.Shankar | Dr.M.Sridar | Dr.M.Rajani
Effective Security Architecture for Virtualized Data Center Networks

Author(s): Udeze Chidiebele. C | Prof. H. C Inyiama | Okafor Kennedy .C | Dr C. C. Okezie
Integrated Device Control System using Google Maps

Author(s): Takahiro KOITA | Kenta UEDA | Kenya SATO
A P2P Approach for Efficient Certificate Revocation in MANET

Author(s): Suresh Babu Tumula | K.R.R.Mohana Rao
Intrusion Detection Systems in Wireless Sensor Networks

Author(s): Vijay Kumar Mallarapu | K.V.D.Sagar
Diameter-based Protocol in the IP Multimedia Subsystem

Author(s): Vinay Kumar.S.B | Manjula N Harihar
Black Hole Detection in MANET Using AODV Routing Protocol

Author(s): Govind Sharma | Manish Gupta
On-board Unit and its Possibilities of Communications on Safety and Security Principles

Author(s): Martin Vaculik | Maria Franekova | Peter Vestenicky | Martin Vestenicky
IT Security Aspects of Industrial Control Systems

Author(s): Peter Holecko | Izabela Krbilova
Enhancing Security Measures by Tunnelling Protocol in Distributed Grid Network

Author(s): T. Mohan Raj | S. Shahul Hammed | Amala Deepan
Secured Approach to Routing in Mobile Ad Hoc Networks

Author(s): Rajdeep Singh | Vaishali Gupta
Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network

Author(s): Andrea Caiti | Vincenzo Calabrò | Gianluca Dini | Angelica Lo Duca | Andrea Munafò
Review Of Syn-Flooding Attack Detection Mechanism

Author(s): Mehdi Ebady Manna | Angela Amphawan
Cyber Threats In Social Networking Websites

Author(s): Wajeb Ghari | Maha Shaabi
Optimizing One Fair Document Exchange Protocol

Author(s): Abdullah M. Alaraj
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots

Author(s): K.Munivara Prasad | A.Rama Mohan Reddy | V Jyothsna
Protected Data Objects Replication in Data Grid

Author(s): G. Aruna Kranthi | D. Shashi Rekha
Efficient & Secure Data Hiding Using Secret Reference Matrix

Author(s): Laxman Tawade | Rajshree Mahajan | Chandan Kulthe
Risks and Remedies in E-Learning System

Author(s): Nikhilesh Barik | Sunil Karforma
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks

Author(s): Sridhar Subramanian | Baskaran Ramachandran
A Security Suite for Wireless Body Area Networks

Author(s): Raghav V. Sampangi | Saurabh Dey | Shalini R. Urs | Srinivas Sampalli
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine

Author(s): Besma Othmani | Mohsen Machhout | Houcine Mejri | Hafedh Belmabrouk | Rached Tourki
A Survey on Virtualization of Wireless Sensor Networks

Author(s): Md. Motaharul Islam | Mohammad Mehedi Hassan | Ga-Won Lee | Eui-Nam Huh
SECURING WMN USING HONEYPOT TECHNIQUE

Author(s): Priyanka Gupta | Paramjeet Rawat | Suraj Malik | Sudhanshu Gupta
Preventive Maintenance of Railway Tracks: Ballast Performance Anticipation in the Cameroon Railway

Author(s): Lezin Seba Minsili | Madja Doumbaye Jérémie | Grace L. Tsebo Simo | Christiane Simo
Inverted Pattern in Inverted Time Domain for Icon Steganography

Author(s): Rengarajan Amirtharajan | John Bosco Balaguru Rayappan
The EXOR Gate Under Uncertainty: A Case Study

Author(s): Svetlana N. Yanushkevich | An Hong Tran | Golam Tangim | Vladimir P. Shmerko | Elena N. Zaitseva | Vitaly Levashenko
Efficient Hand off using Fuzzy and Simulated Annealing

Author(s): Vikas.M.N | Keshava.K.N | Prabhas.R.K | Hameem Shanavas.I
CSRF Vulnerabilities and Defensive Techniques

Author(s): Rupali D. Kombade | B.B. Meshram
Enhancing Hash Function Selection Techniques Based on Message Contents

Author(s): Ali Saeed | Muhammad Khalil Shahid
Application of Erlang Formulae in Next Generation Networks

Author(s): Erik Chromy | Tibor Misuth | Adam Weber
Evolution of Home Automation Technology

Author(s): Mohd. Rihan | M. Salim Beg
DIFFERENT SECURITY MECHANISMS FOR DIFFERENT TYPE OF SECURITY LAPSES IN WMN- A REVIEW

Author(s): Narender Singh | Kuldeep Vats | Jasvinder | Lovish Jaiswal
Hash Security for Ad hoc Routing

Author(s): Ashwani Kush | C. Hwang
A Micro-Mobility Management Scheme for Handover and Roaming

Author(s): Debabala Swain | Siba Prasada Panigrahi | Prasanta Kumar Patra
New Proposed Classic Cluster Layer Architecture for Mobile Adhoc Network (cclam)

Author(s): Kuldeep Sharma | Nikhil Khandelwal | Sanjeev Kumar Singh
UNAPPROVED ACCESS POINT ELIMINATION IN WLAN USING MULTIPLE AGENTS AND SKEW INTERVALS

Author(s): Prof.S.B.Vanjale | J.A.Dave | Prof.P.B.Mane
Secure Cooperative Spectrum Sensing based on the Distance between Bodies of Evidence

Author(s): Xiwen Tang | Yingguan Wang | Yi Wang | Yanjun Hu
Desempeño de la calidad del servicio (QoS) sobre IPv6

Author(s): Octavio José Salcedo Parra | Danilo López | Ángela Patricia Ríos
A Survey on Cross Layer Security

Author(s): Sandeep Sharma | Rajesh Mishra | Karan Singh
Security issues in Cloud Computing

Author(s): Kalyani D. Kadam | Sonia K. Gajre | R. L. Paikrao
Generic Network Intrusion Prevention System

Author(s): Kamini Nalavade | B.B.Meshram
Botnet-A Network Threat

Author(s): Sonal P.Patil | Swatantra Kumar
Desing and Implementation of Distributed Security using Onion Routing

Author(s): Ashish T. Bhole | Savita H. Lambole
Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS

Author(s): Prasad Patil | Rinku Shah | Kajal Jewani
Security Enhancement Algorithms for Data Transmission for Next Generation Networks

Author(s): Vikas Kaul | S K Narayankhedkar | S Achrekar | S Agarwal
Undergraduate Program in Network Engineering and Security – A Feasibility Study

Author(s): Fahed Awad | Omar Banimelhem | Eyad Taqieddin | Raed Bani-Hani
An Approach for Secure Data Transmission in Private Cloud

Author(s): Anurag Porwal | Rohit Maheshwari | B.L.Pal | Gaurav Kakhani
A New Security Protocol for Mobile Ad Hoc Networks

Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha
Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3

Author(s): Nidhi Purohit | Richa Sinha | Hiteishi Diwanji
Analysis of Secure Mobile Agent System

Author(s): Rajesh Shrivastava | Pooja Mehta (Gahoi)
Save time & money - Smart Internet Solutions      Why do you need a reservation system?