Secured Distance Vector Routing 'SDVR' Protocol for Mobile Adhoc Networks
Author(s): Dr. S. Santhosh Baboo | S. Ramesh

Discriminant Analysis based Feature Selection in KDD Intrusion Dataset
Author(s): Dr.S.Siva Sathya | Dr. R.Geetha Ramani | K.Sivaselvi

"Temperature Prediction based on Artificial Neural Network and its Impact on Rice Production, Case Study: Bangladesh"
Author(s): Tushar Kanti Routh | Md. Monsurul Huda

Multilevel Security for Integrated Financial Mobile Web Services using Federated ESB
Author(s): Dr. S. Britto R.Kumar | Dr. S. Albert Rabara

An Efficient and Secured AOMDV Routing Protocol with Shamir's Secret Sharing Scheme
Author(s): Lt.Dr. S. Santhosh Baboo | C. Chandrasekar

Performance Analysis of Signaling Cost on EapTls Authentication Protocol Based on Cryptography
Author(s): R.Narmadha | Dr.S.Malarkan | Dr.C.Ramesh

Detecting Network Anomalies using IP Gray Space Analysis and Preventing from it by using Machine Identification Code
Author(s): Sandip S. Patil | Nitin Y. Suryavanshi

Dynamic Video Conferencing with Fully Secured Encryption Algorithms
Author(s): Y.V. Srinivasa Murthy | Dr. S. C. Satapathy | Ch Rajesh | P Tejnadh Reddy

Software Automated Testing: A Solution to Cover Maximum Test Plan and to Increase Software Quality
Author(s): G.Srikanth | R.Venkata Ramana Chary

Intrusion Detection System for Ad hoc Mobile Networks
Author(s): Muhammad Nawaz Khan | Muhammad Ilyas Khatak | Muhammad Faisal

Securing OLSR and STAR Routing Protocols Against Packet Dropping by Malicious Nodes
Author(s): Harish Shakywar | Sanjeev Sharma | Santoh Sahu

Authenticating and Securing EndToEnd Communications through Encrypted Key Model for Mobile Ad Hoc Network
Author(s): M. B. Mukesh Krishnan | Dr. P. Sheik Abdul Khader

Genetic Algorithm solution for Cryptanalysis of Knapsack Cipher with Knapsack Sequence of Size 16
Author(s): Dr. R. Geetha Ramani | Lakshmi Balasubramanian

DNA Computing based Elliptic Curve Cryptography
Author(s): P. Vijayakumar | V. Vijayalakshmi | G. Zayaraz

An Overview of Routing and Allocation of Equalized Wavelength or Power Distribution in Optical Network Security
Author(s): Suresh K.

Security Agents: A Mobile Agent Based Trust Model for Cloud Computing
Author(s): Priyank Singh Hada | Ranjita Singh | Mukul Manmohan

Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
Author(s): H. A. Esmail | M. R. Khalili Shoj | Hossein gharaee

A Comparison of Trojan Virus Behavior in Linux and Windows Operating System
Author(s): Ghossoon. M. W. Al-Saadoon | Hilal M.Y. Al-Bayatt

Precluding Emerging Threats from Cyberspace: An Autonomic Administrative Approach
Author(s): Vivian Ogochukwu Nwaocha | Inyiama H.C.

NETWORK INTRUSION DETECTION USING DATA MINING AND NETWORK BEHAVIOUR ANALYSIS
Author(s): Ahmed Youssef | Ahmed Emam

Significant Storage on Sensor Storage Space, Energy Consumption and Better Security Based on Routing in Hybrid Sensor Networks
Author(s): K.Nageswara rao | D. Rajya Lakshmi | T. Venkateswara rao

VULNERABILITIES AND SOLUTIONS: MOBILE AD HOC NETWORKS (MANETs) FOR OPTIMAL ROUTING AND SECURITY
Author(s): Shruti Sangwan

IMPROVED BOOTSTRAP SECURITY WITH CONSISTENT CACHE IN MOBILE AD HOC NETWORK ROUTING
Author(s): P. Parameswari

Efficient Implementation of Dynamic Routing With Security Considerations
Author(s): UMADEVI DURVASULA | A KIRAN KUMAR2

An Application of Face Recognition System using Image Processing and Neural Networks
Author(s): Rakesh Rathi | Manish Choudhary | Bhuwan Chandra

Cloud Computing Security Issues and Challenges
Author(s): Kuyoro 'Shade O., Ibikunle Frank, Awodele Oludele

Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Author(s): Manal AL-Bzoor, Laiali Almazaydeh, Syed S Rizvi

Maintenance of Network Connectivity Across Process Migration
Author(s): Mehdi Bahrbegi, Hadi Bahrbegi, Amir Azimi Alasti Ahrabi & Elnaz Safarzadeh

Detection of Botnets using Honeypots and P2P Botnets
Author(s): Rajab Challoo & Raghavendra Kotapalli

Evaluation of Logistic Regression and Neural Network Model With Sensitivity Analysis on Medical Datasets
Author(s): Raghavendra B.K. & S.K. Srivatsa

Developing Web-based Interactive Teaching System for Core Network Technology Courses
Author(s): Chengcheng Li

A Self Signature Embedding for Image Security by Using Similarity Based Superior Self Organizing Maps Neural Network
Author(s): Chenthalir Indra | E. Ramaraj

SWMPT: Securing Wireless Mesh Networks Protocol Based on Ticket Authentication
Author(s): Rushdi A. Hamamreh | Anas M. Melhem

MPT TECHNIQUE IN UNIFACIAL AND BI DIRECTIONAL PEER TO PEER WLAN FOR EFFICIENT DOWNLINK PERFORMANCE
Author(s): Anilkumar T | M.V.Vijayasaradhi

STUDY OF ELECTRONIC MUNICIPALITY’S ESTABLISHMENT AND DEVELOPMENTS PLATFORMS IN ZAHEDAN WITH THE BENCHMARKING
Author(s): Noormohammad Yaghobi | Habiballah Salarzehi | Mokhtar Shahraki

Effective Security Architecture for Virtualized Data Center Networks
Author(s): Udeze Chidiebele. C | Prof. H. C Inyiama | Okafor Kennedy .C | Dr C. C. Okezie

Integrated Device Control System using Google Maps
Author(s): Takahiro KOITA | Kenta UEDA | Kenya SATO

A P2P Approach for Efficient Certificate Revocation in MANET
Author(s): Suresh Babu Tumula | K.R.R.Mohana Rao

Intrusion Detection Systems in Wireless Sensor Networks
Author(s): Vijay Kumar Mallarapu | K.V.D.Sagar

Diameter-based Protocol in the IP Multimedia Subsystem
Author(s): Vinay Kumar.S.B | Manjula N Harihar

On-board Unit and its Possibilities of Communications on Safety and Security Principles
Author(s): Martin Vaculik | Maria Franekova | Peter Vestenicky | Martin Vestenicky

Intrusion Detection Technique in Mobile Adhoc Network Based on Quantitative Approach
Author(s): Saroj Hirnwal | Kirti Chauhan | Amit Gupta

Enhancing Security Measures by Tunnelling Protocol in Distributed Grid Network
Author(s): T. Mohan Raj | S. Shahul Hammed | Amala Deepan

E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
Author(s): Pardeep Kumar | Sang-Gon Lee | Hoon-Jae Lee

Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network
Author(s): Andrea Caiti | Vincenzo Calabrò | Gianluca Dini | Angelica Lo Duca | Andrea Munafò

An Innovative Kind Of Security Protocol Using Fusion Encryption In Virtual Private Networking
Author(s): M.Sreedevi | R. Seshadri

Traffic And Security Using Randomized Dispersive Routes In Heterogeneous Sensor Network
Author(s): P.Karunakaran | C.Venkatesh

ANODR-ECC Key Management protocol with TELNET to secure Application and Network layer for Mobile Adhoc Networks
Author(s): G.Padmavathi | P.Subashini | D.Devi Aruna

IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots
Author(s): K.Munivara Prasad | A.Rama Mohan Reddy | V Jyothsna

Efficient & Secure Data Hiding Using Secret Reference Matrix
Author(s): Laxman Tawade | Rajshree Mahajan | Chandan Kulthe

Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks
Author(s): Priyank Singhal | Nataasha Raul

DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network
Author(s): G.Padmavathi | P.Subashini | D.Devi Aruna

Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks
Author(s): Sridhar Subramanian | Baskaran Ramachandran

A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security
Author(s): Minal Moharir | A V Suresh

A Security Suite for Wireless Body Area Networks
Author(s): Raghav V. Sampangi | Saurabh Dey | Shalini R. Urs | Srinivas Sampalli

A Defensive Mechanism Cross Layer Architecture for Manets to Identify and Correct Misbehaviour in Routing
Author(s): G.S. Mamatha

The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine
Author(s): Besma Othmani | Mohsen Machhout | Houcine Mejri | Hafedh Belmabrouk | Rached Tourki

A Survey on Virtualization of Wireless Sensor Networks
Author(s): Md. Motaharul Islam | Mohammad Mehedi Hassan | Ga-Won Lee | Eui-Nam Huh

SECURING WMN USING HONEYPOT TECHNIQUE
Author(s): Priyanka Gupta | Paramjeet Rawat | Suraj Malik | Sudhanshu Gupta

Preventive Maintenance of Railway Tracks: Ballast Performance Anticipation in the Cameroon Railway
Author(s): Lezin Seba Minsili | Madja Doumbaye Jérémie | Grace L. Tsebo Simo | Christiane Simo

Inverted Pattern in Inverted Time Domain for Icon Steganography
Author(s): Rengarajan Amirtharajan | John Bosco Balaguru Rayappan

An Anonymous Authentication Scheme Based on Fully Homomorphic Encryption in P2P Networks
Author(s): Xiaoliang Wang | Yuling Liu | Hengfu Yang

The EXOR Gate Under Uncertainty: A Case Study
Author(s): Svetlana N. Yanushkevich | An Hong Tran | Golam Tangim | Vladimir P. Shmerko | Elena N. Zaitseva | Vitaly Levashenko

M2KMIX: Identifying the Type of High Rate Flooding Attacks using a Mixture of Expert Systems
Author(s): Arun Raj Kumar P. | S. Selvakumar

Efficient Hand off using Fuzzy and Simulated Annealing
Author(s): Vikas.M.N | Keshava.K.N | Prabhas.R.K | Hameem Shanavas.I

A Chaos-based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice
Author(s): Ruisong Ye | Wei Zhou

Enhancing Hash Function Selection Techniques Based on Message Contents
Author(s): Ali Saeed | Muhammad Khalil Shahid

Achieving Open-loop Insulin Delivery using ITM Designed for T1DM Patients
Author(s): Akash Rajak | Kanak Saxena

Application of Erlang Formulae in Next Generation Networks
Author(s): Erik Chromy | Tibor Misuth | Adam Weber

Robust Source Coding Steganographic Technique Using Wavelet Transforms
Author(s): S. K. Muttoo | Sushil Kumar

DIFFERENT SECURITY MECHANISMS FOR DIFFERENT TYPE OF SECURITY LAPSES IN WMN- A REVIEW
Author(s): Narender Singh | Kuldeep Vats | Jasvinder | Lovish Jaiswal

Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Based on Network Size for MANET
Author(s): Dr. Ritika | Dr. Nipur

A Micro-Mobility Management Scheme for Handover and Roaming
Author(s): Debabala Swain | Siba Prasada Panigrahi | Prasanta Kumar Patra

New Proposed Classic Cluster Layer Architecture for Mobile Adhoc Network (cclam)
Author(s): Kuldeep Sharma | Nikhil Khandelwal | Sanjeev Kumar Singh

UNAPPROVED ACCESS POINT ELIMINATION IN WLAN USING MULTIPLE AGENTS AND SKEW INTERVALS
Author(s): Prof.S.B.Vanjale | J.A.Dave | Prof.P.B.Mane

Unified Approach with Neural Network for Authentication, Security and Compression of Image: UNICAP
Author(s): Dattatherya | S. Venkata Chalam | Manoj Kumar Singh

A Wireless Sensor Network Solution for Precision Agriculture Based on Zigbee Technology
Author(s): Amene Deljoo | Manijeh Keshtgari

Secure Cooperative Spectrum Sensing based on the Distance between Bodies of Evidence
Author(s): Xiwen Tang | Yingguan Wang | Yi Wang | Yanjun Hu

Fuzzy Based Assignment Method of Filtering Nodes in Wireless Sensor Networks
Author(s): Tae Ho Cho | Soo Young Moon

A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
Author(s): Abdulrahman H. Altalhi

Fuzzy Based Assignment Method of Filtering Nodes in Wireless Sensor Networks
Author(s): Tae Ho Cho | Soo Young Moon

A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
Author(s): Abdulrahman H. Altalhi

Desempeño de la calidad del servicio (QoS) sobre IPv6
Author(s): Octavio José Salcedo Parra | Danilo López | Ángela Patricia Ríos

"Qual é o meu lugar no mundo?" - reflexões sobre o papel da Psicanálise na atenção integral ao portador de transtorno mental em conflito com a Lei
Author(s): Denise da Rocha Tourinho

Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations
Author(s): Jesus Conesa-Muñoz | Angela Ribeiro

Energy Efficient PKI Secure Key Management Technique in Wireless Sensor Network Using DHA & ECC
Author(s): Mohd. Rizwan beg | Shish Ahmad

Practical Approach For Improving Security in Wireless Mesh Network Through ECC and Two Way Authentication Scheme
Author(s): Avinash P. Wadhe | N.A.Chavhan

A Novel Password based Multi Party Key Agreement Protocol on Elliptic Curve
Author(s): Daniyal M. Alghazzawi

Detection and elimination of covert communication in Transport and Internet layer A Survey
Author(s): D. M. Dakhane | Swapna Patil | Mahendra Patil

Desing and Implementation of Distributed Security using Onion Routing
Author(s): Ashish T. Bhole | Savita H. Lambole

Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS
Author(s): Prasad Patil | Rinku Shah | Kajal Jewani

A Survey and Comparative Study of Vehicular Traffic Control System (VTCS)
Author(s): V. B. Vaghela | D. J. Shah

Security Enhancement Algorithms for Data Transmission for Next Generation Networks
Author(s): Vikas Kaul | S K Narayankhedkar | S Achrekar | S Agarwal

Undergraduate Program in Network Engineering and Security – A Feasibility Study
Author(s): Fahed Awad | Omar Banimelhem | Eyad Taqieddin | Raed Bani-Hani

An Approach for Secure Data Transmission in Private Cloud
Author(s): Anurag Porwal | Rohit Maheshwari | B.L.Pal | Gaurav Kakhani

A Unique Approach to Element Management and Secure Cloud Storage Backup for Sensitive Data
Author(s): Srinivas M N | Srinivas B V | Marx R

A New Security Protocol for Mobile Ad Hoc Networks
Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha

Simulation Study of Black Hole and Jellyfish attack on MANET Using NS3
Author(s): Nidhi Purohit | Richa Sinha | Hiteishi Diwanji

Performance Analysis of Energy Efficient Clustering Algorithms for Wireless Sensor Network
Author(s): Naveen Choudhary | Dharm Singh | Shilpa Pandey

A Survey and Comparative Analysis of Data Mining Techniques for Network Intrusion Detection Systems
Author(s): Reema Patel | Amit Thakkar | Amit Ganatra
