Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Network Security & Its Applications

ISSN: 0975--2307
Publisher: Academy & Industry Research Collaboration Center (AIRCC)


ADD TO MY LIST
 
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET PDF available

Author(s): J. K. Mandal | Khondekar Lutful Hassan
Volume: 5
Issue: 5
Year: 2013
Z-SHAPED DIPOLE ANTENNA AND ITS FRACTAL ITERATIONS PDF available

Author(s): Mustafa H. Abu Nasr
Volume: 5
Issue: 5
Year: 2013
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CROWD IN A CLOUD COMPUTING ENVIRONMENT PDF available

Author(s): N.Jeyanthi | Hena Shabeeb | Mogankumar P.C
Volume: 5
Issue: 5
Year: 2013
KNOWLEDGE-BASED AUTHENTICATION USING TWITTER CAN WE USE LUNCH MENUS AS PASSWORDS? PDF available

Author(s): ManabuOkamoto
Volume: 5
Issue: 5
Year: 2013
A NOVEL APPROACH FOR SECURE ROUTING THROUGH BGP USING SYMMETRIC KEY PDF available

Author(s): Divan Raimagia | Shraddha Singh | Sameena Zafar
Volume: 5
Issue: 5
Year: 2013
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE PDF available

Author(s): Arijit Ukil | Debasish Jana | Ajanta De Sarkar
Volume: 5
Issue: 5
Year: 2013
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOMETRIC RECOGNITION SYSTEM PDF available

Author(s): Binsu C. Kovoor | Supriya M.H. | K. Poulose Jacob
Volume: 5
Issue: 5
Year: 2013
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING PDF available

Author(s): Huynh Nguyen Chinh | Tan Hanh | Nguyen Dinh Thuc
Volume: 5
Issue: 5
Year: 2013
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM PDF available

Author(s): Adnan M. Shihab | Raghad K. Mohammed | Woud M. Abed
Volume: 5
Issue: 5
Year: 2013
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USING PSO PDF available

Author(s): K.Kuppusamy | K.Thamodaran
Volume: 5
Issue: 5
Year: 2013
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET PDF available

Author(s): Ram Shringar Raw | Manish Kumar | Nanhay Singh
Volume: 5
Issue: 5
Year: 2013
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (MREBC) PDF available

Author(s): Ahmed ElShafee
Volume: 5
Issue: 5
Year: 2013
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION PDF available

Author(s): Hani Qusa | Shadi Abudalfa
Volume: 5
Issue: 5
Year: 2013
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS PDF available

Author(s): Majid Alshammari | Christian Bach
Volume: 5
Issue: 5
Year: 2013
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT) PDF available

Author(s): Madhumita Sengupta | J. K. Mandal,
Volume: 5
Issue: 5
Year: 2013
Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level PDF available

Author(s): Fahmida Rahman | Mohammed Arozullah
Volume: 5
Issue: 4
Year: 2013
SECURITY ALGORITHMS FOR WIMAX PDF available

Author(s): M Alzaabi | K D Ranjeeth | T Alukaidey | K Salman
Volume: 5
Issue: 3
Year: 2013
HTTPI BASED WEB SERVICE SECURITY OVER SOAP PDF available

Author(s): Pankaj Choudhary | Rajendra Aaseri | Nirmal Roberts
Volume: 5
Issue: 3
Year: 2013
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELESS AD-HOC NETWORKS PDF available

Author(s): Rajendra Aaseri | , Pankaj Choudhary | , Nirmal Roberts
Volume: 5
Issue: 3
Year: 2013
BEARINGS PROGNOSTIC USING MIXTURE OF GAUSSIANS HIDDEN MARKOV MODEL AND SUPPORT VECTOR MACHINE PDF available

Author(s): Fatima Ezzahra Sloukia | Rajae Bouarfa | Hicham Medromi | Mohammed Wahbi
Volume: 5
Issue: 3
Year: 2013
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI PDF available

Author(s): U. Pavan Kumar
Volume: 5
Issue: 3
Year: 2013
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

Author(s): Lein Harn | Changlu Lin
Volume: 5
Issue: 3
Year: 2013
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy Depletion Parameters PDF available

Author(s): S.Prabhakara Rao | .E.Nagabhooshanam | S.Ramesh Babu
Volume: 5
Issue: 3
Year: 2013
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS PDF available

Author(s): G Dayanandam | T V Rao | S Pavan Kumar Reddy | Ravinuthala Sruthi
Volume: 5
Issue: 3
Year: 2013
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NETWORK PDF available

Author(s): Seyedeh Yasaman Rashida
Volume: 5
Issue: 3
Year: 2013
Traceback of DOS Over Autonomous Systems PDF available

Author(s): Mohammed Alenezi | Martin J Reed
Volume: 5
Issue: 2
Year: 2013
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-hoc Network Environment PDF available

Author(s): Vaishali D. Khairnar | Ketan Kotecha
Volume: 5
Issue: 2
Year: 2013
Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment PDF available

Author(s): Shalvi Dave | Bhushan Trivedi | Jimit Mahadevia
Volume: 5
Issue: 2
Year: 2013
A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries PDF available

Author(s): Dexin Yang | Chunjing Lin | Bo Yang
Volume: 5
Issue: 2
Year: 2013
Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour PDF available

Author(s): Arpitha M | Geetha V | Gowranga K H | Bhakthavathsalam R
Volume: 5
Issue: 2
Year: 2013
Code Aware Dynamic Source Routing for Distributed Sensor Network PDF available

Author(s): M Abdul Rahiman | Nishanth Jain | Arun K. Dubey | G Manoj Kumar
Volume: 5
Issue: 2
Year: 2013
Incident Response Plan for a Small to Medium Sized Hospital PDF available

Author(s): Charles DeVoe | Syed (Shawon) M. Rahman
Volume: 5
Issue: 2
Year: 2013
Privacy Preserving Data Mining by using Implicit Function Theorem PDF available

Author(s): Pasupuleti Rajesh | Gugulothu Narsimha
Volume: 5
Issue: 2
Year: 2013
A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering PDF available

Author(s): S.Lakshmi | V.Sankaranarayanan
Volume: 5
Issue: 2
Year: 2013
Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering Systems PDF available

Author(s): Alexis V. Pantola | Susan Pancho-Festin | Florante Salvador
Volume: 5
Issue: 2
Year: 2013
Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation PDF available

Author(s): Andrew Rudder | Wayne Goodridge | Shareeda Mohammed
Volume: 5
Issue: 2
Year: 2013
Traceback of DOS Over Autonomous Systems PDF available

Author(s): Mohammed Alenezi and Martin J Reed,
Volume: 5
Issue: 2
Year: 2013
Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks PDF available

Author(s): Leelavathi G | Shaila K | Venugopal K R | L M Patnaik
Volume: 5
Issue: 2
Year: 2013
E-Commerce Systems Security for Small Businesses PDF available

Author(s): Syed (Shawon) M. Rahman | Robert Lackey
Volume: 5
Issue: 2
Year: 2013
A 64 Bits Rotor Enhanced Block Cipher (Rebc3) PDF available

Author(s): Ahmed ElShafee
Volume: 5
Issue: 2
Year: 2013
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers PDF available

Author(s): Kuo-Tsang Huang | Jung-Hui Chiu | Sung-Shiou Shen
Volume: 5
Issue: 1
Year: 2013
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines PDF available

Author(s): A. M. Chandrashekhar | K. Raghuveer
Volume: 5
Issue: 1
Year: 2013
Resonance Based Micromechanical Cantilever for Gas Sensing PDF available

Author(s): Subhashini. S | Vimala Juliet. A
Volume: 5
Issue: 1
Year: 2013
Text Steganographic Approaches: A Comparison PDF available

Author(s): Monika Agarwal
Volume: 5
Issue: 1
Year: 2013
Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study PDF available

Author(s): Natarajan Meghanathan
Volume: 5
Issue: 1
Year: 2013
How to Find a Fixed Point in Shuffle Efficiently PDF available

Author(s): Mikako Kageshima | ManabuOkamoto
Volume: 5
Issue: 1
Year: 2013
Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study PDF available

Author(s): Aidarus M. Ibrahim | Hussein A. Hashi | Abdullalem A. Mohamed
Volume: 5
Issue: 1
Year: 2013
Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining Technique PDF available

Author(s): Oluwafemi Oriola | Adesesan B. Adeyemo | Oluwaseyitanfunmi Osunade
Volume: 4
Issue: 6
Year: 2012
Review on IPv6 Security Vulnerability Issues and Mitigation Methods PDF available

Author(s): Supriyanto | Raja Kumar Murugesan | Sureswaran Ramadass
Volume: 4
Issue: 6
Year: 2012
RPA Switzerland

Robotic Process Automation Switzerland

    

Tango Jona
Tangokurs Rapperswil-Jona