Cluster Based Node Misbehaviour Detection, Isolation and Authentication Using Threshold Cryptography in Mobile Ad Hoc Networks

Author(s): R. Murugan | A. Shanmugam
Volume: 6
Issue: 3
Year: 2012





Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireless Sensor Networks

Author(s): David Fotue | Houda Labiod | Thomas Engel
Volume: 6
Issue: 3
Year: 2012





Image Steganography Techniques: An Overview

Author(s): Nagham Hamid | Abid Yahya | R. Badlishah Ahmad | Osamah M. Al-Qershi
Volume: 6
Issue: 3
Year: 2012





A Comparative Analysis of Feature Selection Methods for Clustering DNA Sequences

Author(s): B.Umamageswari | B.Karthikeyan | T.Nalini
Volume: 6
Issue: 2
Year: 2012





Mining Regular Patterns in Data Streams Using Vertical Format

Author(s): G. Vijay Kumar | M. Sreedevi | NVS Pavan Kumar
Volume: 6
Issue: 2
Year: 2012





Fuzzy Optimized Metric for Adaptive Network Routing

Author(s): Ahmad Khader Haboush
Volume: 6
Issue: 2
Year: 2012





Using Learning Vector Quantization in Alert Management of Intrusion Detection System

Author(s): Amir Azimi Alasti Ahrabi | Kaveh Feyzi | Zahra Atashbar Orang | Hadi Bahrbegi | Elnaz Safarzadeh
Volume: 6
Issue: 2
Year: 2012





A New Steganographic Method for Embedded Image In Audio File

Author(s): Dalal N. Hmood | Khamael A. Khudhiar | Mohammed S. Altaei
Volume: 6
Issue: 2
Year: 2012





Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Based on Network Size for MANET

Author(s): Dr. Ritika | Dr. Nipur
Volume: 6
Issue: 1
Year: 2012





Audio Steganography Coding Using the Discrete Wavelet Transforms

Author(s): Siwar Rekik | Driss Guerchi | Habib Hamam | Sid-Ahmed Selouani
Volume: 6
Issue: 1
Year: 2012





New Proposed Classic Cluster Layer Architecture for Mobile Adhoc Network (cclam)

Author(s): Kuldeep Sharma | Nikhil Khandelwal | Sanjeev Kumar Singh
Volume: 6
Issue: 1
Year: 2012





Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages

Author(s): Mallikka Rajalingam | Saleh Ali Alomari | Putra Sumari
Volume: 6
Issue: 1
Year: 2012





Using Cipher Key to Generate Dynamic S-Box in AES Cipher System

Author(s): Razi Hosseinkhani | H. Haj Seyyed Javadi
Volume: 6
Issue: 1
Year: 2012





Recourse Management Using a Fair Share Scheduler

Author(s): Suja Cherukullapurath Mana
Volume: 6
Issue: 1
Year: 2012





A Micro-Mobility Management Scheme for Handover and Roaming

Author(s): Debabala Swain | Siba Prasada Panigrahi | Prasanta Kumar Patra
Volume: 6
Issue: 1
Year: 2012





Algorithem and Programme for Computation of Forces Acting on Line Supports

Author(s): Abdulaziz Salem Bahaidara
Volume: 6
Issue: 1
Year: 2012





Semantic Massage Addressing based on Social Cloud Actor's Interests

Author(s): Reem M. Bahgat | Akram I. Salah | Hamada I. Abdul Wakeil
Volume: 6
Issue: 1
Year: 2012





Quality and Distortion Evaluation of Audio Signal by Spectrum

Author(s): Er. Niranjan Singh | Dr. Bhupendra Verma
Volume: 6
Issue: 1
Year: 2012





Dynamic Audio-Visual Client Recognition modelling

Author(s): Tijjani Adam Shuwa, U. Hashim
Volume: 5
Issue: 5
Year: 2011





A Novel Steganography Technique that Embeds Security along with Compression

Author(s): Anuradha, Nidhi & Rimple
Volume: 5
Issue: 5
Year: 2011





Non-Specialized File Format Extension

Author(s): Blake W. Ford & Khosrow Kaikhah
Volume: 5
Issue: 5
Year: 2011





Design and Implementation of EZW & SPIHT Image Coder for Virtual Images

Author(s): Priyanka Singh & Priti Singh
Volume: 5
Issue: 5
Year: 2011





Phishing Website Detection Using Particle Swarm Optimization

Author(s): Radha Damodaram & Dr.M.L.Valarmathi
Volume: 5
Issue: 5
Year: 2011





A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding

Author(s): P.Nithyanandam, T.Ravichandran, N.M.Santron, E. Priyadharshini
Volume: 5
Issue: 5
Year: 2011





Detection of Botnets using Honeypots and P2P Botnets

Author(s): Rajab Challoo & Raghavendra Kotapalli
Volume: 5
Issue: 5
Year: 2011





Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks

Author(s): Manal AL-Bzoor, Laiali Almazaydeh, Syed S Rizvi
Volume: 5
Issue: 5
Year: 2011





Evaluation of Logistic Regression and Neural Network Model With Sensitivity Analysis on Medical Datasets

Author(s): Raghavendra B.K. & S.K. Srivatsa
Volume: 5
Issue: 5
Year: 2011





Maintenance of Network Connectivity Across Process Migration

Author(s): Mehdi Bahrbegi, Hadi Bahrbegi, Amir Azimi Alasti Ahrabi & Elnaz Safarzadeh
Volume: 5
Issue: 5
Year: 2011





Robust Image Watermarking Scheme Based on Wavelet Technique

Author(s): Aree Ali Mohammed, Haval Mohammed Sidqi
Volume: 5
Issue: 4
Year: 2011





A proposed Solution: Data Availability and Error Correction in Cloud Computing

Author(s): Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma
Volume: 5
Issue: 4
Year: 2011





Adaptive and Faster Approach to Fingerprint Minutiae Extraction and Validation

Author(s): Iwasokun G. B., Akinyokun O. C., Alese B. K. & Olabode O.
Volume: 5
Issue: 4
Year: 2011





A Distributed Approach to Defend Web Service from DDoS Attacks

Author(s): A Distributed Approach to Defend Web Service from DDoS Attacks
Volume: 5
Issue: 3
Year: 2011





Black Box Backup System

Author(s): iyad Ahmad Aldasouqi, Arafat Awajan
Volume: 5
Issue: 3
Year: 2011





Finding Relationships Between the Our-NIR Cluster Results

Author(s): N.Sudhakar Reddy & K.V.N.Sunitha
Volume: 5
Issue: 3
Year: 2011





Development of an Efficient Computing Multilingualism Model for Diacritical Marks in Arabic and Hindi

Author(s): Abu Sarwar Zamani, Nasser Al Arifi, Md. Mobin Akhtar
Volume: 5
Issue: 3
Year: 2011





Toward a New Algorithm for Hands Free Browsing

Author(s): Murad Al-Rajab & Haifaa Kattan
Volume: 5
Issue: 3
Year: 2011





Survey Paper: Cryptography Is The Science Of Information Security

Author(s): Mohammed AbuTaha, Mousa Farajallah, Radwan Tahboub, Mohammad Odeh
Volume: 5
Issue: 3
Year: 2011





Information Security Maturity Model

Author(s): Information Security Maturity Model
Volume: 5
Issue: 3
Year: 2011





Automatic Detection of Malaria Parasites for Estimating Parasitemia

Author(s): S. S. Savkare & S. P. Narote
Volume: 5
Issue: 3
Year: 2011





Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Projection

Author(s): Anissa Bouzalmat, Naouar Belghini, Arsalane Zarghili, Jamal Kharroubi & Aicha Majda
Volume: 5
Issue: 3
Year: 2011





Concurrent Matrix Multiplication on Multi-Core Processors

Author(s): Muhammad Ali Ismail | Dr. S. H. Mirza | Dr. Talat Altaf
Volume: 5
Issue: 2
Year: 2011





Cryptographic Algorithms for Secure Data Communication

Author(s): Zirra Peter Buba | Gregory Maksha Wajiga
Volume: 5
Issue: 2
Year: 2011





A New Function-based Framework for Classification and Evaluation of Mutual Exclusion Algorithms

Author(s): Leila Omrani | Zahra Rafinezhad | Mohammadreza Keyvanpour
Volume: 5
Issue: 2
Year: 2011





A Study of Protocols for Grid Computing Environment

Author(s): Suresh Jaganathan | Srinivasan A | Damodaram A
Volume: 5
Issue: 2
Year: 2011





Radical Data Compression Algorithm Using Factorization

Author(s): Zirra Peter Buba | Gregory Maksha Wajiga
Volume: 5
Issue: 2
Year: 2011





A Novel Approach for Efficient Resource Utilization and Trustworthy Web Service

Author(s): Marimuthu K | Ganesh Gopal D
Volume: 5
Issue: 2
Year: 2011





Design and Implementation of a Multi-Agent System for the Job Shop Scheduling Problem

Author(s): Leila Asadzadeh | Kamran Zamanifar
Volume: 5
Issue: 2
Year: 2011





Three Dimensional Database: Artificial Intelligence to eCommerce Web service Agents

Author(s): R.Vadivel | Dr K. Baskaran
Volume: 5
Issue: 2
Year: 2011





Diacritic Oriented Arabic Information Retrieval System

Author(s): Khalid Saleh Aloufi
Volume: 5
Issue: 1
Year: 2011




