Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer and Network Security

ISSN: 2076--2739
Publisher: International Journal of Computer and Network Security


ADD TO MY LIST
 
A Graph-based Testing of UML2 Sequence Diagram

Author(s): Yujian Fu and Sha Li
Volume: 2
Issue: 9
Year: 2010
Overview of Detecting Stego-Content in Corporate Emails : a Web Based Steganalysis

Author(s): Ms. P. T. Anitha and Dr. M. Rajaram
Volume: 2
Issue: 9
Year: 2010
Cloth Deformation Simulation Based on a simplified mass-spring model

Author(s): Yao yu-feng, Xia kai-jian and Zhou jin-cheng
Volume: 2
Issue: 9
Year: 2010
A Modified Feistel Cipher Involving Modular Arithmetic and Interlacing

Author(s): V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
Volume: 2
Issue: 9
Year: 2010
Video Streamed Acces and Use Control Using Digital Rights Management

Author(s): Morad Rafi and Mohsine Eleuldj
Volume: 2
Issue: 9
Year: 2010
Evaluation of Intrusion Detection Techniques for Enterprise Information Security

Author(s): Kanwarpreet Singh, Yogesh Chaba and Amritpal
Volume: 2
Issue: 9
Year: 2010
Detection of Selective Forward Attack in Mobile Wireless Sensor Networks

Author(s): S.Sharmila, and G.Umamaheswari
Volume: 2
Issue: 9
Year: 2010
A 1.2V Fourth Order Low Pass Filter for UMTS Receivers

Author(s): Sandeep Garg, D.S. Ajnar, P.K. Jain
Volume: 2
Issue: 9
Year: 2010
Generating the New S-box and Analyzing the Diffusion Strength to Improve the Security of AES Algorithm

Author(s): Mohan H. S. and A Raji Reddy
Volume: 2
Issue: 9
Year: 2010
A Mechanism for detecting Wormhole Attacks on Wireless Ad Hoc Network

Author(s): Ajit Singh, Kunwar Singh Vaisla
Volume: 2
Issue: 9
Year: 2010
A Novel design of High Speed Adders Using Quaternary Signed Digit Number System

Author(s): Reena Rani, L.K. Singh and Neelam Sharma
Volume: 2
Issue: 9
Year: 2010
The Performance Analysis for MAP Selection Scheme of Hierarchical Mobile IP Networks

Author(s): Shan Zhong, Jin-yi CHANG, Dan Zhao and Hong Zhao
Volume: 2
Issue: 9
Year: 2010
Performance Evaluation of Peer–to-Peer system in Video on Demand with Load Sharing Scheduling Algorithm

Author(s): S.Nagaprasad, A.VinayaBabu, K.Madhukar, D.Marlene G Verghese, V.Mallaiah1and A.Sreelatha
Volume: 2
Issue: 9
Year: 2010
Data Aggregation Trees based Algorithm using Genetic Algorithm in Wireless Sensor Networks

Author(s): Mehdi Dabbaghian, Abolfazl Kalanaki, Hamed Taghvaei, Faezeh Sadat Babamir and Seyed Mehrdad Babamir
Volume: 2
Issue: 9
Year: 2010
A Visual Grammar Approach for TV Program Identification

Author(s): Tarek ZLITNI and Walid MAHDI
Volume: 2
Issue: 9
Year: 2010
Shadow Honeypots

Author(s): Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Michalis Polychronakis,Angelos D. Keromytis, Evangelos P. Markatos
Volume: 2
Issue: 9
Year: 2010
Knowledge Based Computing Using Semantic Web for Grid Applications

Author(s): Dr. M. Rajaram, Mrs. S. Latha Shanmuga Vadivu
Volume: 2
Issue: 9
Year: 2010
Efficient Buffer management Policy DLA for DTN Routing Protocols under Congestion

Author(s): Sulma Rashid, Qaisar Ayub
Volume: 2
Issue: 9
Year: 2010
A Modified Hill Cipher Involving a Pair of Keys and a Permutation

Author(s): V.U.K.Sastry, Aruna Varanasi and S.Udaya Kumar
Volume: 2
Issue: 9
Year: 2010
Evaluating Learning Objects for Students: An adaptive model

Author(s): Sonal Chawla and Dr. R.K. Singla
Volume: 2
Issue: 9
Year: 2010
Factors that Influence Learner-Content Interaction in the Online Top-Down Modeling Model Environment

Author(s): Sha Li, Shirley King, Yujian Fu
Volume: 2
Issue: 9
Year: 2010
Triple-Critical Graphs

Author(s): Basheer Ahamed M., and Bagyam I
Volume: 2
Issue: 9
Year: 2010
Spatial Cluster Coverage of Sensor Networks

Author(s): G.N. Purohit , Megha Sharma
Volume: 2
Issue: 8
Year: 2010
An Adoptive Algorithm for Mining Time-Interval Sequential Patterns

Author(s): Hao-En Chueh and Yo-Hsien Lin
Volume: 2
Issue: 8
Year: 2010
Pairwise Key Establishment in Hierarchical WSN Cluster Network

Author(s): G.N.Purohit, Asmita Singh Rawat
Volume: 2
Issue: 8
Year: 2010
Adaptive Dual Threshold Multi-Class Scheduling for Packet Switch

Author(s): A. A. Abdul Rahman, K. Seman, K. Saadan and A. Azreen
Volume: 2
Issue: 8
Year: 2010
Performance Evaluation of MANET Routing Protocols Under Black Hole Attack

Author(s): M.Umaparvathi and Dr. Dharmishtan K Varughese
Volume: 2
Issue: 8
Year: 2010
Improved User-Centric ID Management Model for Privacy Protection in Cloud Computing

Author(s): Moonyoung Hwang, Jin Kwak
Volume: 2
Issue: 8
Year: 2010
An Exploration of Ad-hoc Network in a Real World builds in a Laboratory Environment

Author(s): Nitiket N Mhala and N K Choudhari
Volume: 2
Issue: 8
Year: 2010
A New Approach to Measure Quality of Image Encryption

Author(s): Alireza Jolfaei and Abdolrasoul Mirghadri
Volume: 2
Issue: 8
Year: 2010
The Electronic Intermediary and the Effect on this For Developing E-Commerce

Author(s): Sahar Kosari, Mohammadreza Banan, Hadi Fanaee Tork and Ali Broumandnia
Volume: 2
Issue: 8
Year: 2010
Low Budget Honeynet Creation and Implementation for Nids and Nips

Author(s): Aathira K. S, Hiran V. Nath, Thulasi N. Kutty, Gireesh Kumar T
Volume: 2
Issue: 8
Year: 2010
The Effect of Image Compression on Face Recognition Algorithms

Author(s): Qeethara Kadhim Al-Shayea, Muzhir Shaban Al-Ani and Muna Suliman Abu Teamah
Volume: 2
Issue: 8
Year: 2010
Stock Market Forecasting using Artificial Neural Network and Statistical Technique: A Comparison Report

Author(s): K S Vaisla and Dr. Ashutosh Kumar Bhatt, Dr. Shishir Kumar
Volume: 2
Issue: 8
Year: 2010
A Survey and Comparison of Various Routing Protocols of Wireless Sensor Network (WSN) and a Proposed New TTDD Protocol Based on LEACH

Author(s): Md. Habibe Azam, Abdullah-Al-Nahid, Md. Abdul Alim3, Md. Ziaul Amin
Volume: 2
Issue: 8
Year: 2010
Mathematical Models on Interaction between Computer Virus and Antivirus Software inside a Computer System

Author(s): Bimal Kumar Mishra and Gholam Mursalin Ansari
Volume: 2
Issue: 8
Year: 2010
Secured Interworking and Roaming between 3GPP LTE and Wireless Local Mesh Networks

Author(s): Faouzi Zarai, Ikbel Daly and Lotfi Kamoun
Volume: 2
Issue: 7
Year: 2010
A Large Capacity Steganography Using Bit Plane Complexity Segmentation (BPCS) algorithm for MPEG-4 Video

Author(s): M.Anandkumar, K. Appathurai, P. Nagarajan and Dr.M. Hemalatha
Volume: 2
Issue: 7
Year: 2010
A Reliable Attack-Resistant Authenticated Routing Protocol for Mobile Adhoc Networks

Author(s): M.Rajesh Babu, Dr.S.Selvan
Volume: 2
Issue: 7
Year: 2010
Speech Compression: A Comparative Study between Discreet Wavelet and Wavelet Packet Decomposition

Author(s): Shijo M Joseph, Firoz Shah A and Babu Anto P
Volume: 2
Issue: 7
Year: 2010
A Protocol for Secret Key Infusion from Satellite Transmissions

Author(s): Mohamed Ridza Wahiddin, Noor Shamila Shanaz Noor Sham
Volume: 2
Issue: 7
Year: 2010
Impedance-Based Image Reconstruction of the Field Distribution inside the Closed Phantom Using Finite Element Method

Author(s): Sarwan Kumar, Sneh Anand, Amit Sengupta
Volume: 2
Issue: 7
Year: 2010
Secure Source Routing Protocol for Mobile Adhoc Networks

Author(s): M.Rajesh Babu, Dr.S.Selvan
Volume: 2
Issue: 7
Year: 2010
A Novel Approach for Lossy Compression using Modified Gray Scale Quantization

Author(s): V. U. K. Sastry and Ch. Samson
Volume: 2
Issue: 7
Year: 2010
Design and Implementation of a Hybrid Compression Technique for Ultrasound Images in Telemedicine

Author(s): Divya Mohandass, Dr.J.Janet
Volume: 2
Issue: 7
Year: 2010
Comparative Analysis for IPv4 and IPv6 Protocol to Evaluate Performance

Author(s): M.Anandkumar, K. Appathurai, P. Nagarajan and Dr.M. Hemalatha
Volume: 2
Issue: 7
Year: 2010
RPA Switzerland

Robotic Process Automation Switzerland

    

Tango Jona
Tangokurs Rapperswil-Jona