首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Computer Network and Information Security
ISSN Print: 2074-9090
ISSN Online:
主页:
http://www.mecs-press.org/ijcnis/
分享:
Go
Securing Zone Routing Protocol in Ad-Hoc Networks
Ibrahim S. I. Abuhaiba
,
Hanan M. M. Abu-Thuraia
Distributed Algorithms for Improving Search Efficiency in P2P Overlays
Chittaranjan Hota
,
Vikram Nunia
,
Antti Yl?-J??ski
Network Packet Inspection to Identify Contraband File Sharing Using Forensic Tools
N.Kannaiya Raja
,
K.Arulanandam
,
R.Somasundaram
Intelligent Wireless Sensor Network System to shrink Suspected Terror from Militants
SanjeevPuri
Data Sharing for Context-Sensitive Access Control Policy Evaluation and Enforcement
Hassan Rasheed
Deliberate Secure Grid Computing Blueprint Design in Indian Context
Sanjeev Puri
,
Harsh Dev
Efficient Hand off using Fuzzy and Simulated Annealing
Vikas.M.N
,
Keshava.K.N
,
Prabhas.R.K
,
Hameem Shanavas.I
Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment
Basappa B. Kodada
,
Gaurav Prasad
,
Alwyn R. Pais
Evolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System
V.K. Narendira Kumar
,
B. Srinivasan
A Novel Security Scheme for Secret Data using Cryptography and Steganography
Phad Vitthal S.
,
Bhosale Rajkumar S.
,
Panhalkar Archana R.
Error Detection & Correction in Wireless Sensor Networks By Using Residue Number Systems
M. Roshanzadeh
,
S. Saqaeeyan
A New Approach for Multicast Routing in Wireless Mesh Networks
Mustapha GUEZOURI
,
Ali KADDOURI
Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition
Harminder Singh Bindra
,
A L Sangal
Self Organized Replica Overlay Scheme for P2P Networks
Shashi Bhushan
,
Mayank Dave
,
R. B. Patel
UML Based Integrated Multilevel Checkpointing Algorithms for Cloud Computing Environment
Dilbag Singh
,
Jaswinder Singh
,
Amit Chhabra
Congestion Control in 4G Wireless Networks Using Coalition Game
S. V. Saboji
,
C. B. Akki
Block Based Symmetry Key Visual Cryptography
Satyendra Nath Mandal
,
Subhankar Dutta
,
Ritam Sarkar
Asymptotic Stability Analysis of E-speed Start Congestion Control Protocol for TCP
Oyeyinka I.K.
,
Akinwale A.T.
,
Folorunso O.
,
Olowofela J.A.
A New 512 Bit Cipher for Secure Communication
M. Anand Kumar
,
.S.Karthikeyan
Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques
Manish Mahajan
,
Navdeep Kaur
A Hierarchical Load Balancing Policy for Grid Computing Environment
Said Fathy El Zoghdy
A Link Quality Based Dispersity Routing Algorithm for Mobile Ad Hoc Networks
Sujatha.P. Terdal
,
V.D.Mytri
,
A.Damodaram
Digital Forensic Investigation Tools and Procedures
K. K. Sindhu
,
B. B. Meshram
A Survey: Recent Advances and Future Trends in Honeypot Research
Matthew L. Bringer
,
Christopher A. Chelmecki
,
Hiroshi Fujinoki
IEATH: Improved Energy Aware and Two Hop Multipath Routing Protocol in Wireless Sensor Networks
S. Saqaeeyan
,
M. Roshanzadeh
QSWMCA - Quality of Service in Wireless Mesh Networks by Configuration Arguments
N.Kannaiya Raja
,
R. Saritha
,
A.Senthamaraiselvan
,
K. Arulanandam
Battering Keyloggers and Screen Recording Software by Fabricating Passwords
Nairit Adhikary
,
Rohit Shrivastava
,
Ashwani Kumar
,
Sunil Kumar Verma
Mobile Governance based on WiMAX Connectivity for Rural Development in India
Kalpana Chaudhari
,
Upena D Dalal
,
Rakesh Jha
Feature Based Audio Steganalysis (FAS)
Souvik Bhattacharyya
,
Gautam Sanyal
A Packet Routing Model for Computer Networks
O. Osunade
Text Steganography Using Quantum Approach in Regional Language with Revised SSCE
Indradip Banerjee
,
Souvik Bhattacharyya
,
Gautam Sanyal
An Analytical Assessment on Document Clustering
Pushplata
,
Ram Chatterjee
Attacks Due to Flaw of Protocols Used In Network Access Control (NAC), Their Solutions and Issues: A Survey
Snehasish Parhi
Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System
Jashan Koshal
,
Monark Bag
Hardware Implementation of Elliptic Curve Cryptography over Binary Field
Sandeep S.V
,
Hameem Shanavas.I
,
Nallusamy.V
,
Brindha.M
Distributed Encrypting File System for Linux in User-space
U. S. Rawat
,
Shishir Kumar
Application of Erlang Formulae in Next Generation Networks
Erik Chromy
,
Tibor Misuth
,
Adam Weber
Optimization Design Parameters of Electro-optic Modulators for Low Loss Wide Bandwidth Capability of Optical Communication Systems
Ahmed Nabih Zaki Rashed
Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms
M. Anand Kumar
,
S.Karthikeyan
CSRF Vulnerabilities and Defensive Techniques
Rupali D. Kombade
,
B.B. Meshram
Impact of Model Mobility in Ad Hoc Routing Protocols
TAHAR ABBES Mounir
,
Senouci Mohamed
,
Kechar Bouabdellah.
Recent Advances of Distributed Optical Fiber Raman Amplifiers in Ultra Wide Wavelength Division Multiplexing Telecommunication Networks
Abd El–Naser A. Mohamed
,
Ahmed Nabih Zaki Rashed
,
Mahmoud M. A. Eid
Computation of Pheromone Values in AntNet Algorithm
Anuj K. Gupta
,
Harsh Sadawarti
,
Anil K. Verma
Threshold Based Kernel Level HTTP Filter (TBHF) for DDoS Mitigation
Mohamed Ibrahim AK
,
Lijo George
,
Kritika Govind
,
S. Selvakumar
Software Activation Using Multithreading
Jianrui Zhang
,
Mark Stamp
Performance of TCP Vegas, Bic and Reno Congestion Control Algorithms on Iridium Satellite Constellations
M.Nirmala
,
Ramachandra.V.Pujeri
Extended Queue Management Backward Congestion Control Algorithms for Web Transfers in Wireless Environment
V.Sinthu Janita Prakash
,
D.I.George Amalarethinam
,
E.George Dharma Prakash Raj
Performance Analysis of Black Hole Attack in Vanet
Vimal Bibhu
,
Kumar Roshan
,
Kumar Balwant Singh
,
Dhirendra Kumar Singh
Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks
Manjusha Pandey
,
Shekhar Verma
Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems
Zahra Atashbar Orang
,
Ezzat Moradpour
,
Ahmad Habibizad Navin
,
Amir Azimi Alasti Ahrabi
Go