|
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and Energy Depletion Parameters [ Pdf ]
S.Prabhakara Rao1, E.Nagabhooshanam2 and S.Ramesh Babu1, 1Nigama Engineering College, India and 2Sridevi Womens Engineering College, India
|
An Efficient Group Authentication for Group Communications [ Pdf ]
Lein Harn1 and Changlu Lin2, 1University of Missouri, USA and 2Fujian Normal University, P. R. China |
Password Based Scheme and Group Testing for Defending DDOS Attacks [ Pdf ]
G Dayanandam1, T V Rao2, S Pavan Kumar Reddy1 and Ravinuthala Sruthi1, 1QIS Institute of Technology (QISIT), India and 2KL University (KLU), India |
Security Algorithms for WIMAX [ Pdf ]
M Alzaabi1, K D Ranjeeth1, T Alukaidey1 and K Salman2, 1University of Hertfordshire, UK and 2Middle Tennessee State University, USA |
Hybrid Architecture for Distributed Intrusion Detection System in Wireless Network [ Pdf ]
Seyedeh Yasaman Rashida, Islamic Azad University Shirgah, Iran |
HTTPI Based Web Service Security over SOAP [ Pdf ]
Pankaj Choudhary, Rajendra Aaseri and Nirmal Roberts, ABV - Indian Institute of Information Technology & Management, India |
Implementation of a Security Protocol for Bluetooth and WI-FI [ Pdf ]
U. Pavan Kumar, Amity University, India |
Bearings Prognostic Using Mixture of Gaussians Hidden Markov Model and Support Vector Machine [ Pdf ]
Fatima Ezzahra Sloukia1, Rajae Bouarfa1, Hicham Medromi2 and Mohammed Wahbi1, 1SIR2C2S/LASI-EHTP, Morocco and 2Hassan II University, Morocco |
Trust Value Algorithm: A Secure Approach against Packet Drop Attack in Wireless Ad-Hoc Networks [ Pdf ]
Rajendra Aaseri, Pankaj Choudhary and Nirmal Roberts, ABV-Indian Institute of Information Technology, India |
Incident Response Plan for a Small to Medium Sized Hospital[ Pdf ]
Charles DeVoe and Syed (Shawon) M. Rahman, Capella University, USA |
Privacy Preserving Data Mining by using Implicit Function Theorem[ Pdf ]
Pasupuleti Rajesh1 and Gugulothu Narsimha2, 1VVIT College, India and 2JNTUH University, India. |
Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering Systems[ Pdf ]
Alexis V. Pantola1, Susan Pancho-Festin2 and Florante Salvador1, 1De La Salle University, Philippines and 2University of the Philippines,Philippines
|
Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks [ Pdf ]
Leelavathi G1, Shaila K2, Venugopal K R3 and L M Patnaik4, 1Govt.S.K.S.J.Technological Institute, India, 2Vivekananda Institute of Technology, India, 3University Visvesvaraya College of Engineering, India and 4Indian Institute of Science, India |
Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation[ Pdf ]
Andrew Rudder, Wayne Goodridge and Shareeda Mohammed, The University of the West Indies, Trinidad and Tobago. |
A 64 Bits Rotor Enhanced Block Cipher (Rebc3)[ Pdf ]
Ahmed ElShafee, Ahram Canadian University, Egypt. |
A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering[ Pdf ]
S.Lakshmi1 and V.Sankaranarayanan2, 1Jeppiaar Engineering College, India and 2Crescent Engineering College, India. |
Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment[ Pdf ]
Shalvi Dave1, Bhushan Trivedi2 and Jimit Mahadevia3, 1Indus University, India, 2GLSICT,India and 3Elitecore Technologies Pvt. Ltd., India |
Code Aware Dynamic Source Routing for Distributed Sensor Network[ Pdf ]
M Abdul Rahiman1, Nishanth Jain1, Arun K. Dubey2 and G Manoj Kumar3, 1AICTE, Ministry of HRD,Govt of India, India, 2Bharati Vidyapeeth College of Engineering, India and 3LBS Inst of Tech for Women, India. |
Resonance Based Micromechanical Cantilever for Gas Sensing[ Pdf ]
Subhashini. S1 and Vimala Juliet. A2, 1Sathyabama University, India and 2SRM University, India |
Traceback of DOS Over Autonomous Systems [ Pdf ]
Mohammed Alenezi and Martin J Reed, School of Computer Science and Electronic Engineering, University of Essex, UK |
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-hoc Network Environment[ Pdf ]
Vaishali D. Khairnar and Ketan Kotecha, Institute of Technology Nirma University, India |
A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries[ Pdf ]
Dexin Yang1, Chunjing Lin2 and Bo Yang2, 1Guangzhou City Polytechnic, China and 2Shaanxi Normal University, China |
Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour[ Pdf ]
Arpitha M1, Geetha V1,Gowranga K H2 and Bhakthavathsalam R2, 1Alpha College Of Engineering, India and 2Indian Institute of Science, India |
E-Commerce Systems Security for Small Businesses[ Pdf ]
Syed (Shawon) M. Rahman and Robert Lackey, Capella University, Minneapolis, USA. |
Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study [ Pdf ]
Natarajan Meghanathan, Jackson State University, USA |
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers [ Pdf ]
Kuo-Tsang Huang1, Jung-Hui Chiu1 and Sung-Shiou Shen2, 1Chang Gung University, Taiwan and 2DE LIN Institute of Technology, Taiwan |
An Integrated Solution for both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study [ Pdf ]
M Gnana Seelan and Ch AS Murty, Centre for Development of Advanced Computing - Hyderabad, India |
How to Find a Fixed Point in Shuffle Efficiently [ Pdf ]
Mikako Kageshima and ManabuOkamoto, Kanagawa Institute of Technology, Japan |
Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study [ Pdf ]
Aidarus M. Ibrahim, Hussein A. Hashi and Abdullalem A. Mohamed, University Technology Malaysia (UTM), Malaysia |
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines [ Pdf ]
A. M. Chandrashekhar1 and K. Raghuveer2, 1Sri Jayachamarajendra College of Engineering (SJCE), India and 2National Institute of Engineering (NIE) Mysore, India |
Text Steganographic Approaches: A Comparison [ Pdf ]
Monika Agarwal, PDPM-IIITDM Jabalpur, India |
|
IJNSA is listed in ERA 2012 as per the Australian Research Council (ARC) Journal Ranking. New
|