![Open Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Articles
Optimal Solution for Finding Secured Routes in Mobile Ad-Hoc Networks |
PDF
![]() |
R. P. Shyni Vinse, K. John Singh, Dr. R. Manimegalai | 281-285 |
Measuring Sustainable Development: Theory and Application |
PDF
![]() |
Dr. Joshua O. Miluwi | 286-290 |
Data Model Framework for Intruder Information Sharing in Sensor Networks |
PDF
![]() |
K. Venkatesh Sharma, K. Hanumantha Rao, Vannoj Ravikumar | 291-300 |
An Effective Anomaly Intrusion Detection Using Statistical Change Point Detection |
PDF
![]() |
M. Thangavel, Dr. P. Thangaraj | 301-307 |
Importance of IDPF to Avoid DDoS Attacks |
PDF
![]() |
CH. Srikar, K. Hanumantha Rao, K. Venkatesh Sharma | 308-318 |
Security Enhancement of Multimedia System by Means of Novel Multiple Huffman Tables Approach |
PDF
![]() |
P. Raveendra Babu, V. Praveen Kumar, M. Samuel John, J. Ranga Rao | 323-327 |
Dynamic Routing with Security Considerations |
PDF
![]() |
K. Venkatesh Sharma, K. Hanumantha Rao, B. Satish Kumar | 328-337 |
Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach |
PDF
![]() |
K. Venkatesh Sharma, K. Hanumantha Rao, K. Ramu | 338-354 |
Enhancing Peer to Peer Performance Using Sandwich Methodology |
PDF
![]() |
M. Sadish Sendil, Dr. N. Nagarajan | 355-358 |
Measurement of Denial of Service Attacks Using New Metrics |
PDF
![]() |
P. Kavithapandian, S. Muthukumar, Dr. Kannan Balasubramanian | 359-364 |
LSB and DCT Based Steganography in Safe Message Routing and Delivery for Structured Peer-To-Peer Systems |
PDF
![]() |
G. Satyavathy, M. Punithavalli | 365-369 |
![Creative Commons License](http://i.creativecommons.org/l/by/3.0/80x15.png)
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616