Open Access
Subscription or Fee Access
Table of Contents
Articles
Optimal Solution for Finding Secured Routes in Mobile Ad-Hoc Networks | |
R. P. Shyni Vinse, K. John Singh, Dr. R. Manimegalai | 281-285 |
Measuring Sustainable Development: Theory and Application | |
Dr. Joshua O. Miluwi | 286-290 |
Data Model Framework for Intruder Information Sharing in Sensor Networks | |
K. Venkatesh Sharma, K. Hanumantha Rao, Vannoj Ravikumar | 291-300 |
An Effective Anomaly Intrusion Detection Using Statistical Change Point Detection | |
M. Thangavel, Dr. P. Thangaraj | 301-307 |
Importance of IDPF to Avoid DDoS Attacks | |
CH. Srikar, K. Hanumantha Rao, K. Venkatesh Sharma | 308-318 |
Security Enhancement of Multimedia System by Means of Novel Multiple Huffman Tables Approach | |
P. Raveendra Babu, V. Praveen Kumar, M. Samuel John, J. Ranga Rao | 323-327 |
Dynamic Routing with Security Considerations | |
K. Venkatesh Sharma, K. Hanumantha Rao, B. Satish Kumar | 328-337 |
Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach | |
K. Venkatesh Sharma, K. Hanumantha Rao, K. Ramu | 338-354 |
Enhancing Peer to Peer Performance Using Sandwich Methodology | |
M. Sadish Sendil, Dr. N. Nagarajan | 355-358 |
Measurement of Denial of Service Attacks Using New Metrics | |
P. Kavithapandian, S. Muthukumar, Dr. Kannan Balasubramanian | 359-364 |
LSB and DCT Based Steganography in Safe Message Routing and Delivery for Structured Peer-To-Peer Systems | |
G. Satyavathy, M. Punithavalli | 365-369 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616