

Table of Contents
Articles
Intrusion Detection System Using BCO and Genetic Algorithm and a Comparison with ACO |
PDF
![]() |
Harsimran Kaur, Usvir Kaur, Dr. Dheerendra Singh | 265-269 |
Database Migration along with Architecture using Bee Colony Optimization |
PDF
![]() |
Amarjit Kaur, Usvir Kaur, Dr. Dheerendra Singh | 270-273 |
Secure Auditing Method for Cloud Computing |
PDF
![]() |
S. Srinivasan, K. Raja | 274-278 |
A Diffserv-Aware Multi-Protocol Label Switching Traffic Engineering Applied on Virtual Private Networks |
PDF
![]() |
Ayman E. A. Abdelaal, Fathi E. Abd El-Samie, Moawad I. Dessouky | 279-285 |
Implementation of TCP/IP using pSOS |
PDF
![]() |
M. Meena | 286-290 |
Edifice of Remedy Network Plinth on Side Effects with Allege for Remedy Deputy |
PDF
![]() |
C. Bala Saravanan | 291-294 |
Space Wave Optical Fixed Link and Data Communication Services in Rural Environments |
PDF
![]() |
A. P. Kaur, G. Aujla | 295-300 |
A New Approach to Improve the Performance of Dynamic Distributed Networks |
PDF
![]() |
Shahram Jamali, Khadije Hourali | 301-306 |
Acknowledged Routing using Cluster Based Approach in Wireless Sensor Network |
PDF
![]() |
Sudhakar S. Jadhav, Sonal A. Bankar | 307-311 |
Ontology of Cloud Computing Service, Technology, and Security |
PDF
![]() |
G. Sathishkumar, B.R. Laxmi Sree | 312-315 |
A Novel Client Side Intrusion Detection and Response Framework |
PDF
![]() |
B. Padhmavathi, M. Jyotheeswar Arvind, G. Ritikesh | 316-321 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616