

Table of Contents
Articles
Integrating Check Pointing with Dynamic Shadow Approach for Fault Tolerance in Mobile Agents |
PDF
![]() |
Rahul Hans, Ramandeep Kaur | 591-597 |
Integrating Security Model for Introducing Advanced Security in Mobile Agents |
PDF
![]() |
Rajan Sahota, Ramandeep Kaur | 598-602 |
A Secure Scheme for Denial-of-Service Attacks in Wireless Sensor Networks |
PDF
![]() |
K. Pandi Karthi Kanmani, E. Srie Vidhya Janani, Dr.P. Ganesh Kumar | 603-607 |
Identification of Security Requirements in Cloud Computing Models |
PDF
![]() |
J. Anitha Ruth, A. Meenakshi | 608-611 |
A Survey on Tracking BOTNETS using Virtual HONEYPOTS |
PDF
![]() |
P. Subhapriya, V. Subashini, A. Umamaheswari | 612-615 |
Filtering Spam in Cloud using Bayesian Algorithm |
PDF
![]() |
S. Metilda Florence, N. Praveen | 616-619 |
Multimedia Conferencing and Data Collaboration Using Java Media Framework |
PDF
![]() |
Radhika Pai, Nutan Kamat, Sonali Naik, Soniya Chari, Rachel Dhanaraj | 620-625 |
Optimized AQM Strategy to Encounter Low-Rate DoS Attacks |
PDF
![]() |
A. Karthik Velayudhan, S.A. Arunmozhi | 626-629 |
An Effective Detection of Flooding Attacks using Decoy Hyperlinks |
PDF
![]() |
K. Munivara Prasad, M. Ganesh Karthik, E.S. Phalguna Krishna | 630-635 |
An Approach towards Modeling and Detection of Camouflaging Worm using PSD Technique |
PDF
![]() |
H. Rajeshwari, Basavaraj G.Kudamble | 636-640 |
Deploying Application in Cloud Environment with Multi Level Authentication and Disaster Recovery |
PDF
![]() |
Pradeep Gurunathan, Dr. Seethalakshmi Pandian, Arjun Murali, Mullainathan Subramanian | 641-644 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616