Vol 4, No 10 (2012)

Regular Issue

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents

Articles

Integrating Check Pointing with Dynamic Shadow Approach for Fault Tolerance in Mobile Agents PDF
Rahul Hans, Ramandeep Kaur 591-597
Integrating Security Model for Introducing Advanced Security in Mobile Agents PDF
Rajan Sahota, Ramandeep Kaur 598-602
A Secure Scheme for Denial-of-Service Attacks in Wireless Sensor Networks PDF
K. Pandi Karthi Kanmani, E. Srie Vidhya Janani, Dr.P. Ganesh Kumar 603-607
Identification of Security Requirements in Cloud Computing Models PDF
J. Anitha Ruth, A. Meenakshi 608-611
A Survey on Tracking BOTNETS using Virtual HONEYPOTS PDF
P. Subhapriya, V. Subashini, A. Umamaheswari 612-615
Filtering Spam in Cloud using Bayesian Algorithm PDF
S. Metilda Florence, N. Praveen 616-619
Multimedia Conferencing and Data Collaboration Using Java Media Framework PDF
Radhika Pai, Nutan Kamat, Sonali Naik, Soniya Chari, Rachel Dhanaraj 620-625
Optimized AQM Strategy to Encounter Low-Rate DoS Attacks PDF
A. Karthik Velayudhan, S.A. Arunmozhi 626-629
An Effective Detection of Flooding Attacks using Decoy Hyperlinks PDF
K. Munivara Prasad, M. Ganesh Karthik, E.S. Phalguna Krishna 630-635
An Approach towards Modeling and Detection of Camouflaging Worm using PSD Technique PDF
H. Rajeshwari, Basavaraj G.Kudamble 636-640
Deploying Application in Cloud Environment with Multi Level Authentication and Disaster Recovery PDF
Pradeep Gurunathan, Dr. Seethalakshmi Pandian, Arjun Murali, Mullainathan Subramanian 641-644


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616