Table of Contents
Articles
| Efficient Compressed Video Communication |
PDF
|
| E. M. El-Bakary, O. Zahran, S. EL-Rabaie, F. E. Abd El-Samie | 219-226 |
| Most Wanted Content Management Systems for Website Development |
PDF
|
| Bhumika S. Zalavadia | 227-231 |
| Comparative Study of the Right Protocol for Best Routing Path |
PDF
|
| Paramjeet Singh Sandhu, Manparveen Singh, Kamaljit Singh Bhatia | 232-236 |
| An Effective and Secure Key Management Scheme in Multiphase Cryptosystem |
PDF
|
| Manoj Kumar Pandey, Prateeksha Pandey | 237-242 |
| Analysis of MANET for Different Mobility Models using Four Ray Propagation Model |
PDF
|
| N. S. Samshette, A. D. Bhoi, Dr. R. D. Kharadkar | 243-248 |
| Statistical Behavior of Packet Counts for Network Intrusion Detection |
PDF
|
| Rania A. Ghazy, El-Sayed M. El-Rabaie, Moawad I. Dessouky, Nawal A. El-Feshawy, Fathi E. Abd El-Samie | 249-252 |
| Collaborative Study on Recent Advances and Future Trends in Honeypot, Denial-of-Service Attack (DoS) and Distributed Denial-of-Service Attack (DDoS) |
PDF
|
| Shilpi Singh, Dr. Sweta Verma, Dr. A.K. Khare | 253-259 |
| Mixing Substitution and Transposition Method for Enhancing Security |
PDF
|
| Tanvi Tanvi | 260-262 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616