

Table of Contents
Articles
Efficient Compressed Video Communication |
PDF
![]() |
E. M. El-Bakary, O. Zahran, S. EL-Rabaie, F. E. Abd El-Samie | 219-226 |
Most Wanted Content Management Systems for Website Development |
PDF
![]() |
Bhumika S. Zalavadia | 227-231 |
Comparative Study of the Right Protocol for Best Routing Path |
PDF
![]() |
Paramjeet Singh Sandhu, Manparveen Singh, Kamaljit Singh Bhatia | 232-236 |
An Effective and Secure Key Management Scheme in Multiphase Cryptosystem |
PDF
![]() |
Manoj Kumar Pandey, Prateeksha Pandey | 237-242 |
Analysis of MANET for Different Mobility Models using Four Ray Propagation Model |
PDF
![]() |
N. S. Samshette, A. D. Bhoi, Dr. R. D. Kharadkar | 243-248 |
Statistical Behavior of Packet Counts for Network Intrusion Detection |
PDF
![]() |
Rania A. Ghazy, El-Sayed M. El-Rabaie, Moawad I. Dessouky, Nawal A. El-Feshawy, Fathi E. Abd El-Samie | 249-252 |
Collaborative Study on Recent Advances and Future Trends in Honeypot, Denial-of-Service Attack (DoS) and Distributed Denial-of-Service Attack (DDoS) |
PDF
![]() |
Shilpi Singh, Dr. Sweta Verma, Dr. A.K. Khare | 253-259 |
Mixing Substitution and Transposition Method for Enhancing Security |
PDF
![]() |
Tanvi Tanvi | 260-262 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616