Open Access
Subscription or Fee Access
Table of Contents
Articles
Intrusion Detection System Using BCO and Genetic Algorithm and a Comparison with ACO | |
Harsimran Kaur, Usvir Kaur, Dr. Dheerendra Singh | 265-269 |
Database Migration along with Architecture using Bee Colony Optimization | |
Amarjit Kaur, Usvir Kaur, Dr. Dheerendra Singh | 270-273 |
Secure Auditing Method for Cloud Computing | |
S. Srinivasan, K. Raja | 274-278 |
A Diffserv-Aware Multi-Protocol Label Switching Traffic Engineering Applied on Virtual Private Networks | |
Ayman E. A. Abdelaal, Fathi E. Abd El-Samie, Moawad I. Dessouky | 279-285 |
Implementation of TCP/IP using pSOS | |
M. Meena | 286-290 |
Edifice of Remedy Network Plinth on Side Effects with Allege for Remedy Deputy | |
C. Bala Saravanan | 291-294 |
Space Wave Optical Fixed Link and Data Communication Services in Rural Environments | |
A. P. Kaur, G. Aujla | 295-300 |
A New Approach to Improve the Performance of Dynamic Distributed Networks | |
Shahram Jamali, Khadije Hourali | 301-306 |
Acknowledged Routing using Cluster Based Approach in Wireless Sensor Network | |
Sudhakar S. Jadhav, Sonal A. Bankar | 307-311 |
Ontology of Cloud Computing Service, Technology, and Security | |
G. Sathishkumar, B.R. Laxmi Sree | 312-315 |
A Novel Client Side Intrusion Detection and Response Framework | |
B. Padhmavathi, M. Jyotheeswar Arvind, G. Ritikesh | 316-321 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616