Table of Contents
Articles
| Integrating Check Pointing with Dynamic Shadow Approach for Fault Tolerance in Mobile Agents |
PDF
|
| Rahul Hans, Ramandeep Kaur | 591-597 |
| Integrating Security Model for Introducing Advanced Security in Mobile Agents |
PDF
|
| Rajan Sahota, Ramandeep Kaur | 598-602 |
| A Secure Scheme for Denial-of-Service Attacks in Wireless Sensor Networks |
PDF
|
| K. Pandi Karthi Kanmani, E. Srie Vidhya Janani, Dr.P. Ganesh Kumar | 603-607 |
| Identification of Security Requirements in Cloud Computing Models |
PDF
|
| J. Anitha Ruth, A. Meenakshi | 608-611 |
| A Survey on Tracking BOTNETS using Virtual HONEYPOTS |
PDF
|
| P. Subhapriya, V. Subashini, A. Umamaheswari | 612-615 |
| Filtering Spam in Cloud using Bayesian Algorithm |
PDF
|
| S. Metilda Florence, N. Praveen | 616-619 |
| Multimedia Conferencing and Data Collaboration Using Java Media Framework |
PDF
|
| Radhika Pai, Nutan Kamat, Sonali Naik, Soniya Chari, Rachel Dhanaraj | 620-625 |
| Optimized AQM Strategy to Encounter Low-Rate DoS Attacks |
PDF
|
| A. Karthik Velayudhan, S.A. Arunmozhi | 626-629 |
| An Effective Detection of Flooding Attacks using Decoy Hyperlinks |
PDF
|
| K. Munivara Prasad, M. Ganesh Karthik, E.S. Phalguna Krishna | 630-635 |
| An Approach towards Modeling and Detection of Camouflaging Worm using PSD Technique |
PDF
|
| H. Rajeshwari, Basavaraj G.Kudamble | 636-640 |
| Deploying Application in Cloud Environment with Multi Level Authentication and Disaster Recovery |
PDF
|
| Pradeep Gurunathan, Dr. Seethalakshmi Pandian, Arjun Murali, Mullainathan Subramanian | 641-644 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616