Table of Contents
Vol 2, No 9 (2010)
Open Access
Subscription Access
Articles
Optimal Solution for Finding Secured Routes in Mobile Ad-Hoc Networks | ||
R. P. Shyni Vinse, K. John Singh, R. Manimegalai | ||
Vol 2, No 9 (2010), Pagination: 281-285 | ||
ABSTRACT | PDF | Abstract Views: 215 | PDF Views: 3 |
Measuring Sustainable Development:Theory and Application | ||
Joshua O. Miluwi | ||
Vol 2, No 9 (2010), Pagination: 286-290 | ||
ABSTRACT | PDF | Abstract Views: 207 | PDF Views: 4 |
Data Model Framework for Intruder Information Sharing in Sensor Networks | ||
K. Venkatesh Sharma, K. Hanumantha Rao, Vannoj Ravi Kumar | ||
Vol 2, No 9 (2010), Pagination: 291-300 | ||
ABSTRACT | PDF | Abstract Views: 201 | PDF Views: 4 |
An Effective Anomaly Intrusion Detection Using Statistical Change Point Detection | ||
M. Thangavel, P. Thangaraj | ||
Vol 2, No 9 (2010), Pagination: 301-307 | ||
ABSTRACT | PDF | Abstract Views: 228 | PDF Views: 4 |
Importance of IDPF to Avoid DDoS Attacks | ||
Srikar, K. Hanumantha Rao, K. Venkatesh Sharma | ||
Vol 2, No 9 (2010), Pagination: 308-318 | ||
ABSTRACT | PDF | Abstract Views: 193 | PDF Views: 4 |
Comparison of M/M/1 and M/M(A,B)/1 Markov Models Using Matlab to Find Performance of Wired and Wireless Technologies in Client Server Applications by Applying Cryptography and Steganography | ||
V. B. Kirubanand, S. Palaniammal | ||
Vol 2, No 9 (2010), Pagination: 319-322 | ||
ABSTRACT | PDF | Abstract Views: 207 | PDF Views: 4 |
Security Enhancement of Multimedia System by Means of Novel Multiple Huffman Tables Approach | ||
P. Raveendra Babu, V. Praveen Kumar, M. Samuel John, J. Ranga Rao | ||
Vol 2, No 9 (2010), Pagination: 323-327 | ||
ABSTRACT | PDF | Abstract Views: 225 | PDF Views: 3 |
Dynamic Routing with Security Considerations | ||
K. Venkatesh Sharma, K. Hanumantha Rao, B. Satish Kumar | ||
Vol 2, No 9 (2010), Pagination: 328-337 | ||
ABSTRACT | PDF | Abstract Views: 219 | PDF Views: 3 |
Mitigating Denial-Of-Service Attacks on the Chord Overlay Network:A Location Hiding Approach | ||
K. Venkatesh Sharma, K. Hanumantha Rao, K. Ramu | ||
Vol 2, No 9 (2010), Pagination: 338-354 | ||
ABSTRACT | PDF | Abstract Views: 222 | PDF Views: 3 |
Enhancing Peer to Peer Performance Using Sandwich Methodology | ||
M. Sadish Sendil, N. Nagarajan | ||
Vol 2, No 9 (2010), Pagination: 355-358 | ||
ABSTRACT | PDF | Abstract Views: 166 | PDF Views: 3 |
Measurement of Denial of Service Attacks Using New Metrics | ||
P. Kavithapandian, S. Muthukumar, Kannan Balasubramanian | ||
Vol 2, No 9 (2010), Pagination: 359-364 | ||
ABSTRACT | PDF | Abstract Views: 200 | PDF Views: 3 |
LSB and DCT Based Steganography in Safe Message Routing and Delivery for Structured Peer-To-Peer Systems | ||
G. Satyavathy, M. Punithavalli | ||
Vol 2, No 9 (2010), Pagination: 365-369 | ||
ABSTRACT | PDF | Abstract Views: 223 | PDF Views: 3 |