Table of Contents
Vol 8, No 8 (2016)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
Ways to Use Mobile Phones Safely | ||
Bhumika S. Zalavadia | ||
Vol 8, No 8 (2016), Pagination: 283-285 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 191 | PDF Views: 2 |
Reliability Analysis of Distributed Computing System using Fault Tree Analysis | ||
R. Gupta, Dr. P. K. Yadav | ||
Vol 8, No 8 (2016), Pagination: 286-291 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 223 | PDF Views: 2 |
A Guide to Ethical Hacking Attacks and Recent Tools | ||
B.L. Anupama, Arya Vijayakumaran Nair, Bastian Babu | ||
Vol 8, No 8 (2016), Pagination: 292-297 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 213 | PDF Views: 2 |
Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks | ||
Anupriya K Haridas, Sneha Johnson | ||
Vol 8, No 8 (2016), Pagination: 298-300 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 225 | PDF Views: 3 |
Discovering and Depurating Scheme for Wormhole Attack in Wireless Mesh Network | ||
Sruthy O. Damodaran, Sindhu S Nair | ||
Vol 8, No 8 (2016), Pagination: 301-304 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 213 | PDF Views: 2 |
An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics | ||
K.H. Aparna, M.B. Shyjith | ||
Vol 8, No 8 (2016), Pagination: 305-308 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 248 | PDF Views: 2 |