Table of Contents
Vol 2, No 5 (2015)
Survey Article
A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems | ||
Muhammet Baykara, Resul Das | ||
Vol 2, No 5 (2015), Pagination: 203-211 | ||
ABSTRACT | PDF | Abstract Views: 350 | PDF Views: 0 |
Research Articles
A Fine-Grained Spatial Cloaking With Query Probability Levels for Privacy in LBS | ||
Albelaihy Abdullah, Jonathan Cazalas | ||
Vol 2, No 5 (2015), Pagination: 212-221 | ||
ABSTRACT | PDF | Abstract Views: 428 | PDF Views: 0 |
Efficient Collaborative Technique using Intrusion Detection System for Preserving Privacy in Location-Based Services | ||
Muhammad Jawad Ikram, Jonathan Cazalas | ||
Vol 2, No 5 (2015), Pagination: 222-231 | ||
ABSTRACT | PDF | Abstract Views: 322 | PDF Views: 0 |
Application of Modified ACO Meta heuristic in Spray and Wait Routing | ||
R. Vinuraj, Sweta Jain | ||
Vol 2, No 5 (2015), Pagination: 232-241 | ||
ABSTRACT | PDF | Abstract Views: 307 | PDF Views: 0 |