Vol 2, No 5 (2015)

Table of Contents

Vol 2, No 5 (2015)

Survey Article

A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems
Muhammet Baykara, Resul Das
 Vol 2, No 5 (2015), Pagination: 203-211
ABSTRACT |  PDF Abstract Views: 350  |  PDF Views: 0

Research Articles

A Fine-Grained Spatial Cloaking With Query Probability Levels for Privacy in LBS
Albelaihy Abdullah, Jonathan Cazalas
 Vol 2, No 5 (2015), Pagination: 212-221
ABSTRACT |  PDF Abstract Views: 428  |  PDF Views: 0
Efficient Collaborative Technique using Intrusion Detection System for Preserving Privacy in Location-Based Services
Muhammad Jawad Ikram, Jonathan Cazalas
 Vol 2, No 5 (2015), Pagination: 222-231
ABSTRACT |  PDF Abstract Views: 322  |  PDF Views: 0
Application of Modified ACO Meta heuristic in Spray and Wait Routing
R. Vinuraj, Sweta Jain
 Vol 2, No 5 (2015), Pagination: 232-241
ABSTRACT |  PDF Abstract Views: 307  |  PDF Views: 0