首页
OALib 期刊
OALib 预印
快速投稿通道
排名
新闻
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Network Security & Its Applications
ISSN Print: 0975-2307
ISSN Online:
主页:
http://airccse.org/journal/ijnsa.html
分享:
Go
Code Aware Dynamic Source Routing for Distributed Sensor Network
M Abdul Rahiman
,
Nishanth Jain
,
Arun K. Dubey
,
G Manoj Kumar
A 64 Bits Rotor Enhanced Block Cipher (Rebc3)
Ahmed ElShafee
Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation
Andrew Rudder
,
Wayne Goodridge
,
Shareeda Mohammed
Traceback of DOS Over Autonomous Systems
Mohammed Alenezi and Martin J Reed
A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering
S.Lakshmi
,
V.Sankaranarayanan
Privacy Preserving Data Mining by using Implicit Function Theorem
Pasupuleti Rajesh
,
Gugulothu Narsimha
Incident Response Plan for a Small to Medium Sized Hospital
Charles DeVoe
,
Syed (Shawon) M. Rahman
E-Commerce Systems Security for Small Businesses
Syed (Shawon) M. Rahman
,
Robert Lackey
Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour
Arpitha M
,
Geetha V
,
Gowranga K H
,
Bhakthavathsalam R
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
Kuo-Tsang Huang
,
Jung-Hui Chiu
,
Sung-Shiou Shen
Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment
Shalvi Dave
,
Bhushan Trivedi
,
Jimit Mahadevia
Resonance Based Micromechanical Cantilever for Gas Sensing
Subhashini. S
,
Vimala Juliet. A
How to Find a Fixed Point in Shuffle Efficiently
Mikako Kageshima
,
ManabuOkamoto
Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study
Aidarus M. Ibrahim
,
Hussein A. Hashi
,
Abdullalem A. Mohamed
An Integrated Solution for both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study
M Gnana Seelan
,
Ch A S Murty
Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study
Natarajan Meghanathan
Text Steganographic Approaches: A Comparison
Monika Agarwal
Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering Systems
Alexis V. Pantola
,
Susan Pancho-Festin
,
Florante Salvador
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines
A. M. Chandrashekhar
,
K. Raghuveer
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-hoc Network Environment
Vaishali D. Khairnar
,
Ketan Kotecha
A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries
Dexin Yang
,
Chunjing Lin
,
Bo Yang
Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks
Leelavathi G
,
Shaila K
,
Venugopal K R
,
L M Patnaik
The Effect of the Number of Mobile Nodes on Varying Speeds of MANETS
John Tengviel
,
K. Diawuo
,
K. A. Dotche
Non-Profit Organizations' Need to Address Security for Effective Government Contracting
Lee E. Rice
,
Syed (Shawon) M. Rahman
Evaluation of Security Attacks on UMTS Authentication Mechanism
Mojtaba Ayoubi Mobarhan
,
Mostafa Ayoubi Mobarhan
,
Asadollah Shahbahrami
Cross Layer Intrusion Detection System for Wireless Sensor Network
Djallel Eddine Boubiche
,
Azeddine Bilami
Risks and Remedies in E-Learning System
Nikhilesh Barik
,
Sunil Karforma
An Implementation of Intrusion Detection System Using Genetic Algorithm
Mohammad Sazzadul Hoque
,
Md. Abdul Mukit
,
Md. Abu Naser Bikas
LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs
Shaik Sahil Babuand
,
Arnab Raha
,
M.K.Naskar
A Generic Framework for Device Pairing in Ubiquitous Computing Environments
Yasir Arfat Malkani
,
Dan Chalmers
,
,
Ian Wakeman
,
Lachhman Das Dhomeja
Design and Evaluation of a New Fair Exchange Protocol Based on an Online TTP
Abdullah AlOtaibi
,
Hamza Aldabbas
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine
Besma Othmani
,
Mohsen Machhout
,
Houcine Mejri
,
Hafedh Belmabrouk
Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security
S. Sree Vivek
,
S. Sharmila Deva Selvi
,
V. Radhakishan
,
C. Pandu Rangan
Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography
Arpita Sarkar
,
Sachin Tripathi
Secured RFID Mutual Authentication Scheme for Mifare Systems
Kuo-Tsang Huang
,
Jung-Hui Chiu
RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Merad Boudia Omar Rafik
,
Feham Mohamed
Protected Data Objects Replication in Data Grid
G. Aruna Kranthi
,
D. Shashi Rekha
Passblot: A Highly Scalable Graphical one Time Password System
Sainath Gupta
,
Shashank Sahni
,
Pruthvi Sabbu
,
Suryakanth V Gangashetty
Security Threats Analysis in Bluetooth-Enabled Mobile Devices
Robayet Nasim
The New Age of Computer Virus and Their Detection
Nitesh Kumar Dixit
,
Mahendra Singh Charan
,
Bhabesh Kumar Dey
,
Lokesh mishra
Identification of Image Spam by Using Low Level & Metadata Features
Anand Gupta
,
,
Somya Aggarwal
,
Chhavi Singhal
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks
Sridhar Subramanian
,
Baskaran Ramachandran
How to Avoid the N-1 Attack Without Costly Implementations
David Tinoco Varela
Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution
Abudhahir Buhari
,
Zuriati Ahmad Zukarnain
,
Shamala K. Subramaniam
,
Hisham Zainuddin
Comparison of High Speed Congestion Control Protocols
Jawhar Ben Abed
,
Laarif Sinda
,
Mohamed Ali Mani
,
Rachid Mbarek
Dominant Features Identification for Covert Nodes in 9/11 Attack Using their Profile
S.Karthika
,
A.Kiruthiga
,
S.Bose
Lattice Based Tools in Cryptanalysis for Public Key Cryptography
R.Santosh Kumar
,
C.Narasimham
,
S.Pallam Setty
Review on IPv6 Security Vulnerability Issues and Mitigation Methods
Supriyanto
,
Raja Kumar Murugesan
,
Sureswaran Ramadass
Provable Secure Identity Based Signcryption Schemes without Random Oracles
Prashant Kushwah
,
Sunder Lal
An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks
A. Forootaninia
,
M. B. Ghaznavi-Ghoushchi
Go