Browse Title Index


 
Issue Title
 
Vol 5, No 1 (2017) A Brief Review on Localization in Wireless Sensor Network Abstract
Priyanka Rajput, Madhukar Dubey
 
Vol 2, No 3 (2014) A Comparative Analysis of Attacks in Wireless Network Abstract
Amruth. V, Jeril Kuriakose, Sri Lakshmi M. D., Afshanaaz Khan, Aysha .
 
Vol 3, No 3 (2015) A Comparative Analysis of Sleep Deprivation Attack in AODV Abstract
Navneet Sandhu, Meenu Talwar
 
Vol 2, No 2 (2014) A Comprehensive Methodology for Data Security and Privacy in Cloud Computing Systems Abstract
Abid Hussain Wani
 
Vol 4, No 2 (2016) A Game Theory Approach to Enhance Routing and Security in MANET Abstract
E. Edwin Lawrence, R. Latha
 
Vol 3, No 3 (2015) A Grade Based Scheme to Detect Malicious Nodes in Delay Tolerant Networks Abstract
Divya Bansal, Ajay Jangra
 
Vol 1, No 1 (2013) A Novel Approach for Adjustment of CH in Energy Efficient routing Protocol (LEACH) for Wireless Sensor Network Abstract
Jay R. Bhadeshiya, Prof. Vishal S. Vora
 
Vol 3, No 2 (2015) A Reputation based Scheme to Detect a Black Hole Attack in MANET Abstract
Suman Lata
 
Vol 3, No 2 (2015) A Review on Tree Formation Technique in Wireless Sensor Network Abstract
Sagar Varsani
 
Vol 3, No 2 (2015) A Threshold Based Scheme to Detect Black Hole Attack in DTN Abstract
Heena Bhutani, Vishal Garg
 
Vol 1, No 1 (2013) Adapting LSB Method on Bit-Plane for High-embedding Ratio of Steganography Abstract
Anjan Kumar Payra
 
Vol 2, No 1 (2014) An Approach to Develop Secure Ear Biometric System Abstract
Md. Rabiul Islam, Md. Mostafizur Rahman, Rizoan Toufiq
 
Vol 4, No 2 (2016) An Enhance Approach to Mitigate the Impact of Black Hole and Gray Hole Attacks in AODV Routing Protocol Abstract
Amit Nakum, J.H. Joshi
 
Vol 4, No 3 (2016) An Innovative Methodology to Detect and Prevent Black Hole Attacks in Wireless Sensor Networks Abstract
Avneet Kaur, Mandeep Kaur
 
Vol 4, No 1 (2016) Attacks in Wireless Sensor Networks: Security Issues and Challenges Abstract
Chander Diwaker, Gagandeep Gogna
 
Vol 2, No 1 (2014) Behavioral Prediction of Network Attacks Using Honeypot Rules Abstract
Saranya K
 
Vol 2, No 3 (2014) Call Admission Control in ATM Networks using Interval Arithmetic CEN Abstract
Hemantaraj M. Kelagadi, Rajashekar B. Shettar, Priyatam Kumar
 
Vol 4, No 1 (2016) Comparison of Different Routing Protocols by Varying Transmission Power Abstract
Vinod Singh Uchchariya, Madhav Singh
 
Vol 3, No 2 (2015) Contact-Based Routing to Improve Delivery Ratio in DTN Abstract
Monika Aneja, Vishal Garg
 
Vol 4, No 2 (2016) Conversion of IPv4 to IPv6 Network with Performance Concerns Abstract
Archana K Luye, Greeshma Thomas, Rosemol Jose, Rosmin K.M., Sandra Jose, Sreetha Bose, T.D. Subhash
 
Vol 5, No 2 (2017) Customer Experience Administration Insights Abstract
Trupti Hiremath, K. C. Narasimhamurthy
 
Vol 4, No 3 (2016) Design and Performance Comparison of Secure Routing Protocol in Integrated UMTS and WLAN Ad Hoc Networks Abstract
Shashank Tripathi, A.K. Jain
 
Vol 3, No 1 (2015) Design of Wide Area Network Based on Packet Tracer Abstract
Hitesh D. Jaiswal, Pramodkumar P. Gupta
 
Vol 4, No 2 (2016) Detection and Prevention of Grey-hole Attack in MANET Abstract
Pooja Jangra, Chander Diwakar
 
Vol 5, No 2 (2017) Detection and Prevention of Sybil Attack using Artificial Bee Colony Algorithm in Proximity of Closeness Centrality Abstract
Harpreet Kaur, Sumit Miglani
 
1 - 25 of 64 Items 1 2 3 > >> 


ISSN: 2395–6739