Данные - 004.6

Научные статьи

В разделе "Данные"
Threshold Based Kernel Level HTTP Filter (TBHF) for DDoS Mitigation
Mohamed Ibrahim AK, Lijo George, Kritika Govind, S. Selvakumar
A Full-text Website Search Engine Powered by Lucene and The Depth First Search Algorithm
Modinat. A. Mabayoje, O. S. Oni, Olawale S. Adebayo
Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks
Dilpreet Kaur, Naresh Kumar
Effect of Black Hole Attack on MANET Routing Protocols
Jaspal Kumar, M. Kulkarni, Daya Gupta
Performance Analysis of Route Discovery by Cross Layer Routing Protocol- RDCLRP
Mehajabeen Fatima, Roopam Gupta, T.K.Bandhopadhyay
Performance Evaluation of AODV under Blackhole Attack
Tarunpreet Bhatia, A.K. Verma
Visualization of Influencing Nodes in Online Social Networks
Prajit Limsaiprom, Prasong Praneetpolgrang, Pilastpongs Subsermsri
Scrum and Temporal Distance-Based Global Software Development
Asmaa Fowzi Alotaibi, M. Rizwan Jameel Qureshi
Optimal Route Based Advanced Algorithm using Hot Link Split Multi-Path Routing Algorithm
Akhilesh A. Waoo, Sanjay Sharma, Manjhari Jain
Congestion Control in WMSNs by Reducing Congestion and Free Resources to Set Accurate Rates and Priority
Akbar Majidi, Hamid Mirvaziri
Artificial Intrusion Detection Techniques: A Survey
Ashutosh Gupta, Bhoopesh Singh Bhati, Vishal Jain
OpenFlow Technology: A Journey of Simulation Tools
Rakesh k. Jha, Pooja Kharga, Idris Z. Bholebawa, Sangeet Satyarthi, Anuradha, Shashi Kumari
Mean Response Time Approximation for HTTP Transactions over Transport Protocols
Y. –J. Lee
Linear Crossed Cube (LCQ): A New Interconnection Network Topology for Massively Parallel System
Zaki A. Khan, Jamshed Siddiqui, Abdus Samad
Secure Usable Authentication Using Strong Pass text Passwords
C. Shoba Bindu
DNS Pharming through PHP Injection: Attack Scenario and Investigation
Divya Rishi Sahu, Deepak Singh Tomar
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning
Alaeddin Almubayed, Ali Hadi, Jalal Atoum
An Extended Approach for Efficient Data Storage in Cloud Computing Environment
Fatemeh shieh, Mostafa Ghobaei Arani, Mahboubeh Shamsi
A Hybrid Real-time Zero-day Attack Detection and Analysis System
Ratinder Kaur, Maninder Singh
Multiple Information Hiding using Cubical Approach on Random Grids
Sandeep Gurung, Kritartha Paul Choudhury, Arindam Parmar, Kshitij Panghaal
A Content based Image Retrieval Framework Using Color Descriptor
Abdelkhalak Bahri, Hamid Zouaki
Intrusion Detection with Multi-Connected Representation
Abdelkader Khobzaoui, Abderrahmane Yousfate
Performance Evaluation of IPv4/IPv6 Transition Mechanisms
Adira Quintero, Francisco Sans, Eric Gamess
Dynamic Fair Priority Optimization Task Scheduling Algorithm in Cloud Computing: Concepts and Implementations
Deepika Saxena, R.K. Chauhan, Ramesh Kait
Avoidance and Mitigation of All Packet Drop Attacks in MANET using Enhanced AODV with Cryptography
Nitin Khanna
Primary-Backup Access Control Scheme for Securing P2P File-Sharing Systems
Jianfeng Lu, Ruixuan Li, Zhengding Lu, Xiaopu Ma
Low Level Performance Evaluation of InfiniBand with Benchmarking Tools
Eric Gamess, Humberto Ortiz-Zuazaga
AuMID: An Authentication Mechanism based on Identity Tag under Future Internet Architecture
Ming Wan, Ying Liu, Hongke Zhang
A Hybrid P2P Approach to Service Discovery in the Cloud
Jing Zhou, Nor Aniza Abdullah, Zhongzhi Shi
Discrete Simulation of the Remote Access to the Resources of a Virtual Research Laboratory
Radi Romansky
A New Centrality Measure for Tracking Online Community in Social Network
Sanjiv Sharma, G.N. purohit
Solving Web-based Applications Architectural Problems in the Cloud: The Way Forward
Philip Achimugu, Oluwatolani Oluwagbemi, Ishaya Gambo
Image Classification using Support Vector Machine and Artificial Neural Network
Le Hoang Thai, Tran Son Hai, Nguyen Thanh Thuy
Identity Verification Mechanism for Detecting Fake Profiles in Online Social Networks
Ali M. Meligy, Hani M. Ibrahim, Mohamed F. Torky
Proposal of Implicit Coordination Model for Performance Enhancement Using Sprint Zero
M. Rizwan Jameel Qureshi, Ahmed Barnawi, Aiesha Ahmad
Determining the Optimum Time Quantum Value in Round Robin Process Scheduling Method
Shahram Saeidi, Hakimeh Alemi Baktash
Using Web Services Standards for Dealing with Complexities of Multiple Incompatible Applications
Quist-Aphetsi Kester, Ghartey Nana Gyankumah, Ajibade Ibrahim Kayode
Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers
G. Ramesh, R. Umarani
An Integrated Knowledge Base System Architecture for Histopathological Diagnosis of Breast Diseases
Aderonke A. Kayode, Babajide S.Afolabi, Kayode A. Adelusola
Evaluation of Secure Cloud Transmission Protocol
Dinesha H.A, D.H.Rao