Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Asymptotic Stability Analysis of E-speed Start Congestion Control Protocol for TCP
Oyeyinka I.K., Akinwale A.T., Folorunso O., Olowofela J.A., Oluwatope A.
A Hierarchical Load Balancing Policy for Grid Computing Environment
Said Fathy El-Zoghdy
Battering Keyloggers and Screen Recording Software by Fabricating Passwords
Nairit Adhikary, Rohit Shrivastava, Ashwani Kumar, Sunil Kumar Verma, Monark Bag, Vrijendra Singh
Evaluating Overheads of Integrated Multilevel Checkpointing Algorithms in Cloud Computing Environment
Dilbag Singh, Jaswinder Singh, Amit Chhabra
Congestion Control in 4G Wireless Networks Using Coalition Game
S. V. Saboji, C. B. Akki
An Analytical Assessment on Document Clustering
Pushplata, Ram Chatterjee
QSWMCA - Quality of Service in Wireless Mesh Networks by Configuration Arguments
N.Kannaiya Raja, R. Saritha, A.Senthamaraiselvan, K. Arulanandam
Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks
Manjusha Pandey, Shekhar Verma
Toward Security Test Automation for Event Driven GUI Web Contents
Izzat Alsmadi, Ahmed AlEroud
Security Aspects and Challenges in Mobile Adhoc Networks
G. Jose Moses, P.Suresh Varma, N.Supriya, G.NagaSatish
Deliberate Secure Grid Computing Blueprint Design in Indian Context
Sanjeev Puri, Harsh Dev
UML Based Integrated Multilevel Checkpointing Algorithms for Cloud Computing Environment
Dilbag Singh, Jaswinder Singh, Amit Chhabra
Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment
Basappa B. Kodada, Gaurav Prasad, Alwyn R. Pais
Distributed Encrypting File System for Linux in User-space
U. S. Rawat, Shishir Kumar
Mining Data Streams using Option Trees
B.Reshma Yusuf, P.Chenna Reddy
Routers Sequential Comparing Two Sample Packets for Dropping Worms
Kannaiyaraja, Babu, Senthamaraiselvan, Arulandam
Self Organized Replica Overlay Scheme for P2P Networks
Shashi Bhushan, Mayank Dave, R. B. Patel
Securing Zone Routing Protocol in Ad-Hoc Networks
Ibrahim S. I. Abuhaiba, Hanan M. M. Abu-Thuraia
Constraint Based Periodicity Mining in Time Series Databases
Ramachandra.V.Pujeri, G.M.Karthik
Impact of Model Mobility in Ad Hoc Routing Protocols
TAHAR ABBES Mounir, Senouci Mohamed, Kechar Bouabdellah
A Survey: Recent Advances and Future Trends in Honeypot Research
Matthew L. Bringer, Christopher A. Chelmecki, Hiroshi Fujinoki
An Effective and Secure Cipher Based on SDDO
Bac Do Thi, Minh Nguyen Hieu, Duy Ho Ngoc
Data Sharing for Context-Sensitive Access Control Policy Evaluation and Enforcement
Hassan Rasheed
Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework
Irshad Ahmad Mir, S.M.K Quadri
Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems
Zahra Atashbar Orang, Ezzat Moradpour, Ahmad Habibizad Navin, Amir Azimi Alasti Ahrabim, Mir Kamal Mirnia
A New 512 Bit Cipher for Secure Communication
M. Anand Kumar, S.Karthikeyan
Feature Based Audio Steganalysis (FAS)
Souvik Bhattacharyya, Gautam Sanyal
Software Activation Using Multithreading
Jianrui Zhang, Mark Stamp
Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks
Ibrahim S. I. Abuhaiba, Huda B. Hubboub
Threshold Based Kernel Level HTTP Filter (TBHF) for DDoS Mitigation
Mohamed Ibrahim AK, Lijo George, Kritika Govind, S. Selvakumar
Performance of TCP Vegas, Bic and Reno Congestion Control Algorithms on Iridium Satellite Constellations
M.Nirmala, Ramachandra.V.Pujeri
Risk Management Strategies for the Use of Cloud Computing
Chiang Ku Fan, Chen-Mei Fan Chiang, Tong Liang Kao
Exponential Brute-Force Complexity of A Permutation Based Stream Cipher
Mohammed Omari, Hamdy S. Soliman
Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks
IBalasaheb N. Jagdale, Nileema S. Gawande
Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks
P.Periyasamy, E.Karthikeyan
Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks
S.Sheeja, Ramachandra.V.Pujeri
Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption
Poonam Jindal, Brahmjit Singh
An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN
Harjot Bawa, Parminder Singh, Rakesh Kumar
Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries
Jaskanwal Minhas, Raman Kumar
Integrated Safety Mechanisms Based on Security Risks Minimization for the Distributed Computer Systems
Vadym Mukhin, Artem Volokyta