Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP
Sounak Paul, Bimal Kumar Mishra
A Full-text Website Search Engine Powered by Lucene and The Depth First Search Algorithm
Modinat. A. Mabayoje, O. S. Oni, Olawale S. Adebayo
A Framework for Real-Time Resource Allocation in IP Multimedia Subsystem Network
Muhammad Naeem, Sheneela Naz, Saira Gillani
Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks
Dilpreet Kaur, Naresh Kumar
Vulnerabilities in Academic E-governance Portals
Subhash Chander, Ashwani Kush
Formal Verification of Congestion Control Algorithm in VANETs
Mohamad Yusof Darus, Kamalrulnizam Abu Bakar
Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates
Alawi A. Al-Saggaf, Haridas Acharya
Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals
Zhukov Igor, Mikhaylov Dmitry, Starikovskiy Andrey, Kuznetsov Dmitry, Tolstaya Anastasia, Zuykov Alexander
Criteria Specifications for the Comparison and Evaluation of Access Control Models
Shabnam Mohammad Hasani, Nasser Modiri
A Bespoke Technique for Secret Messaging
Mahimn Pandya, Hiren Joshi, Ashish Jani
Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System
G.Velmayil, S.Pannirselvam
Recent Replica Placement Algorithms in P2P Networks – A Review
Kala Karun. A, Jayasudha. J. S
Social Networking for Botnet Command and Control
Ashutosh Singh, Annie H. Toderici, Kevin Ross, Mark Stamp
Enhancing the Discrete Particle Swarm Optimization based Workflow Grid Scheduling using Hierarchical Structure
Ritu Garg, Awadhesh Kumar Singh
Password Hardened Biometric: A Complete Solution of Online Security
Ajay Sharma, Deo Brat Ojha
Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers
P. Mabin Joseph, J. Rajan, K.K. Kuriakose, S.A.V. Satya Murty
A New Proposal for Route Finding in Mobile AdHoc Networks
H.Vignesh Ramamoorthy, D.Suganya Devi
Wi-Fi Networks Security and Accessing Control
Tarek S. Sobh
A Survey of Adaptive Gateway Discovery Mechanisms in Heterogeneous Networks
Rafi U Zaman, Khaleel ur Rahman Khan, A.Venugopal Reddy
Image Encryption based on the RGB PIXEL Transposition and Shuffling
Quist-Aphetsi Kester
Analysis of the SYN Flood DoS Attack
Mitko Bogdanoski, Tomislav Shuminoski, Aleksandar Risteski
Information Leakage Prevention Using Virtual Disk Drive
Tarek S. Sobh
A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer
Maria Sebastian, Arun Raj Kumar P.
Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It from Hackers
M. Milton Joe, R.S. Shaji, K. Ashok Kumar
Performance Analysis of AODV, CBRP, DSDV and DSR MANET Routing Protocol using NS2 Simulation
Awadhesh Kumar, Prabhat Singh, Vinay Kumar, Neeraj Tyagi
Dynamic Model on the Transmission of Malicious Codes in Network
Bimal Kumar Mishra, Apeksha Prajapati
Performance Improvement of Cache Management In Cluster Based MANET
Abdulaziz Zam, N. Movahedinia
KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69
Janailin Warjri, E. George Dharma Prakash Raj
Biometric based Security Solutions for MANET: A Review
Ajay Jangra, Shivi Goel
Triple Layered Encryption Algorithm for IEEE 802.11 WLANs in E-Government Services
M A Kabir, K A Sayeed, M A Matin, T Mehenaz, M Kamruzzaman
A New Model for Intrusion Detection based on Reduced Error Pruning Technique
Mradul Dhakar, Akhilesh Tiwari
A New Distributed and Power-Efficient Topology Control Algorithm for Wireless Ad-Hoc Networks
Saeid Taghavi Afshord, Bager Zarei, Bahman Arasteh
Fuzzy Membership Function in a Trust Based AODV for MANET
Partha Sarathi Banerjee, J. Paulchoudhury, S. R. Bhadra Chaudhuri
Performance Evaluation of AODV under Blackhole Attack
Tarunpreet Bhatia, A.K. Verma
Study and Analysis of Text Steganography Tools
Indradip Banerjee, Souvik Bhattacharyya, Gautam Sanyal
A New QUERY-REPLY Driven Routing Protocol with Reachability Analysis for Mobile Networks: DAG based Approach
Paulami Dey, Parag Kumar Guha Thakurta
Performance Evaluation and Comparison of Network Firewalls under DDoS Attack
Chirag Sheth, Rajesh Thakker
Textual Manipulation for SQL Injection Attacks
Hussein AlNabulsi, Izzat Alsmadi, Mohammad Al-Jarrah
Auto-Pattern Programmable Kernel Filter (Auto-PPKF) for Suppression of Bot Generated Traffic
Kritika Govind, S. Selvakumar
A Novel Approach of Text Steganography using Nonlinear Character Positions (NCP)
Sabyasachi Samanta, Saurabh Dutta, Goutam Sanyal