Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review
Classification via Clustering for Anonymization Data
Research on Application of Perceived QoS Guarantee through Infrastructure Specific Traffic Parameter Optimization
BDCC: Backpressure routing and dynamic prioritization for congestion control in WMSNs
A Comparative Survey on Optical Burst Switched Network Simulators
RSUs Deployment Using Parallel Scheduling
Energy Conservation for Ad Hoc On-Demand Distance Vector Multipath Routing Protocol
Improved Anonymization Algorithms for Hiding Sensitive Information in Hybrid Information System
A Detailed Analysis of Grain family of Stream Ciphers
The Rating Mechanism for the Trusted Relationship Establishment for the Security of the Distributed Computer Systems
Scrum and Temporal Distance-Based Global Software Development
Comparative Performance Analysis of AODV and AODV-MIMC Routing Protocols for Mobile Ad hoc Networks
Router-based Content-aware Data Redirection for Future CDN Systems
ECCO Mnemonic Authentication—Two-Factor Authentication Method with Ease-of-Use
Performance Comparison of Single and Multiple Watermarking Techniques
Mobility Based Cluster Head Selection Algorithm for Mobile Ad-Hoc Network
Task Assignment for Heterogeneous Computing Problems using Improved Iterated Greedy Algorithm
Feature Selection for Modeling Intrusion Detection
Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks
Accelerating the Response of Query in Semantic Web
Security, Privacy and Trust Challenges in Cloud Computing and Solutions
Analysis of Host-Based and Network-Based Intrusion Detection System
Optimal Route Based Advanced Algorithm using Hot Link Split Multi-Path Routing Algorithm
A New Classification Scheme for Intrusion Detection Systems
SysProp: A Web-based Data Backup, Synchronization and System Administration
Effect of Maintenance on Computer Network Reliability
Congestion Control in WMSNs by Reducing Congestion and Free Resources to Set Accurate Rates and Priority
C2DF: High Rate DDOS filtering method in Cloud Computing
Artificial Intrusion Detection Techniques: A Survey
SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks
A Smart and Generic Secured Storage Model for Web based Systems
Trust Metric based Soft Security in Mobile Pervasive Environment
Cellular Automata based Encrypted ECG-hash Code Generation: An Application in Inter human Biometric Authentication System
An Improved Trusted Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Implementation of Risk Management with SCRUM to Achieve CMMI Requirements
OpenFlow Technology: A Journey of Simulation Tools
Detection Block Model for SQL Injection Attacks
A Comprehensive Analysis of Android Security and Proposed Solutions
An Architecture for Alert Correlation Inspired By a Comprehensive Model of Human Immune System
A Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET