Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Addressing the Bandwidth issue in End-to-End Header Compression over IPv6 Tunneling Mechanism
Dipti Chauhan, Sanjay Sharma
SMAODV: A Novel Smart Protocol for Routing in Ad-hoc Wireless Networks Using the PageRank Algorithm
Ali Gozali, Keivan Borna
QoS Comparison of MANET Routing Protocols
Tarunpreet Bhatia, A.K. Verma
Artificially Augmented Training for Anomaly-based Network Intrusion Detection Systems
Chockalingam Karuppanchetty, William Edmonds, Sun-il Kim, Nnamdi Nwanze
A Cross Layer for Detection and Ignoring Black Hole Attack in MANET
Azza Mohammed, Boukli Hacene Sofiane, Faraoun kamel Mohamed
An Encryption Technique based upon Encoded Multiplier with Controlled Generation of Random Numbers
Sanjay Kumar Pal, Suman De
CUDA based Rabin-Karp Pattern Matching for Deep Packet Inspection on a Multicore GPU
Jyotsna Sharma, Maninder Singh
Data Traffic Modeling During Global Cyberattacks
Volodymyr Mosorov, Andrzej Kosowski, Roman Kolodiy, Zenoviy Kharkhalis
Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks
Bindiya Bhatia, M.K.Soni, Parul Tomar
A Novel Approach for Optimization Auto-Scaling in Cloud Computing Environment
Khosro Mogouie, Mostafa Ghobaei Arani, Mahboubeh Shamsi
Multiple Information Hiding using Cubical Approach on Random Grids
Sandeep Gurung, Kritartha Paul Choudhury, Arindam Parmar, Kshitij Panghaal
Performance Evaluation of AODV and GOD for Qos Aware Applications through Realistic Conditions in VANET
Richa Sharma, Jyoteesh Malhotra
An Innovative Approach for Video Steganography
Koumal Kaushik, Suman
The New Block Cipher Design (Tigris Cipher)
Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohsen J. Abdul Hossen
Optimization of Value of Parameters in Ad-hoc on Demand Multipath Distance Vector Routing Using Magnetic Optimization Algorithm
A K Giri, D K Lobiyal, C P Katti
Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System
Rajendra Gupta, Piyush Kumar Shukla
A Content based Image Retrieval Framework Using Color Descriptor
Abdelkhalak Bahri, Hamid Zouaki
Secure Allocation of Resources in Cloud Using Trust
Usha Divakarla, K. Chandrasekaran
Performance Evaluation of IPv4/IPv6 Transition Mechanisms
Adira Quintero, Francisco Sans, Eric Gamess
Dynamic Fair Priority Optimization Task Scheduling Algorithm in Cloud Computing: Concepts and Implementations
Deepika Saxena, R.K. Chauhan, Ramesh Kait
Multicast Due Date Round-Robin Scheduling Algorithm for Input-Queued Switches
Navaz K, Kannan Balasubramanian
CEAACK – A Reduced Acknowledgment for Better Data Transmission for MANETs
J.Sathiamoorthy, B.Ramakrishnan
Double Layer Image Security System using Encryption and Steganography
Samreen Sekhon Brar, Ajitpal Brar
A Stable Backbone-Based on Demand Multipath Routing Protocol for Wireless Mobile Ad Hoc Networks
Sujata V. Mallapur, Siddarama R. Patil, Jayashree V. Agarkhed
An Analysis of Link Disjoint and Node Disjoint Multipath Routing for Mobile Ad Hoc Network
Indrani Das, D.K. Lobiyal, C.P.Katti
Avoidance and Mitigation of All Packet Drop Attacks in MANET using Enhanced AODV with Cryptography
Nitin Khanna
Formal Verification of NTRUEncrypt Scheme
Gholam Reza Moghissi, Ali Payandeh
Design of a Robust, Computation-Efficient and Secure 3P-EKE Protocol using Analogous Message Transmission
Archana Raghuvamshi, Premchand Parvataneni
A Review on Multiple Survey Report of Cloud Adoption and its Major Barriers in the Perspective of Bangladesh
Md. Masudul Islam, Mijanur Rahaman
Analyzing Multiple Routing Configuration
Meenakshi Moza, Suresh Kumar
Addressing Packet Forwarding Misbehavior with Two Phase Security Scheme for AODV-based MANETs
Ankit D. Patel, Rutvij H. Jhaveri
A System Call Randomization Based Method for Countering Code-Injection Attacks
Zhaohui Liang, Bin Liang, Lupin Li
Primary-Backup Access Control Scheme for Securing P2P File-Sharing Systems
Jianfeng Lu, Ruixuan Li, Zhengding Lu, Xiaopu Ma
Clustering in Wireless Sensor Networks- A Survey
Sukhkirandeep Kaur, Roohie Naaz Mir
Application of Combinatory Mechanism on RTOS UFS ACM for Risk Optimization
Padma Lochan Pradhan
An Improved Hybrid Mechanism for Secure Data Communication
Sangeeta Dhall, Bharat Bhushan, Shailender Gupta
DNA-Genetic Encryption Technique
Hamdy M. Mousa
Hierarchical Matching for Chinese Calligraphic Retrieval Using Skeleton Similarity
Jie Chen, Fuxi Zhu
Spam Reduction by using E-mail History and Authentication (SREHA)
Adwan F. Yasin
Password Security: An Analysis of Password Strengths and Vulnerabilities
Katha Chanda