Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Artificially Augmented Training for Anomaly-based Network Intrusion Detection Systems
A Cross Layer for Detection and Ignoring Black Hole Attack in MANET
An Encryption Technique based upon Encoded Multiplier with Controlled Generation of Random Numbers
CUDA based Rabin-Karp Pattern Matching for Deep Packet Inspection on a Multicore GPU
Data Traffic Modeling During Global Cyberattacks
Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks
A Novel Approach for Optimization Auto-Scaling in Cloud Computing Environment
Multiple Information Hiding using Cubical Approach on Random Grids
Performance Evaluation of AODV and GOD for Qos Aware Applications through Realistic Conditions in VANET
An Innovative Approach for Video Steganography
The New Block Cipher Design (Tigris Cipher)
Optimization of Value of Parameters in Ad-hoc on Demand Multipath Distance Vector Routing Using Magnetic Optimization Algorithm
Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System
A Content based Image Retrieval Framework Using Color Descriptor
Secure Allocation of Resources in Cloud Using Trust
Performance Evaluation of IPv4/IPv6 Transition Mechanisms
Dynamic Fair Priority Optimization Task Scheduling Algorithm in Cloud Computing: Concepts and Implementations
Multicast Due Date Round-Robin Scheduling Algorithm for Input-Queued Switches
CEAACK – A Reduced Acknowledgment for Better Data Transmission for MANETs
Double Layer Image Security System using Encryption and Steganography
A Stable Backbone-Based on Demand Multipath Routing Protocol for Wireless Mobile Ad Hoc Networks
An Analysis of Link Disjoint and Node Disjoint Multipath Routing for Mobile Ad Hoc Network
Avoidance and Mitigation of All Packet Drop Attacks in MANET using Enhanced AODV with Cryptography
Formal Verification of NTRUEncrypt Scheme
Design of a Robust, Computation-Efficient and Secure 3P-EKE Protocol using Analogous Message Transmission
A Review on Multiple Survey Report of Cloud Adoption and its Major Barriers in the Perspective of Bangladesh
Analyzing Multiple Routing Configuration
Addressing Packet Forwarding Misbehavior with Two Phase Security Scheme for AODV-based MANETs
A System Call Randomization Based Method for Countering Code-Injection Attacks
Primary-Backup Access Control Scheme for Securing P2P File-Sharing Systems
Clustering in Wireless Sensor Networks- A Survey
Application of Combinatory Mechanism on RTOS UFS ACM for Risk Optimization
An Improved Hybrid Mechanism for Secure Data Communication
DNA-Genetic Encryption Technique
Hierarchical Matching for Chinese Calligraphic Retrieval Using Skeleton Similarity
Spam Reduction by using E-mail History and Authentication (SREHA)
Password Security: An Analysis of Password Strengths and Vulnerabilities
Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks
Realization of Efficient High Throughput Buffering Policies for Network on Chip Router
A Novel Architecture for Adaptive Traffic Control in Network on Chip using Code Division Multiple Access Technique