Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7

Научные статьи

В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
Assessing Query Translation Quality Using Back Translation in Hindi-English CLIR
Ganesh Chandra, Sanjay K. Dwivedi
Combining Different Approaches to Improve Arabic Text Documents Classification
Ibrahim S. I. Abuhaiba, Hassan M. Dawoud
Possibilistic Fuzzy Clustering for Categorical Data Arrays Based on Frequency Prototypes and Dissimilarity Measures
Zhengbing Hu, Yevgeniy V. Bodyanskiy, Oleksii K. Tyshchenko, Viktoriia O. Samitova
Challenges with Sentiment Analysis of On-line Micro-texts
Ritesh Srivastava, M.P.S. Bhatia
Sentiment Predictions using Support Vector Machines for Odd-Even Formula in Delhi
Sudhir Kumar Sharma, Ximi Hoque
MMeMeR: An Algorithm for Clustering Heterogeneous Data using Rough Set Theory
B.K. Tripathy, Akarsh Goyal, Rahul Chowdhury, Patra Anupam Sourav
A Hybrid Artificial Bee Colony and Harmony Search Algorithm to Generate Covering Arrays for Pair-wise Testing
Priti Bansal, Sangeeta Sabharwal, Nitish Mittal
Tree-Based Matched RFID Yoking Making It More Practical and Efficient
Hung-Yu Chien
A WMPLS Based Multicast Mechanism in Mobile Ad hoc Network
Li Mengyang, Duan Yunna, Zhang Chunfei
A New Secure Strategy in Small-Scale IEEE 802.11 Wireless Local Area Networks with Web Authentication and Virtual Local Area Network
Huiting Liu, Hua Zhang, Weilin Xu, Yigang Yang, Mengyuan Xu
Efficient Proxy Re-encryption with Private Keyword Searching in Untrusted Storage
Xi Chen, Yong Li
A Novel Framework to Carry Out Cloud Penetration Test
Jianbin Hu, Yonggang Wang, Cong Tang, Zhi Guan, Fengxian Ren, Zhong Chen
CSRF Vulnerabilities and Defensive Techniques
Rupali D. Kombade, B.B. Meshram
Improved Classification Methods for Brain Computer Interface System
YI Fang, LI Hao, JIN Xiaojie
Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms
M. Anand Kumar, S.Karthikeyan
Semifragile Watermarking Schemes for Image Authentication- A Survey
Archana Tiwari, Manisha Sharma
Evolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System
V.K. Narendira Kumar, B. Srinivasan
Distributed Algorithms for Improving Search Efficiency in P2P Overlays
Chittaranjan Hota, Vikram Nunia, Antti Ylä-Jääski
A Packet Routing Model for Computer Networks
O. Osunade
Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN
Manjusha Pandey, Shekhar Verma
An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks
S. Santhosh Baboo, K. Gokulraj
Battering Keyloggers and Screen Recording Software by Fabricating Passwords
Nairit Adhikary, Rohit Shrivastava, Ashwani Kumar, Sunil Kumar Verma, Monark Bag, Vrijendra Singh
Evaluating Overheads of Integrated Multilevel Checkpointing Algorithms in Cloud Computing Environment
Dilbag Singh, Jaswinder Singh, Amit Chhabra
Security Aspects and Challenges in Mobile Adhoc Networks
G. Jose Moses, P.Suresh Varma, N.Supriya, G.NagaSatish
Deliberate Secure Grid Computing Blueprint Design in Indian Context
Sanjeev Puri, Harsh Dev
UML Based Integrated Multilevel Checkpointing Algorithms for Cloud Computing Environment
Dilbag Singh, Jaswinder Singh, Amit Chhabra
Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment
Basappa B. Kodada, Gaurav Prasad, Alwyn R. Pais
A Procedure of Text Steganography Using Indian Regional Language
Indradip Banerjee, Souvik Bhattacharyya, Gautam Sanyal
Self Organized Replica Overlay Scheme for P2P Networks
Shashi Bhushan, Mayank Dave, R. B. Patel
Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques
Manish Mahajan, Navdeep Kaur
Risk Management Strategies for the Use of Cloud Computing
Chiang Ku Fan, Chen-Mei Fan Chiang, Tong Liang Kao
Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries
Jaskanwal Minhas, Raman Kumar
Integrated Safety Mechanisms Based on Security Risks Minimization for the Distributed Computer Systems
Vadym Mukhin, Artem Volokyta
Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP
Sounak Paul, Bimal Kumar Mishra
A Full-text Website Search Engine Powered by Lucene and The Depth First Search Algorithm
Modinat. A. Mabayoje, O. S. Oni, Olawale S. Adebayo
Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates
Alawi A. Al-Saggaf, Haridas Acharya
Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals
Zhukov Igor, Mikhaylov Dmitry, Starikovskiy Andrey, Kuznetsov Dmitry, Tolstaya Anastasia, Zuykov Alexander
Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System
G.Velmayil, S.Pannirselvam
Recent Replica Placement Algorithms in P2P Networks – A Review
Kala Karun. A, Jayasudha. J. S
Effect of Black Hole Attack on MANET Routing Protocols
Jaspal Kumar, M. Kulkarni, Daya Gupta