Analysis of the SYN Flood DoS Attack
Mitko Bogdanoski,
Tomislav Shuminoski,
Aleksandar Risteski
Study and Analysis of Text Steganography Tools
Indradip Banerjee,
Souvik Bhattacharyya,
Gautam Sanyal
Textual Manipulation for SQL Injection Attacks
Hussein AlNabulsi,
Izzat Alsmadi,
Mohammad Al-Jarrah
A Generic Middleware Model for Smart Home
Madhusudanan J.,
Hariharan S.,
Manian A. Selvan,
V. Prasanna Venkatesan
VoIP Performance Analysis over IPv4 and IPv6
Monjur Ahmed,
Alan T Litchfield,
Shakil Ahmed,
Adnan Mahmood,
Md. Emran Hossain Meazi
OpenFlow Technology: A Journey of Simulation Tools
Rakesh k. Jha,
Pooja Kharga,
Idris Z. Bholebawa,
Sangeet Satyarthi,
Anuradha,
Shashi Kumari
Embedded Real-Time HTTP Server
Radosław Czarnecki,
Stanislaw Deniziak
A Note on Group Authentication Schemes
Mohsen Pourpouneh,
Rasoul Ramezanian,
Afshin Zarei