首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Network Security & Its Applications
ISSN Print: 0975-2307
ISSN Online:
主页:
http://airccse.org/journal/ijnsa.html
分享:
Go
Using Bias Optimiazation for Reversible Data Hiding using Image Interpolation
Andrew Rudder
,
Wayne Goodridge
,
Shareeda Mohammed
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
Kuo-Tsang Huang
,
Jung-Hui Chiu
,
Sung-Shiou Shen
Incident Response Plan for a Small to Medium Sized Hospital
Charles DeVoe
,
Syed (Shawon) M. Rahman
An Integrated Solution for both Monitoring and Controlling for Automization Using Wireless Sensor Networks: A Case Study
M Gnana Seelan
,
Ch A S Murty
A 64 Bits Rotor Enhanced Block Cipher (Rebc3)
Ahmed ElShafee
Code Aware Dynamic Source Routing for Distributed Sensor Network
M Abdul Rahiman
,
Nishanth Jain
,
Arun K. Dubey
,
G Manoj Kumar
Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment
Shalvi Dave
,
Bhushan Trivedi
,
Jimit Mahadevia
Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour
Arpitha M
,
Geetha V
,
Gowranga K H
,
Bhakthavathsalam R
E-Commerce Systems Security for Small Businesses
Syed (Shawon) M. Rahman
,
Robert Lackey
Traceback of DOS Over Autonomous Systems
Mohammed Alenezi and Martin J Reed
Privacy Preserving Data Mining by using Implicit Function Theorem
Pasupuleti Rajesh
,
Gugulothu Narsimha
How to Find a Fixed Point in Shuffle Efficiently
Mikako Kageshima
,
ManabuOkamoto
Ontology-Driven Information Retrieval for Healthcare Information System : A Case Study
Aidarus M. Ibrahim
,
Hussein A. Hashi
,
Abdullalem A. Mohamed
Resonance Based Micromechanical Cantilever for Gas Sensing
Subhashini. S
,
Vimala Juliet. A
A Robust Background Removal Algortihms Using Fuzzy C-Means Clustering
S.Lakshmi
,
V.Sankaranarayanan
Fortification of Hybrid Intrusion Detection System Using Variants of Neural Networks and Support Vector Machines
A. M. Chandrashekhar
,
K. Raghuveer
A Novel Secure Cosine Similarity Computation Scheme with Malicious Adversaries
Dexin Yang
,
Chunjing Lin
,
Bo Yang
Tulungan: A Slandering-Resistant Reputation System for Collaborative Web Filtering Systems
Alexis V. Pantola
,
Susan Pancho-Festin
,
Florante Salvador
Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study
Natarajan Meghanathan
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicular Ad-hoc Network Environment
Vaishali D. Khairnar
,
Ketan Kotecha
Text Steganographic Approaches: A Comparison
Monika Agarwal
Design Issues on Software Aspects and Simulation Tools for Wireless Sensor Networks
Leelavathi G
,
Shaila K
,
Venugopal K R
,
L M Patnaik
Non-Profit Organizations' Need to Address Security for Effective Government Contracting
Lee E. Rice
,
Syed (Shawon) M. Rahman
Evaluation of Security Attacks on UMTS Authentication Mechanism
Mojtaba Ayoubi Mobarhan
,
Mostafa Ayoubi Mobarhan
,
Asadollah Shahbahrami
An Implementation of Intrusion Detection System Using Genetic Algorithm
Mohammad Sazzadul Hoque
,
Md. Abdul Mukit
,
Md. Abu Naser Bikas
LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs
Shaik Sahil Babuand
,
Arnab Raha
,
M.K.Naskar
Comprehensive Comparison of VoIP SIP Protocol Problems and Cisco VoIP System
TALAL AL-KHAROBI
,
Mohmmed Abduallah Al-Mehdhar
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security
Minal Moharir
,
A V Suresh
Cloud Computing Security in Business Information Systems
Sasko Ristov
,
Marjan Gusev
,
Magdalena Kostoska
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine
Besma Othmani
,
Mohsen Machhout
,
Houcine Mejri
,
Hafedh Belmabrouk
Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security
S. Sree Vivek
,
S. Sharmila Deva Selvi
,
V. Radhakishan
,
C. Pandu Rangan
The New Age of Computer Virus and Their Detection
Nitesh Kumar Dixit
,
Mahendra Singh Charan
,
Bhabesh Kumar Dey
,
Lokesh mishra
The Effect of the Number of Mobile Nodes on Varying Speeds of MANETS
John Tengviel
,
K. Diawuo
,
K. A. Dotche
Protected Data Objects Replication in Data Grid
G. Aruna Kranthi
,
D. Shashi Rekha
A Generic Framework for Device Pairing in Ubiquitous Computing Environments
Yasir Arfat Malkani
,
Dan Chalmers
,
,
Ian Wakeman
,
Lachhman Das Dhomeja
Wireless Public Key Infrastructure for Mobile Phones
Balachandra Muniyal
,
Krishna Prakash
,
Shashank Sharma
Provable Secure Identity Based Signcryption Schemes without Random Oracles
Prashant Kushwah
,
Sunder Lal
Lattice Based Tools in Cryptanalysis for Public Key Cryptography
R.Santosh Kumar
,
C.Narasimham
,
S.Pallam Setty
Dominant Features Identification for Covert Nodes in 9/11 Attack Using their Profile
S.Karthika
,
A.Kiruthiga
,
S.Bose
A Comparative Study of the Traditional Model of IEEE 802.15.4 and Non-Overlapping Binary Exponential Backoff IEEE 802.15.4
Archit Verma Pushpinder Singh Patheja
,
Akhilesh Waoo
Identification of Image Spam by Using Low Level & Metadata Features
Anand Gupta
,
,
Somya Aggarwal
,
Chhavi Singhal
Risks and Remedies in E-Learning System
Nikhilesh Barik
,
Sunil Karforma
Cross Layer Intrusion Detection System for Wireless Sensor Network
Djallel Eddine Boubiche
,
Azeddine Bilami
RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Merad Boudia Omar Rafik
,
Feham Mohamed
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network
G.Padmavathi
,
P.Subashini
,
D.Devi Aruna
Review on IPv6 Security Vulnerability Issues and Mitigation Methods
Supriyanto
,
Raja Kumar Murugesan
,
Sureswaran Ramadass
A Bayesian Classification on Asset Vulnerability for Real Time Reduction of False Positives in Ids
G.Jacob Victor
,
M Sreenivasa Rao
,
V.CH. Venkaiah
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks
Sridhar Subramanian
,
Baskaran Ramachandran
Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography
Arpita Sarkar
,
Sachin Tripathi
Healthcare IT: Is Your Information At Risk?
Kimmarie Donahue
,
Alireza Nemaney Pour
Go