Vol 6, No 6 (2014)

Table of Contents

Vol 6, No 6 (2014)

Open Access Open Access  Restricted Access Subscription Access

Articles

Efficient Compressed Video Communication
E. M. El-Bakary, O. Zahran, S. EL-Rabaie, F. E. Abd El-Samie
 Vol 6, No 6 (2014), Pagination: 219-226
ABSTRACT |  PDF     Abstract Views: 160  |  PDF Views: 2
Most Wanted Content Management Systems for Website Development
Bhumika S. Zalavadia
 Vol 6, No 6 (2014), Pagination: 227-231
ABSTRACT |  PDF     Abstract Views: 168  |  PDF Views: 3
Comparative Study of the Right Protocol for Best Routing Path
Paramjeet Singh Sandhu, Manparveen Singh, Kamaljit Singh Bhatia
 Vol 6, No 6 (2014), Pagination: 232-236
ABSTRACT |  PDF     Abstract Views: 173  |  PDF Views: 2
An Effective and Secure Key Management Scheme in Multiphase Cryptosystem
Manoj Kumar Pandey, Prateeksha Pandey
 Vol 6, No 6 (2014), Pagination: 237-242
ABSTRACT |  PDF     Abstract Views: 158  |  PDF Views: 2
Analysis of MANET for Different Mobility Models Using Four Ray Propagation Model
N. S. Samshette, A. D. Bhoi, R. D. Kharadkar
 Vol 6, No 6 (2014), Pagination: 243-248
ABSTRACT |  PDF     Abstract Views: 165  |  PDF Views: 2
Statistical Behavior of Packet Counts for Network Intrusion Detection
Rania A. Ghazy, El-Sayed M. El-Rabaie, Moawad I. Dessouky, Nawal A. El-Feshawy, Fathi E. Abd El-Samie
 Vol 6, No 6 (2014), Pagination: 249-252
ABSTRACT |  PDF     Abstract Views: 151  |  PDF Views: 2
Collaborative Study on Recent Advances and Future Trends in Honeypot, Denial-of-Service Attack (DoS) and Distributed Denial-Of-Service Attack (DDoS)
Shilpi Singh, Sweta Verma, A. K. Khare
 Vol 6, No 6 (2014), Pagination: 253-259
ABSTRACT |  PDF     Abstract Views: 161  |  PDF Views: 2
Mixing Substitution and Transposition Method for Enhancing Security
Tanvi
 Vol 6, No 6 (2014), Pagination: 260-262
ABSTRACT |  PDF     Abstract Views: 181  |  PDF Views: 2