Vol 8, No 8 (2016)

Table of Contents

Vol 8, No 8 (2016)

Open Access Open Access  Restricted Access Subscription Access

Articles

Ways to Use Mobile Phones Safely
Bhumika S. Zalavadia
 Vol 8, No 8 (2016), Pagination: 283-285
ABSTRACT |  PDF     Abstract Views: 171  |  PDF Views: 2
Reliability Analysis of Distributed Computing System using Fault Tree Analysis
R. Gupta, Dr. P. K. Yadav
 Vol 8, No 8 (2016), Pagination: 286-291
ABSTRACT |  PDF     Abstract Views: 195  |  PDF Views: 2
A Guide to Ethical Hacking Attacks and Recent Tools
B.L. Anupama, Arya Vijayakumaran Nair, Bastian Babu
 Vol 8, No 8 (2016), Pagination: 292-297
ABSTRACT |  PDF     Abstract Views: 187  |  PDF Views: 2
Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
Anupriya K Haridas, Sneha Johnson
 Vol 8, No 8 (2016), Pagination: 298-300
ABSTRACT |  PDF     Abstract Views: 198  |  PDF Views: 3
Discovering and Depurating Scheme for Wormhole Attack in Wireless Mesh Network
Sruthy O. Damodaran, Sindhu  S Nair
 Vol 8, No 8 (2016), Pagination: 301-304
ABSTRACT |  PDF     Abstract Views: 185  |  PDF Views: 2
An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics
K.H. Aparna, M.B. Shyjith
 Vol 8, No 8 (2016), Pagination: 305-308
ABSTRACT |  PDF     Abstract Views: 222  |  PDF Views: 2