Vol 2, No 9 (2010)

Table of Contents

Vol 2, No 9 (2010)

Open Access Open Access  Restricted Access Subscription Access

Articles

Optimal Solution for Finding Secured Routes in Mobile Ad-Hoc Networks
R. P. Shyni Vinse, K. John Singh, R. Manimegalai
 Vol 2, No 9 (2010), Pagination: 281-285
ABSTRACT |  PDF     Abstract Views: 137  |  PDF Views: 3
Measuring Sustainable Development:Theory and Application
Joshua O. Miluwi
 Vol 2, No 9 (2010), Pagination: 286-290
ABSTRACT |  PDF     Abstract Views: 147  |  PDF Views: 4
Data Model Framework for Intruder Information Sharing in Sensor Networks
K. Venkatesh Sharma, K. Hanumantha Rao, Vannoj Ravi Kumar
 Vol 2, No 9 (2010), Pagination: 291-300
ABSTRACT |  PDF     Abstract Views: 149  |  PDF Views: 4
An Effective Anomaly Intrusion Detection Using Statistical Change Point Detection
M. Thangavel, P. Thangaraj
 Vol 2, No 9 (2010), Pagination: 301-307
ABSTRACT |  PDF     Abstract Views: 155  |  PDF Views: 4
Importance of IDPF to Avoid DDoS Attacks
Srikar, K. Hanumantha Rao, K. Venkatesh Sharma
 Vol 2, No 9 (2010), Pagination: 308-318
ABSTRACT |  PDF     Abstract Views: 131  |  PDF Views: 4
Comparison of M/M/1 and M/M(A,B)/1 Markov Models Using Matlab to Find Performance of Wired and Wireless Technologies in Client Server Applications by Applying Cryptography and Steganography
V. B. Kirubanand, S. Palaniammal
 Vol 2, No 9 (2010), Pagination: 319-322
ABSTRACT |  PDF     Abstract Views: 140  |  PDF Views: 4
Security Enhancement of Multimedia System by Means of Novel Multiple Huffman Tables Approach
P. Raveendra Babu, V. Praveen Kumar, M. Samuel John, J. Ranga Rao
 Vol 2, No 9 (2010), Pagination: 323-327
ABSTRACT |  PDF     Abstract Views: 147  |  PDF Views: 3
Dynamic Routing with Security Considerations
K. Venkatesh Sharma, K. Hanumantha Rao, B. Satish Kumar
 Vol 2, No 9 (2010), Pagination: 328-337
ABSTRACT |  PDF     Abstract Views: 158  |  PDF Views: 3
Mitigating Denial-Of-Service Attacks on the Chord Overlay Network:A Location Hiding Approach
K. Venkatesh Sharma, K. Hanumantha Rao, K. Ramu
 Vol 2, No 9 (2010), Pagination: 338-354
ABSTRACT |  PDF     Abstract Views: 148  |  PDF Views: 3
Enhancing Peer to Peer Performance Using Sandwich Methodology
M. Sadish Sendil, N. Nagarajan
 Vol 2, No 9 (2010), Pagination: 355-358
ABSTRACT |  PDF     Abstract Views: 114  |  PDF Views: 3
Measurement of Denial of Service Attacks Using New Metrics
P. Kavithapandian, S. Muthukumar, Kannan Balasubramanian
 Vol 2, No 9 (2010), Pagination: 359-364
ABSTRACT |  PDF     Abstract Views: 145  |  PDF Views: 3
LSB and DCT Based Steganography in Safe Message Routing and Delivery for Structured Peer-To-Peer Systems
G. Satyavathy, M. Punithavalli
 Vol 2, No 9 (2010), Pagination: 365-369
ABSTRACT |  PDF     Abstract Views: 160  |  PDF Views: 3