|
|
Volume 5 Issue 1 January 2013 |
- Detection of Selfish and Malicious Nodes in Mobile Adhoc Networks- A Survey.
Anjali Anand,Anjali Anand View
- Improving Communications in Obstacles by Vehicle to Infrastructure Communication
J.Saranya,R.SanthoshView
- Survey on Defense Against Insider Misuse Attacks in the Cloud
ArunachalamShyla,Ravi Mathey View
- PAB: Protocol Anomaly Detection Using Character Distribution against buffer
over flow code injection attacks
Rajendra Prasad Palnaty,Ananda Rao AkepoguView
- A Novel Shift Towards databases With A Complete Retrospection In Cloud Computing
S.Praveen KumarView
- Raptor Code Based Secure Storage In Cloud Computing
Suneetha Sampathirao,G.V.A. Ramakrishna,Karri Ravi Kiran,Rohit PatnaikView
- Software Reliability Growth Models: A Revisit
Bonthu Kotaiah, R.A. KhanView
back to Volumes
|
|