Quick Links
Volume 5 Issue 1 January 2013

  • Detection of Selfish and Malicious Nodes in Mobile Adhoc Networks- A Survey.
    Anjali Anand,Anjali Anand View


  • Improving Communications in Obstacles by Vehicle to Infrastructure Communication
    J.Saranya,R.SanthoshView


  • Survey on Defense Against Insider Misuse Attacks in the Cloud
    ArunachalamShyla,Ravi Mathey View


  • PAB: Protocol Anomaly Detection Using Character Distribution against buffer over flow code injection attacks
    Rajendra Prasad Palnaty,Ananda Rao AkepoguView

  • A Novel Shift Towards databases With A Complete Retrospection In Cloud Computing
    S.Praveen KumarView


  • Raptor Code Based Secure Storage In Cloud Computing
    Suneetha Sampathirao,G.V.A. Ramakrishna,Karri Ravi Kiran,Rohit PatnaikView


  • Software Reliability Growth Models: A Revisit
    Bonthu Kotaiah, R.A. KhanView
back to Volumes