Survey on Peer to Peer Network Security Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: M.L. Soundarya, Sethu Bindu P Subject(s): Engineering, Applied Linguistics
A Robust Intrusion Detection System by Utilizing Support Vector Machine and Error Back Propagation Neural Network Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Gaurav Soni, Rachna Trivedi Subject(s): Engineering, Applied Linguistics
Model Survey on Policy Making for Software Defined Networks Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Anshuman Kumar, Abhilash Kamtam, Prof. U. C. Patkar Subject(s): Engineering, Applied Linguistics
A survey on Intrusion Detection System by Using Data Mining Based on Class-Association-Rule Mining Using GNP Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Mr. Shankar L. Tambe, Prof. Ms. Rasna Sharma Subject(s): Engineering, Applied Linguistics
Flexible Data Access Using Network Security Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: K. Ramya, K. Pavithradevi, A. Satheesh, R. Shanavash Subject(s): Engineering, Applied Linguistics
Self Destruction of Data using Active Storage Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Ashwini Kakade, Dinesh Gawande, Roshan Thakur Subject(s): Engineering, Applied Linguistics
E-Commerce online payment security issues discussion and analysis Journal title: International Journal of Engineering, Science and Mathematics Authors: Preeti Dhankar Subject(s): Engineering, Mathematics
An Improved Performance of MANET using AODV Protocol for Black Hole Detection Journal title: International Journal of Research in Computer and Communication Technology Authors: Komal Bhatti, Sonam Dhawan Subject(s): Computer and Information Science, Telecommunications
Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE) Journal title: International Journal of Research in Computer and Communication Technology Authors: B Hemanth, U Vinod Kumar Subject(s): Computer and Information Science, Telecommunications
To Enable Base Station To Obtain The ‘True’ Estimate Of The Aggregate In The Presence Of The Attack Journal title: International Journal of Research in Computer and Communication Technology Authors: G Jaya lakshmi, Usha Devi SSSN Subject(s): Computer and Information Science, Telecommunications
An Attack-Resilient Computation Algorithm To Compute Successful Aggregates In The Presence Of Attacks Journal title: International Journal of Research in Computer and Communication Technology Authors: P.Raj Priyanka, B.Lakshmana Rao Subject(s): Computer and Information Science, Telecommunications
Accurately Computing Aggregates Using Synopsis Diffusion Framework Journal title: International Journal of Research in Computer and Communication Technology Authors: V. Bala Tripura Sundari, G. Aruna Rekha Subject(s): Computer and Information Science, Telecommunications
A response toolkit to provide an active response against intrusions using Ontology-Based IRS Journal title: MASKANA Authors: Danny S. Guamán, Julio C. Caiza, Verónica Mateos Subject(s): Engineering, Humanities, Social Sciences, Science
Análisis y comparación de la seguridad utilizando dos protocolos de enrutamiento para IPv6 Journal title: MASKANA Authors: Jose Roberto Patiño Sánchez Subject(s): Engineering, Humanities, Social Sciences, Science
An Efficient Routing Approach for Detection of Syn Flooding Attacks in Wireless Sensor Networks Journal title: EAI Endorsed Transactions on Energy Web Authors: Dr. T. Sasilatha, S. Balaji, Dr. P. Suresh Mohan Kumar Subject(s): Computer and Information Science, Energy