Vol. 3 No. 02 (2014)
Published:
2014-02-28
Articles
-
Articles
An Optimized Localization Algorithm against Node Replication Attacks in Wireless Sensor Networks
43 40 -
Articles
An Immune Inspired Behavior-based MultiAgent Model for Detecting Network Clients’ Misbehavior
52 39 -
-
-
-
-
-
-
Articles
Network Intrusion Detection Using Hybrid Simplified Swarm Optimization and Random Forest Algorithm on Nsl-Kdd Dataset
54 35 -
-
-
Articles
Detection and Prevention of Black Hole Attack To Improve Network Performance By Using Fidelity and ECARP Algorithms
46 40 -
Articles
Compressive Strength of Concrete containing Fly Ash, Copper Slag, Silica Fume and Fibres - Prediction
47 44 -
-
-
-
-
-
-
-
Articles
Secure and efficient application of MANET using Identity Based cryptography combined with Visual cryptography technique
39 28 -
-
-
-
-
-
-
-
Articles
An Ethernet Based Monitoring and Controlling Of Home Appliances Using Rabbit Processor
47 36 -
-
-
-
-
-
-