Vol. 3 No. 02 (2014)
Published:
2014-02-28
Articles
-
Articles
An Optimized Localization Algorithm against Node Replication Attacks in Wireless Sensor Networks
177 221 -
Articles
An Immune Inspired Behavior-based MultiAgent Model for Detecting Network Clients’ Misbehavior
157 216 -
-
-
-
-
-
-
Articles
Network Intrusion Detection Using Hybrid Simplified Swarm Optimization and Random Forest Algorithm on Nsl-Kdd Dataset
192 218 -
-
-
Articles
Detection and Prevention of Black Hole Attack To Improve Network Performance By Using Fidelity and ECARP Algorithms
211 215 -
Articles
Compressive Strength of Concrete containing Fly Ash, Copper Slag, Silica Fume and Fibres - Prediction
158 225 -
-
-
Articles
Design of an efficient Weighted Trust Evaluation System for Wireless Sensor Networks
161 205 -
-
-
-
-
Articles
Secure and efficient application of MANET using Identity Based cryptography combined with Visual cryptography technique
201 174 -
-
-
-
-
-
Articles
Improving Security Authentication of IEEE 802.16 WiMax with New Public key algorithm
201 201 -
-
Articles
An Ethernet Based Monitoring and Controlling Of Home Appliances Using Rabbit Processor
163 203 -
-
-
-
-
-
-