|
Network Security and Applications |
|
|
|
Vulnerability Assessment Methods -- A Review |
|
|
1 | (10) |
|
|
Collaborative Polling Scheme to Detect and Isolate the Colluding Packet Droppers in Mobile Ad Hoc Networks |
|
|
11 | (12) |
|
|
|
Defense Strategy against Network Worms Causing ICMP Attacks and Its Forensic Analysis |
|
|
23 | (12) |
|
|
|
Analysis of Algebraic Attack on TRIVIUM and Minute Modification to TRIVIUM |
|
|
35 | (8) |
|
|
|
Design of Secure Chaotic Hash Function Based on Logistic and Tent Maps |
|
|
43 | (10) |
|
|
|
|
Detecting Anomalous Application Behaviors Using a System Call Clustering Method over Critical Resources |
|
|
53 | (12) |
|
|
|
|
Behavioral Malware Detection Expert System -- Tarantula |
|
|
65 | (13) |
|
|
|
|
|
Tool for Prevention and Detection of Phishing E-Mail Attacks |
|
|
78 | (11) |
|
|
|
|
Improvement of QoS Performance in MANET by QoS-TORA: A TORA Based QoS Routing Algorithm |
|
|
89 | (11) |
|
|
|
|
|
Authentication Process in IEEE 802.11: Current Issues and Challenges |
|
|
100 | (13) |
|
|
|
Network Level Anomaly Detection System Using MST Based Genetic Clustering |
|
|
113 | (10) |
|
|
|
|
|
|
A Hybrid Approach to Texture Classification |
|
|
123 | (8) |
|
|
|
Completeness of LAN Attack Detection Using Discrete Event Systems |
|
|
131 | (9) |
|
|
|
|
|
Designing Dependable Web Services Security Architecture Solutions |
|
|
140 | (10) |
|
|
|
|
|
|
Protocol for Simultaneous Ownership Transfer of Multiple RFID Tags with TTP |
|
|
150 | (7) |
|
|
|
A Preventive Measure to Protect from Denial of Service Attack |
|
|
157 | (10) |
|
|
|
|
Review of Some Checkpointing Algorithms for Distributed and Mobile Systems |
|
|
167 | (11) |
|
|
|
Using Raga as a Cryptographic Tool |
|
|
178 | (6) |
|
|
|
|
Combining Power of MATLAB with System Verilog for Image and Video Processing ASIC Verification |
|
|
184 | (10) |
|
|
|
|
|
|
Memory Attack Detection of Cryptographic Algorithm |
|
|
194 | (10) |
|
|
|
|
Performance Comparison of Queueing Disciplines for Aeerg Protocol in Manet |
|
|
204 | (10) |
|
|
|
Design of a Cryptographic Tamper Detection Scheme for Network Security |
|
|
214 | (11) |
|
|
|
Energy Efficient and Congestion Control Multipath Routing in Wireless Sensor Networks |
|
|
225 | (14) |
|
|
|
|
Intrusion Prevention by Native Language Password Authentication Scheme |
|
|
239 | (10) |
|
|
|
An Improved Uncertainty Reduction Scheme Based on Bayesian Prediction in MANETs |
|
|
249 | (9) |
|
|
|
|
|
Scalable Implementation of Active Detection Mechanism for LAN Based Attacks |
|
|
258 | (10) |
|
|
|
|
|
|
A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network |
|
|
268 | (13) |
|
|
|
Secure Network Steganographic Scheme Exploiting TCP Sequence Numbers |
|
|
281 | (11) |
|
|
|
|
|
Intrusion Detection System Based on Real Time Rule Accession and Honeypot |
|
|
292 | (10) |
|
|
|
|
Key Predistribution in 3-Dimensional Grid-Group Deployment Scheme |
|
|
302 | (18) |
|
|
Novel Methods for Montgomery Modular Multiplication for Public Key Cryptosystems |
|
|
320 | (11) |
|
|
|
|
Protection against Denial of Service and Input Manipulation Vulnerabilities in Service Oriented Architecture |
|
|
331 | (13) |
|
|
|
|
Highly Resilient Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor Network |
|
|
344 | (12) |
|
|
|
|
Improving Fairness in Network Traffic by Controlling Congestion and Unresponsive Flows |
|
|
356 | (8) |
|
|
|
|
Authenticated Routing for Ad-Hoc On-Demand Distance Vector Routing Protocol |
|
|
364 | (10) |
|
|
|
Passblot: A Usable Way of Authentication Scheme to Generate One Time Passwords |
|
|
374 | (9) |
|
|
|
|
Suryakanth V. Garigashetty |
|
|
Safeguarding Web Services Using Self-adaptive Schema Hardening Algorithm |
|
|
383 | (10) |
|
|
|
|
Modeling and Performance Analysis of QAM System |
|
|
393 | (9) |
|
|
|
|
|
An IDS Evaluation-Centric Taxonomy of Wireless Security Attacks |
|
|
402 | (12) |
|
|
|
|
Rational Secret Sharing with Honest Players over an Asynchronous Channel |
|
|
414 | (13) |
|
|
|
Agent Based Cross Layer Intrusion Detection System for MANET |
|
|
427 | (14) |
|
|
|
Evaluating Machine Learning Algorithms for Detecting DDoS Attacks |
|
|
441 | (12) |
|
|
|
Insecure Query Processing in the Delay/Fault Tolerant Mobile Sensor Network (DFT-MSN) and Mobile Peer to Peer Network |
|
|
453 | (10) |
|
|
|
Financial Time Series Volatility Forecast Using Evolutionary Hybrid Artificial Neural Network |
|
|
463 | (9) |
|
|
|
|
|
Data Security in Free Roaming Mobile Agents |
|
|
472 | (11) |
|
|
|
End-to-End Security for At-Home Medical Monitoring |
|
|
483 | (6) |
|
Mohanavalli Seetha Subramanian |
|
|
|
Web Mining Research and Future Directions |
|
|
489 | (8) |
|
|
|
Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) |
|
|
497 | (5) |
|
|
|
Conditional Proxy Re-Encryption -- A More Efficient Construction |
|
|
502 | (11) |
|
|
|
|
|
Study of Mai ware Threats Faced by the Typical Email User |
|
|
513 | (13) |
|
|
|
|
|
Ad Hoc, Sensor and Ubiquitous Computing |
|
|
|
Sequential Multi-Clustering Protocol Using a Node Deployment Protocol for Efficient Multiclustering in Wireless Sensor Networks |
|
|
526 | (11) |
|
|
|
|
|
|
Online Based Fuzzy Analyzer for Arrhythmia Detection |
|
|
537 | (8) |
|
|
|
|
|
A Novel Autonomic Design Pattern for Invocation OF Services |
|
|
545 | (7) |
|
|
|
|
A Novel Way of Providing Dynamic Adaptability and Invocation of JADE Agent Services from P2P JXTA Using Aspect Oriented Programming |
|
|
552 | (12) |
|
|
|
|
A Novel Way of Providing Dynamic Adaptability in P2P JXTA Multicast Sockets and P2P JXTA-WS Using Aspect Oriented Programming |
|
|
564 | (13) |
|
|
|
|
Intelligent Energy Efficient Routing for Ad-Hoc Sensor Network by Designing QCS Protocol |
|
|
577 | (10) |
|
|
|
|
Peer-to-Peer Networks And Trust Management |
|
|
|
A New Approach for Securing Mobile Adhoc Network with an Improved Trust Calculation Method |
|
|
587 | (11) |
|
|
|
A Routing Protocol for Facilitating Multimedia Transmission over 802.11e Based Mobile Ad Hoc Networks |
|
|
598 | (10) |
|
|
|
|
|
|
608 | (14) |
|
|
|
A Novel Social Network Model for Business Collaboration |
|
|
622 | (9) |
|
|
A Novel Way of Providing Dynamic Adaptability in P2P JXTA Sockets Using Aspect Oriented Programming |
|
|
631 | (9) |
|
|
|
A Novel Way of Providing Dynamic Adaptability in P2P JXTA Services Using Aspect Oriented Programming |
|
|
640 | (9) |
|
|
|
Trust Management for Grid Environment Using Rule Based Fuzzy Logic |
|
|
649 | (10) |
|
|
|
Author Index |
|
659 | |