Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 12886163 results
Sort by: relevance publication year

International Journal of Scientific Research in Network Security and Communication

Journal published

Synthesis of Cryptography and Security Attacks

Journal Article published Oct 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 5 on pages 1 to 5

Authors: M. Arora, S. Sharma

Information Security: A Review on Steganography with Cryptography for Secured Data Transaction

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 1 to 4

Authors: Kodge B. G.

A Survey on Security Provided by Multi-Clouds in Cloud Computing

Journal Article published Feb 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 1 on pages 23 to 27

Authors: Sakshi kathuria

Data Fusion in Wireless Sensor Network-A Survey

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 9 to 15

Authors: Ishita Chakraborty, Prodipto Das

Survey on Profile Privacy and Communication Security in Social Network

Journal Article published 5 Dec 2015 in International Journal of Science and Research (IJSR) volume 4 issue 12 on pages 2226 to 2228

Network and System Security

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 1 to 1

Nonconventional Network Security Measures for Intrusion Detection

Journal Article published 2017 in International Journal of Advances in Scientific Research and Engineering

The research of network security technologies

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Zhen Wang, Zhijie Liu, Xiaoyao Xie

The Research of the Network Security Situation Prediction Mechanism Based on the Complex Network

Conference Paper published Dec 2015 in 2015 International Conference on Computational Intelligence and Communication Networks (CICN)

Authors: Shouxin Sun

Computer network forensics research workshop 2005 "defining network forensics"

Conference Paper published 2005 in Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.

Intelligent computing and communication system

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 567 to 567

Drop of RERR Leads Routing Loop in AODV

Journal Article published Oct 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 5 on pages 6 to 9

Authors: Rajesh Dhakad, Abhinesh Kumar

Comparison of various Anonymization Technique

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 16 to 20

Authors: G. Pannu, S. Verma, U. Arora, A. K. Singh

Effective Scheduling in Networks - TRUMP

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 27 to 30

Authors: A. Caroline Mary, A. V. Senthil Kumar

A Study of Intrusion Detection System using Efficient Data Mining Techniques

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 5 to 8

Authors: P. Rutravigneshwaran

The Analysis of Information Security of Campus Network of Scientific Research

Conference Paper published Nov 2014 in 2014 International Conference on Computational Intelligence and Communication Networks

Authors: Shi De-Qin, Lin Qin-Ying, Zhong Qi-Yuan, Li Qiu-Ni

Relay Selection Algorithm for IPTV based Services

Journal Article published Feb 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 1 on pages 1 to 6

Authors: Shwetha D, Swetha, Suhas K R, Devaraju J T

Speech Features Analysis and Biometric Person Identification in Multilingual Environment

Journal Article published Feb 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 1 on pages 7 to 11

Authors: V.K. Jain, N. Tripathi

Modular Encryption Algorithm for Secure Data Transmission

Journal Article published Feb 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 1 on pages 12 to 22

Authors: P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy