Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 9700995 results
Sort by: relevance publication year

Synthesis of Cryptography and Security Attacks

Journal Article published Oct 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 5 on pages 1 to 5

Authors: M. Arora, S. Sharma

Attacks on Cloud Data: A Big Security Issue

Journal Article published 30 Apr 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 2 on pages 15 to 18

Authors: Poonam Devi

Honeypots: Virtual Network Intrusion Monitoring System

Journal Article published 30 Apr 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 2 on pages 45 to 49

Authors: Manmohan Dagar, Rashmi Popli

Cloud Forensics: An Overall Research Perspective

Journal Article published 30 Apr 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 2 on pages 5 to 10

Authors: M. Patidar, P. Bansal

A Critical Study on RFID

Journal Article published 30 Apr 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 2 on pages 62 to 65

Authors: R. Maruthaveni

A Survey on Security Provided by Multi-Clouds in Cloud Computing

Journal Article published Feb 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 1 on pages 23 to 27

Authors: Sakshi kathuria

Information Security: A Review on Steganography with Cryptography for Secured Data Transaction

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 1 to 4

Authors: Kodge B. G.

Data Fusion in Wireless Sensor Network-A Survey

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 9 to 15

Authors: Ishita Chakraborty, Prodipto Das

A Study on Current Challenging Issues and Optimal Methods for Video Streaming over Heterogenous Wireless Network

Journal Article published 30 Apr 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 2 on pages 40 to 44

Authors: S.D.N. Hayath Ali, M. Giri

Survey on Profile Privacy and Communication Security in Social Network

Journal Article published 5 Dec 2015 in International Journal of Science and Research (IJSR) volume 4 issue 12 on pages 2226 to 2228

Nonconventional Network Security Measures for Intrusion Detection

Journal Article published 2017 in International Journal of Advances in Scientific Research and Engineering

Relay Selection Algorithm for IPTV based Services

Journal Article published Feb 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 1 on pages 1 to 6

Authors: Shwetha D, Swetha, Suhas K R, Devaraju J T

Speech Features Analysis and Biometric Person Identification in Multilingual Environment

Journal Article published Feb 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 1 on pages 7 to 11

Authors: V.K. Jain, N. Tripathi

Modular Encryption Algorithm for Secure Data Transmission

Journal Article published Feb 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 1 on pages 12 to 22

Authors: P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy

Effective Scheduling in Networks - TRUMP

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 27 to 30

Authors: A. Caroline Mary, A. V. Senthil Kumar

Comparison of various Anonymization Technique

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 16 to 20

Authors: G. Pannu, S. Verma, U. Arora, A. K. Singh

Drop of RERR Leads Routing Loop in AODV

Journal Article published Oct 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 5 on pages 6 to 9

Authors: Rajesh Dhakad, Abhinesh Kumar

A Study of Intrusion Detection System using Efficient Data Mining Techniques

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 5 to 8

Authors: P. Rutravigneshwaran

A Comparative Analysis of Trust Models in Cloud Computing

Journal Article published 30 Apr 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 2 on pages 19 to 23

Authors: U.Kaur, M. Mahajan, D. Singh

Autonomous PHR Sharing: A Patient Centric Scalable and Flexible e-Healthcare Framework

Journal Article published 30 Apr 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 2 on pages 11 to 14

Authors: R. Bhavani, K. S. Suganya, D. Yazhini Priyanka