Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 9062535 results
Sort by: relevance publication year

Synthesis of Cryptography and Security Attacks

Journal Article published Oct 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 5 on pages 1 to 5

Authors: M. Arora, S. Sharma

Information Security: A Review on Steganography with Cryptography for Secured Data Transaction

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 1 to 4

Authors: Kodge B. G.

A Survey on Security Provided by Multi-Clouds in Cloud Computing

Journal Article published Feb 2018 in International Journal of Scientific Research in Network Security and Communication volume 6 issue 1 on pages 23 to 27

Authors: Sakshi kathuria

Data Fusion in Wireless Sensor Network-A Survey

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 9 to 15

Authors: Ishita Chakraborty, Prodipto Das

Survey on Profile Privacy and Communication Security in Social Network

Journal Article published 5 Dec 2015 in International Journal of Science and Research (IJSR) volume 4 issue 12 on pages 2226 to 2228

Nonconventional Network Security Measures for Intrusion Detection

Journal Article published 2017 in International Journal of Advances in Scientific Research and Engineering

Drop of RERR Leads Routing Loop in AODV

Journal Article published Oct 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 5 on pages 6 to 9

Authors: Rajesh Dhakad, Abhinesh Kumar

Comparison of various Anonymization Technique

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 16 to 20

Authors: G. Pannu, S. Verma, U. Arora, A. K. Singh

Effective Scheduling in Networks - TRUMP

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 27 to 30

Authors: A. Caroline Mary, A. V. Senthil Kumar

A Study of Intrusion Detection System using Efficient Data Mining Techniques

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 5 to 8

Authors: P. Rutravigneshwaran