Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 1037737 results
Sort by: relevance publication year

Synthesis of Cryptography and Security Attacks

Journal Article published Oct 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 5 on pages 1 to 5

Authors: M. Arora, S. Sharma

Information Security: A Review on Steganography with Cryptography for Secured Data Transaction

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 1 to 4

Authors: Kodge B. G.

Data Fusion in Wireless Sensor Network-A Survey

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 9 to 15

Authors: Ishita Chakraborty, Prodipto Das

Nonconventional Network Security Measures for Intrusion Detection

Journal Article published 2017 in International Journal of Advances in Scientific Research and Engineering

Effective Scheduling in Networks - TRUMP

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 27 to 30

Authors: A. Caroline Mary, A. V. Senthil Kumar

Comparison of various Anonymization Technique

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 16 to 20

Authors: G. Pannu, S. Verma, U. Arora, A. K. Singh

Drop of RERR Leads Routing Loop in AODV

Journal Article published Oct 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 5 on pages 6 to 9

Authors: Rajesh Dhakad, Abhinesh Kumar

A Study of Intrusion Detection System using Efficient Data Mining Techniques

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 5 to 8

Authors: P. Rutravigneshwaran

Proceedings of the 2017 the 7th International Conference on Communication and Network Security - ICCNS 2017

Proceedings published 2017

Study of smart home communication protocol's and security & privacy aspects

Conference Paper published Nov 2017 in 2017 7th International Conference on Communication Systems and Network Technologies (CSNT)

Authors: Abhay Kumar Ray, Ashish Bagwari

Security Risk Estimation of Social Network Privacy Issue

Conference Paper published 2017 in Proceedings of the 2017 the 7th International Conference on Communication and Network Security - ICCNS 2017

Authors: Xueqin Zhang, Li Zhang, Chunhua Gu

Why communication is vital during a cyber-attack

Journal Article published Mar 2017 in Network Security volume 2017 issue 3 on pages 12 to 14

Authors: Nick Hawkins

Security Sector Reform and Research: An International Policy Network

Chapter published 20 Jul 2017 in Research in Security Sector Reform Policy on pages 97 to 122

Authors: Andrea Edoardo Varisco

Introduction to Network Security

Chapter published 3 Nov 2017 in Fundamentals of Data Communication Networks on pages 277 to 294

Network security situation prediction method based on MEA-BP

Conference Paper published Feb 2017 in 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)

Authors: Pu Xiao, Ming Xian, Huimei Wang

A multilevel encryption technique in cloud security

Conference Paper published Nov 2017 in 2017 7th International Conference on Communication Systems and Network Technologies (CSNT)

Authors: Bappaditya Jana, Jayanta Poray, Tamoghna Mandal, Malay Kule

Security in cloud computing

Conference Paper published Nov 2017 in 2017 7th International Conference on Communication Systems and Network Technologies (CSNT)

Authors: Vani Dayal Sharma, Somya Agarwai, Syeda Shira Moin, Mohammed Abdul Qadeer

BSS: Blockchain security over software defined network

Conference Paper published May 2017 in 2017 International Conference on Computing, Communication and Automation (ICCCA)

Authors: Sadhu Ram Basnet, Subarna Shakya

Integration of network intrusion detection systems and honeypot networks for cloud security

Conference Paper published May 2017 in 2017 International Conference on Computing, Communication and Automation (ICCCA)

Authors: Varan Mahajan, Sateesh K Peddoju

Requirement analysis for abstracting security in software defined network

Conference Paper published Jul 2017 in 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)

Authors: Ajay Nehra, Meenakshi Tripathi, M.S. Gaur