Journal Publications

International Journal of Advances in Computer Networks and Its Security

(46) Papers Found

Survey of Implemented routing protocol with fuzzy

Author(s) : DEEPAK MOTWANI   , PRITI RAJAWAT   

No of Author(s) : 2
Page(s) : 1 - 5
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 452   |   Download(s) : 171

Chunk Based Approach for Video Streaming in Peer to Peer Network

Author(s) : D. A. PHALKE   , NILAM S. PATIL   

No of Author(s) : 2
Page(s) : 6 - 9
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 492   |   Download(s) : 218

Efficient routing algorithm for Mobile Ad hoc Networks

Author(s) : AAMIR MOHAMMED  , PALLAVI KHATRI   

No of Author(s) : 2
Page(s) : 10 - 14
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 478   |   Download(s) : 179

Framework for Choosing Best Intrusion Detection and Prevention System for an Organization

Author(s) : BILAL MAQBOOL BEIGH   , MUSHTAQ AHMAD PEER 

No of Author(s) : 2
Page(s) : 15 - 20
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 424   |   Download(s) : 193

Campus Security Using Honeypot

Author(s) : AHER NISHA N   

No of Author(s) : 1
Page(s) : 21 - 24
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 543   |   Download(s) : 169

An Approach towards the Analysis of Routing protocols under attack in VANET

Author(s) : ANUP P. DHAMGAYE  , NEKITA CHAVHAN   

No of Author(s) : 2
Page(s) : 25 - 28
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 464   |   Download(s) : 168

Matrix Formulation of NTRU Algorithm using multiple Public keys from Matrix Data Bank for High Degree polynomials

Author(s) : D. GOSH   , MOHAN RAO MAMDIKAR  , VINAY KUMAR   

No of Author(s) : 3
Page(s) : 29 - 36
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 576   |   Download(s) : 162

Using Decision Tree Classifiers for Efficient Intrusion Detection System

Author(s) : SACHIN P. GAVHANE   , VARUNAKSHI BHOJANE   

No of Author(s) : 2
Page(s) : 37 - 42
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 540   |   Download(s) : 132

Study of Graphical Password Schemes and “Two Level” Authentication Technique for Software Applications

Author(s) : HEMANGI KULKARNI  , SONAL AHUJA   

No of Author(s) : 2
Page(s) : 43 - 47
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 494   |   Download(s) : 159

Cluster head selection in mobile wireless sensor networks: a survey

Author(s) : PRITI KUMARI, M. P SINGH   , PRABHAT KUMAR   

No of Author(s) : 3
Page(s) : 48 - 52
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 448   |   Download(s) : 127

Smart Home System Controlling electrical appliances via bluetooth ad hoc network communication on Android Platform

Author(s) : MONICA DESWAL  , SUDHIR KUMAR   

No of Author(s) : 2
Page(s) : 53 - 57
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 489   |   Download(s) : 161

Password Authentication through lip reading using human machine interface

Author(s) : SHARMILA SENGUPTA  , VIBHANSHU GUPTA  

No of Author(s) : 2
Page(s) : 58 - 62
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 535   |   Download(s) : 119

A Novel Approach to Uniformly Distribute the Load in Wireless Sensor Routing Protocol LEACH

Author(s) : G. RAM MOHANA REDDY  , NITISH SABOO  , PRAJNA PANDURANG BHAT   , RAHUL YADAV   , SURESH PANWAR   

No of Author(s) : 5
Page(s) : 63 - 67
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 532   |   Download(s) : 189

Automated Railways Collision Avoidance System Using Wireless Networks

Author(s) : ABHISHEK GOYAL   , AMIT BIR SINGH CHADHA   , DAVISHA VERMA  , MEENAKSHI SOOD   

No of Author(s) : 4
Page(s) : 68 - 71
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 466   |   Download(s) : 182

Quantitative Behavior Based Intrusion Detection System for MANETS

Author(s) : A DAMODARAM   , S.MAMATHA   

No of Author(s) : 2
Page(s) : 72 - 76
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 507   |   Download(s) : 199

TCP-RP: A New Version of TCP based on Fuzzy Logic

Author(s) : ARCHANA B. PATANKAR   , RAHUL S. PATIL  

No of Author(s) : 2
Page(s) : 77 - 83
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 507   |   Download(s) : 158

A Survey on Internet Traffic Classification

Author(s) : AFZAL HUSSAIN SHAHID  , M. P SINGH   , PRABHAT KUMAR   

No of Author(s) : 3
Page(s) : 84 - 88
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 534   |   Download(s) : 213

Sequenced Queue based Routing Algorithm (SQRA) for Detection and Correction of Grey Hole Attack by Implementing IDS

Author(s) : SHIVANI SHARMA   , TANU PREET SINGH

No of Author(s) : 2
Page(s) : 89 - 93
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 513   |   Download(s) : 150

Enhanced Approach of Cluster Head Selection Using Rank and Weight Assignment in Wireless Sensor Network

Author(s) : GUNJAN JAIN   , S.R BIRADAR   

No of Author(s) : 2
Page(s) : 94 - 97
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 471   |   Download(s) : 186

Common Entry Eradication and Cluster Elimination in MANETs (CEECE)

Author(s) : R.K. SINGH   , SACHIN KHURANA   

No of Author(s) : 2
Page(s) : 98 - 101
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 462   |   Download(s) : 165

Quality of Service Model for Load Balancing In Mobile Adhoc Networks

Author(s) : JAYANT VATS   , R.K. SINGH   , VISHAL SHARMA   

No of Author(s) : 3
Page(s) : 102 - 105
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 460   |   Download(s) : 132

Privacy Preserving Access Control and Multi- Authority in Cloud with Efficient Authentication, Encryption and Revocation

Author(s) : A.BLESSY   , S. SATHYALAKSHMI   

No of Author(s) : 2
Page(s) : 106 - 110
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 462   |   Download(s) : 189

Simulation based Evaluation of Proactive and Reactive Routing Protocols in Realistic Vehicular Network

Author(s) : RAJINDER SANWAL   , VISHAL KUMAR  

No of Author(s) : 2
Page(s) : 111 - 115
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 493   |   Download(s) : 186

Bandwidth Monitoring Tools

Author(s) : ABHISHEK SINHA   , NISHANT KUMAR

No of Author(s) : 2
Page(s) : 116 - 120
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 512   |   Download(s) : 138

A Survey of Bluetooth Security in Smart Phone

Author(s) : VIJENDRA SINGH BHAMU   

No of Author(s) : 1
Page(s) : 121 - 125
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 484   |   Download(s) : 156

Energy based Techniques for Algorithms in MANETs: A Study

Author(s) : INDERDEEP KAUR AULAKH , NAVDEEP KAUR   

No of Author(s) : 2
Page(s) : 126 - 129
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 512   |   Download(s) : 192

Security Mechanism for Communication in Wireless Sensor Networks

Author(s) : KRITI JAIN   , NEETI BISHT   , SOHAN LAL  , UPASANA BAHUGUNA  

No of Author(s) : 4
Page(s) : 130 - 133
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 450   |   Download(s) : 119

Privacy Issues In Cloud Computing for Personal Area Network

Author(s) : ANKUR CHAUDHARY, LOKESH KUMAR   , NEETI BISHT   , SACHIN CHOUDHARY     

No of Author(s) : 4
Page(s) : 134 - 138
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 495   |   Download(s) : 184

A Novel Approach for Introducing Advanced Security in Mobile Agents

Author(s) : ANKUR CHAUHAN, PRIYA SUNEJA  , RAJAN SAHOTA   

No of Author(s) : 3
Page(s) : 139 - 143
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 541   |   Download(s) : 206

Vehicle Kinematic Parameters Estimation Using Modified Linear Kalman Filter

Author(s) : DNYANESHWAR V AVATIRAK  , N.S.JADHAV   , S.L. NALBALWAR   

No of Author(s) : 3
Page(s) : 144 - 148
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 549   |   Download(s) : 139

Simulation of Wireless Communication Based Adaptive System

Author(s) : ABHINAV DOGRA   , ANSHUL PANWAR   , KAMAL SINGH   , RAJESH RANA  

No of Author(s) : 4
Page(s) : 149 - 152
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 477   |   Download(s) : 186

Secure Zone in Cloud

Author(s) : ANDE PRASAD   , R.S.M.LAKSHMI PATIBANDLA  , Y.R.P.SHANKAR   

No of Author(s) : 3
Page(s) : 153 - 157
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 583   |   Download(s) : 155

Review Paper On Wireless Sensor Networks

Author(s) : NISHA THAKUR  , RITIKA SHARMA   , SACHIN KHURANA   

No of Author(s) : 3
Page(s) : 158 - 162
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 548   |   Download(s) : 193

A Comparative Study of Wireless Technologies:Zigbee, Bluetooth LE, Enocean, Wavenis,Insteon and UWB

Author(s) : HARNEET KAUR  , SUKESHA SHARMA  

No of Author(s) : 2
Page(s) : 163 - 166
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 506   |   Download(s) : 160

Virtual IP Generation and Allocation Techniques in MANETs

Author(s) : BIKRAMJIT SINGH      , R.K. SINGH   , TANU PREET SINGH

No of Author(s) : 3
Page(s) : 167 - 170
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 519   |   Download(s) : 164

Preventing Black hole Attacks in Mobile adhoc Networks: A Review

Author(s) : PREETI KAMRA, R.K. SINGH   , TANU PREET SINGH

No of Author(s) : 3
Page(s) : 171 - 173
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 496   |   Download(s) : 167

Optimal Delay Analysis in Mobile adhoc Networks Using Topological Management of Nodes

Author(s) : BIKRAMJIT SINGH      , HARWANT SINGH    , R.K. SINGH   , TANU PREET SINGH   

No of Author(s) : 4
Page(s) : 174 - 179
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 507   |   Download(s) : 159

A Review of ADHOC Routing Protocols in Different Mobility Models

Author(s) : R.K. SINGH   , REEMA SHARMA   , TANU PREET SINGH   

No of Author(s) : 3
Page(s) : 180 - 184
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 529   |   Download(s) : 131

Delay Optimization in Ad-Hoc Networks by Topological Management of Nodes

Author(s) : NEHA, R.K. SINGH   , TANU PREET SINGH

No of Author(s) : 3
Page(s) : 190 - 194
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 584   |   Download(s) : 115

Virtual IP Generation and Allocation Techniques in Mobile Adhoc Networks

Author(s) : R.K. SINGH   , SATINDER KAUR   , TANU PREET SINGH

No of Author(s) : 3
Page(s) : 195 - 199
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 501   |   Download(s) : 119

Fault Tolerance in Torus-Butterfly Interconnection Network

Author(s) : ERNASTUTI   , LATIFAH   

No of Author(s) : 2
Page(s) : 200 - 202
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 480   |   Download(s) : 177

Towards Quick Response and Secure Online Banking Transactions Using Data Compression and Cryptography

Author(s) : ASADULLAH SHAH  , NUHA ABDULLAH ZAMMARAH   

No of Author(s) : 2
Page(s) : 203 - 206
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 463   |   Download(s) : 179

Multi-Cloud Computing Environment With An Agent Based Efficient Scheduling Method

Author(s) : ANUBHAV MITTAL  , SARIKA GUPTA    , VIPIN SHARMA  

No of Author(s) : 3
Page(s) : 207 - 210
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 587   |   Download(s) : 195

Using Low Orbit Ion Cannon for Denial of Service Attack Based on CVE

Author(s) : THANACHON CHEEPBORISUTTIKUL   , YUNYONG TENG-AMNUAY   

No of Author(s) : 2
Page(s) : 211 - 215
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 505   |   Download(s) : 160

Genetic Algorithm for Reader Network Planning Problem

Author(s) : HSING-FANG TSAI    , SHIN-YEU LIN   

No of Author(s) : 2
Page(s) : 216 - 219
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 573   |   Download(s) : 155

Improving Energy Efficiency of MANET by Enhanced Distance Based Broadcasting Protocol

Author(s) : K.SANGEETHA SUPRIYA  , P.SUBBAIAH    , V.RAMESH   

No of Author(s) : 3
Page(s) : 220 - 225
Electronic ISSN : 2250 - 3757
Volume 3 : Issue 2
Views : 509   |   Download(s) : 198