Journal Publications

International Journal of Advances in Computer Networks and Its Security

(21) Papers Found

Low Overhead Clustering Approach for Long Lifetime Object Tracking Applications

Author(s) : A.MAHANI, M.MIRSADEGHI, Y.S. KAVIAN

No of Author(s) : 3
Page(s) : 1 - 5
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 361   |   Download(s) : 168

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

Author(s) : MEHDI TARHANI, ALI MAHANI, SAMAN SIAVOSHI, YOUSEF S. KAVIAN

No of Author(s) : 4
Page(s) : 6 - 11
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 367   |   Download(s) : 204

UTM Virtual LAB Design

Author(s) : DHARI KH ABEDULA

No of Author(s) : 1
Page(s) : 12 - 14
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 468   |   Download(s) : 208

The main aspects of data security in cloud computing

Author(s) : IVANA RABOVA, ZUZANA PRISCAKOVA

No of Author(s) : 2
Page(s) : 15 - 20
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 442   |   Download(s) : 181

Encryptor resulted from beating the 7z for incompressible files

Author(s) : JOAO SILVESTRE

No of Author(s) : 1
Page(s) : 21 - 24
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 380   |   Download(s) : 171

A Performance of MAC Layer Over Error-prone Channel in The IEEE 802.11ac

Author(s) : HA CHEOL LEE

No of Author(s) : 1
Page(s) : 25 - 29
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 384   |   Download(s) : 205

Towards Quantitative Metrics for Evaluation of VoIP Security Systems

Author(s) : NAWAZ MOHAMUDALLY, SHEEBA ARMOOGUM

No of Author(s) : 2
Page(s) : 31 - 35
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 349   |   Download(s) : 127

DETIboot: A fast, wireless system to install operating systems on students laptops

Author(s) : ANDRE ZUQUETE, CARLOS FANECA, JOAO CARDOSO, JOSE VIEIRA

No of Author(s) : 4
Page(s) : 36 - 41
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 438   |   Download(s) : 137

WiMAX Quality of Service Deployment in Disaster Management

Author(s) : GARIK MARKARIAN, JUWITA MOHD SULTAN, PHILLIP BENACHOUR

No of Author(s) : 3
Page(s) : 42 - 46
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 436   |   Download(s) : 112

DVRA-SN: Neighbour Based Distance Vector Routing Protocols for Mobile Ad Hoc Networks

Author(s) : MRINAL KANTI DEBBARMA, SANTANU K. SEN, SUDIPTA ROY

No of Author(s) : 3
Page(s) : 47 - 50
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 416   |   Download(s) : 167

Probabilistic synthesis of KDP satisfying mutually complementary correctness conditions

Author(s) : ALEXANDER B. FROLOV, ALEXANDER V. ZATEY

No of Author(s) : 2
Page(s) : 51 - 55
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 446   |   Download(s) : 148

An Agent-oriented Website Sucurity System

Author(s) : YANLONG ZHANG

No of Author(s) : 1
Page(s) : 56 - 58
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 421   |   Download(s) : 179

Capacity Expansion methods for live GSM Network- an overview

Author(s) : ARJUN SRIDHAR, K. R. SUDINDRA, V. SRIDHAR

No of Author(s) : 3
Page(s) : 59 - 63
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 427   |   Download(s) : 186

Shape grammar model generating secure visual passwords The move towards completely grammar based images

Author(s) : IAN SANDERS, MOKGADI RASEKGALA, SIGRID EWERT, THOMAS FOGWILL

No of Author(s) : 4
Page(s) : 64 - 70
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 459   |   Download(s) : 132

Information Security Awareness and Practices In Malaysian IHLs: A Study at UNISEL

Author(s) : IRNY SUZILA ISHAK, IZWAN SUHADAK ISHAK, ROHAYA ABU HASSAN, ZULKEFLI MANSOR, ZURINAH SURADI

No of Author(s) : 5
Page(s) : 71 - 76
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 405   |   Download(s) : 188

Malware Simulation using JADE

Author(s) : DINESH GOPALANI, MANISH JAIN

No of Author(s) : 2
Page(s) : 77 - 81
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 422   |   Download(s) : 160

AODV vs. DSR: Simulation Based Comparison of Ad-hoc Network Reactive Protocols under Black Hole Attack

Author(s) : ELISHA OKETCH OCHOLA, LINEO MEJAELE

No of Author(s) : 2
Page(s) : 82 - 87
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 376   |   Download(s) : 121

Mathematical Modelling of Need of Exact Number of Relays to Ensure Seamless Mobility in UbiComp.

Author(s) : M. KALEEM GALAMALI, NAWAZ MOHAMUDALLY

No of Author(s) : 2
Page(s) : 88 - 96
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 428   |   Download(s) : 131

Modelling of need for multiple relays for ensuring seamless mobility.

Author(s) : M. KALEEM GALAMALI, NAWAZ MOHAMUDALLY

No of Author(s) : 2
Page(s) : 97 - 103
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 427   |   Download(s) : 164

A Comparative Study on the Information Security Culture Related to Workplace and Home Practices

Author(s) : HAMIDA OMER ISSA ASKER, MOHD ZALISHAM JALI

No of Author(s) : 2
Page(s) : 104 - 108
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 430   |   Download(s) : 159

Cryptographic Analysis and Security Issues On Cloud Computing

Author(s) : P PREMCHAND, S RAGHU, V PRAVEEN KUMAR

No of Author(s) : 3
Page(s) : 109- 113
Electronic ISSN : 2250 - 3757
Volume 5 : Issue 1
Views : 421   |   Download(s) : 147