To search, Click below search items.
All Published Papers Search Service
Title
Dynamic Threshold Method for Isolation of Worm Hole Attack in Wireless Sensor Networks
Author
Surinder Singh, Hardeep Singh Saini
Vol. 24 No. 5 pp. 119-128
Keywords
Wormhole, Delay per hop, attacker, MANETs
Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection
Biswajit Panja, Phd
Vol. 24 No. 5 pp. 111-118
Intrusion detection, Machine learning
Agile Software Development Methodologies Evaluation Research Analysis: A review
Sadaf Niaz, Babar Hayat
Vol. 24 No. 5 pp. 103-110
Agile methods; scrum; Extreme programming (XP); DSDM; Crystal; Feature driven development component
Robust and Auditable Secure Data Access Control in Clouds
KARPAGADEEPA.S, VIJAYAKUMAR.P
Vol. 24 No. 5 pp. 95-102
Robust and Auditable Secure Data, Access Control, Clouds