To search, Click below search items.

 

All Published Papers Search Service

Results for Threats; Total 10374

Title

Dynamic Threshold Method for Isolation of Worm Hole Attack in Wireless Sensor Networks

Author

Surinder Singh, Hardeep Singh Saini

Citation

Vol. 24  No. 5  pp. 119-128

Keywords

Wormhole, Delay per hop, attacker, MANETs


Title

Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection

Author

Biswajit Panja, Phd

Citation

Vol. 24  No. 5  pp. 111-118

Keywords

Intrusion detection, Machine learning


Title

Agile Software Development Methodologies Evaluation Research Analysis: A review

Author

Sadaf Niaz, Babar Hayat

Citation

Vol. 24  No. 5  pp. 103-110

Keywords

Agile methods; scrum; Extreme programming (XP); DSDM; Crystal; Feature driven development component


Title

Robust and Auditable Secure Data Access Control in Clouds

Author

KARPAGADEEPA.S, VIJAYAKUMAR.P

Citation

Vol. 24  No. 5  pp. 95-102

Keywords

Robust and Auditable Secure Data, Access Control, Clouds


[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [next] ... [2594]