To search, Click below search items.
All Published Papers Search Service
Title
Port Change Attack in Wireless Ad Hoc Networks
Author
Vishnu K, Mohit Jain, Shalini Jain
Vol. 10 No. 8 pp. 146-148
Keywords
Component, Ad hoc Networks, Routing, Port Scan Attack, TCP/UDP
Searching the Most Authoritative & Obscure Sources from the Web
Bharat Bhushan, Narender Kumar
Vol. 10 No. 8 pp. 149-153
Website, Search Engine, Source Rank tool, Blog, SEO, PR
Analysis of Different Steganographic Algorithms for Secured Data Hiding
M.Umamaheswari, S.Sivasubramanian, S.Pandiarajan
Vol. 10 No. 8 pp. 154-160
Steganography, Cryptography, Data Hiding, Steganographic algorithms
Mining Software Repositories ? A Comparative Analysis
Sunday O. Olatunji, Syed U. Idrees, Yasser S. Al-Ghamdi, Jarallah Saleh Ali Al-Ghamdi
Vol. 10 No. 8 pp. 161-174
Mining, Software, Repositories