To search, Click below search items.
All Published Papers Search Service
Title
Proactive Authentication Mechanism to Secure Distance Vector Routing Protocol (RIPV2) by minimizing By-Pass Attacks
Author
Rizwan Hassan, Saleem ullah, Gulfam Ahmed Umar
Vol. 17 No. 3 pp. 244-251
Keywords
Routing, RIP, SHA 512, Authentication, and Cryptography.
Survey on Security Issues Techniques Used in Data Warehouses
Mayada J. AlMeghari
Vol. 17 No. 3 pp. 236-243
Data Warehouse, Confidentiality, Privacy, Integrity, Information Security, Middleware
An Introduction to Docker and Analysis of its Performance
Babak Bashari Rad, Harrison John Bhatti, Mohammad Ahmadi
Vol. 17 No. 3 pp. 228-235
Docker, Docker Container, Virtual Machine, Virtualization, Cloud Computing.
Voting based Extreme Learning Machine with search based Ensemble Pruning
Sanyam Shukla, Rajesh Wadhvani, Jyoti Bharti, Manasi Gyanchandani
Vol. 17 No. 3 pp. 223-227
Extreme Learning Machine, Voting Based Extreme Learning Machine, Ensemble Pruning, Gain.