To search, Click below search items.
All Published Papers Search Service
Title
An Experimental Evaluation of DoS Attack and Its Impact on Throughput of IEEE 802.11 Wireless Networks
Author
Mina Malekzadeh, Abdul Azim Abdul Ghani, Jalil Desa, Shamala Subramaniam
Vol. 8 No. 8 pp. 1-5
Keywords
DoS attack, wireless network, network security, management frame, IEEE 802.11
Approach towards realizing resource mining and secured information transfer
Prasun Chakrabarti , Partha Sarathi Goswami
Vol. 8 No. 7 pp. 345-350
data mining , time complexity, binary search tree , Gantt chart, text summarization , interlock protocol, SKEY, SKID
UML Modeling & Protection of a Domain Based System
Vipin Saxena, Gufran Ahmad Ansari
Vol. 8 No. 7 pp. 338-344
UML, Class Diagram, Sequence Diagram, Data Cube, Domain Based System, Domain Security.
A Novel Method For Generation Of Random Fields For Boundary Detection And Classification Of Images
C. NagaRaju, P.S.V.Srinivasa Rao, G.Girija Rani
Vol. 8 No. 7 pp. 331-337
Boundary model, Markov random fields (MRFs), image segmentation, gray level watershed, Markovianity and frequency of gray levels.