Table of Contents
Articles
| Intrusion Detection System Using BCO and Genetic Algorithm and a Comparison with ACO |
PDF
|
| Harsimran Kaur, Usvir Kaur, Dr. Dheerendra Singh | 265-269 |
| Database Migration along with Architecture using Bee Colony Optimization |
PDF
|
| Amarjit Kaur, Usvir Kaur, Dr. Dheerendra Singh | 270-273 |
| Secure Auditing Method for Cloud Computing |
PDF
|
| S. Srinivasan, K. Raja | 274-278 |
| A Diffserv-Aware Multi-Protocol Label Switching Traffic Engineering Applied on Virtual Private Networks |
PDF
|
| Ayman E. A. Abdelaal, Fathi E. Abd El-Samie, Moawad I. Dessouky | 279-285 |
| Implementation of TCP/IP using pSOS |
PDF
|
| M. Meena | 286-290 |
| Edifice of Remedy Network Plinth on Side Effects with Allege for Remedy Deputy |
PDF
|
| C. Bala Saravanan | 291-294 |
| Space Wave Optical Fixed Link and Data Communication Services in Rural Environments |
PDF
|
| A. P. Kaur, G. Aujla | 295-300 |
| A New Approach to Improve the Performance of Dynamic Distributed Networks |
PDF
|
| Shahram Jamali, Khadije Hourali | 301-306 |
| Acknowledged Routing using Cluster Based Approach in Wireless Sensor Network |
PDF
|
| Sudhakar S. Jadhav, Sonal A. Bankar | 307-311 |
| Ontology of Cloud Computing Service, Technology, and Security |
PDF
|
| G. Sathishkumar, B.R. Laxmi Sree | 312-315 |
| A Novel Client Side Intrusion Detection and Response Framework |
PDF
|
| B. Padhmavathi, M. Jyotheeswar Arvind, G. Ritikesh | 316-321 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616