​
Login / Signup
ACITY (1)
2012
2012
2012
Keyphrases
Publications
2012
Majid Nezakatolhoseini
,
Sam Jabbehdari
,
Mohammad Ali Pourmina
Analysis and Performance Evaluation of Application Specific Processors for Network-Based Intrusion Detection Systems.
ACITY (1)
(2012)
R. Venkadeshan
,
M. Jegatha
Super Peer Deployment in Unstructured Peer-to-Peer Networks.
ACITY (1)
(2012)
Preetha Theresa Joy
,
K. Polouse Jacob
A Comparative Study of Cache Replacement Policies in Wireless Mobile Networks.
ACITY (1)
(2012)
Bukke Devendra Naik
,
Sarath Chandra Boddukolu
,
Pothula Sujatha
,
P. Dhavachelvan
Connecting Entropy-Based Detection Methods and Entropy to Detect Covert Timing Channels.
ACITY (1)
(2012)
P. R. Mahalingam
Intelligent Network-Based Intrusion Detection System (iNIDS).
ACITY (1)
(2012)
Shaikh Mohammed Atiq
,
Dayanand Ingle
,
B. B. Meshram
Web Mining and Security in E-commerce.
ACITY (1)
(2012)
K. Anitha Kumari
,
G. Sudha Sadasivam
,
Bhandari Chetna
,
S. Rubika
A Novel Triangle Centroid Authentication Protocol for Cloud Environment.
ACITY (1)
(2012)
Swarnali Hazra
,
S. K. Setua
Trust Oriented Secured AODV Routing Protocol against Rushing Attack.
ACITY (1)
(2012)
Nagesha
,
Sunilkumar S. Manvi
Performance Analysis of SCTP Compared to TCP and UDP.
ACITY (1)
(2012)
S. Indu Vadhani
,
G. Vithya
,
B. Vinayagasundaram
Quantum DOT Sensor for Image Capturing and Routing Based on Temporal Power and Critical Factor.
ACITY (1)
(2012)
Chaitali Biswas Dutta
,
Utpal Biswas
Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV.
ACITY (1)
(2012)
Shailaja C. Patil
,
Ashish Gupta
,
Mukesh A. Zaveri
Efficient Target Recovery in Wireless Sensor Network.
ACITY (1)
(2012)
Manjusha Karkhanis
,
Achala Deshmukh
Analysis of MIMO Channel Characteristics in Indoor Environment Using Ray Tracing Simulator.
ACITY (1)
(2012)
Nithin Srinivasan
,
Sriram Ravichandran
,
Shruthi Ravichandran
,
Prabagarane Nagaradjane
Multiuser Transmitter Preprocessing Aided Downlink Communications in Correlated Frequency-Selective Channels.
ACITY (1)
(2012)
Aakanksha Pandey
,
Nilay Khare
String Matching Technique Based on Hardware: A Comparative Analysis.
ACITY (1)
(2012)
Durgesh Bajpai
,
Manu Vardhan
,
Sachin Gupta
,
Ravinder Kumar
,
Dharmender Singh Kushwaha
Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services.
ACITY (1)
(2012)
Priyanka Dey
,
Suparna Biswas
Low Overhead Handoff Based Secure Checkpointing for Mobile Hosts.
ACITY (1)
(2012)
Rajesh P. Barnwal
,
Arnab Thakur
Performance Analysis of AODV and DSDV Protocols Using RPGM Model for Application in Co-operative Ad-Hoc Mobile Robots.
ACITY (1)
(2012)
Rakesh Matam
,
Somanath Tripathy
Reliability Enhanced Routing Protocol for Wireless Mesh Networks.
ACITY (1)
(2012)
L. K. Joshila Grace
,
V. Maheswari
,
Dhinaharan Nagamalai
Personalised High Quality Search with in a Web Site: No User Profiling.
ACITY (1)
(2012)
Dipayan Bose
,
Arnab Banerjee
,
Aniruddha Bhattacharyya
,
Himadri Nath Saha
,
Debika Bhattacharyya
,
Pranab Kumar Banerjee
An Efficient Approach to Secure Routing in MANET.
ACITY (1)
(2012)
D. Chandramohan
,
T. Vengattaraman
,
M. S. Saleem Basha
,
P. Dhavachelvan
MSRCC - Mitigation of Security Risks in Cloud Computing.
ACITY (1)
(2012)
Premraj Mahajan
,
Anjali Sardana
Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis.
ACITY (1)
(2012)
Manpreet Kaur
,
Rajni
,
Parminder Singh
Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET.
ACITY (1)
(2012)
Nur Al Hasan Haldar
,
Muhammad Abulaish
,
Syed Asim Pasha
A Statistical Pattern Mining Approach for Identifying Wireless Network Intruders.
ACITY (1)
(2012)
J. Julia
,
Meenakshi Murugappan
Performance Improvement in MIMO Systems Using Rotating Codebooks.
ACITY (1)
(2012)
Amit Kumar Srivastava
,
Arun Kumar Misra
Plugging DHCP Security Holes Using S-DHCP.
ACITY (1)
(2012)
J. Valarmathi
,
K. Lakshmi
,
R. S. Menaga
,
K. V. Abirami
,
V. Rhymend Uthariaraj
SLA for a Pervasive Healthcare Environment.
ACITY (1)
(2012)
Srimanta Halder
,
Monomita Mazumdar
,
Prasenjit Chanak
,
Indrajit Banerjee
FTLBS: Fault Tolerant Load Balancing Scheme in Wireless Sensor Network.
ACITY (1)
(2012)
Ayan Kumar Das
,
Rituparna Chaki
MERCC: Multiple Events Routing with Congestion Control for WSN.
ACITY (1)
(2012)
C. H. Sandhya
,
Deepali R. Borade
,
Rinki Sharma
,
Govind R. Kadambi
Multi-dimensional Performance Characterization of Directional Antennas for Applications in Energy Efficient Ad-Hoc Network.
ACITY (1)
(2012)
Banda Sreenivas
,
S. Ramesh Babu
,
S. Prabhakar
,
D. Karunakar Reddy
Effective Resource Allocation Technique for Wireless Cellular System.
ACITY (1)
(2012)
Mayank Kumar Goyal
,
Alok Aggarwal
Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment.
ACITY (1)
(2012)
Amritha Sampath
,
C. Tripti
Synchronization in Distributed Systems.
ACITY (1)
(2012)
Sevil Sen
,
Zeynep Dogmus
Feature Selection for Detection of Ad Hoc Flooding Attacks.
ACITY (1)
(2012)
Shailaja C. Patil
,
Mukesh A. Zaveri
Localization in Wireless Sensor Network: A Distributed Approach.
ACITY (1)
(2012)
Jagadeesh Kakarla
,
S. Siva Sathya
Route and Load Aware Channel Assignment Algorithm for Multichannel and Multi Radio Vehicular Ad-Hoc Networks.
ACITY (1)
(2012)
Kirti Dhwaj
,
Rachit Garg
,
Gaurav Mishra
,
Neetesh Purohit
Design and Analysis of Dual Capacitively Loaded C-PIFA.
ACITY (1)
(2012)
Sarbani Roy
,
Nandini Mukherjee
Topology Construction of 3D Wireless Sensor Network.
ACITY (1)
(2012)
Paras Gupta
,
Manu Vardhan
,
Akhil Goel
,
Abhinav Verma
,
Dharmender Singh Kushwaha
On the Fly File Dereplication Mechanism.
ACITY (1)
(2012)
Ambrish Srivastav
,
Nitin Hambir
English to Hindi Machine Translator Using GMT and RBMT Approach.
ACITY (1)
(2012)
S. V. Nagaraj
Securing Multi-agent Systems: A Survey.
ACITY (1)
(2012)
Koushik Majumder
,
Sudhabindu Ray
,
Subir Kumar Sarkar
Hybrid Scenario Based Analysis of the Effect of Variable Node Speed on the Performance of DSDV and DSR.
ACITY (1)
(2012)
Shivani Mishra
,
Krishna Kant
,
R. S. Yadav
Multi Tree View of Complex Attack - Stuxnet.
ACITY (1)
(2012)
Roger Zahno
,
Amr M. Youssef
An Obfuscated Implementation of RC4.
ACITY (1)
(2012)
B. Soniya
,
M. Wilscy
Host-Based Bot Detection Using Destination White-Lists for User's Profile.
ACITY (1)
(2012)
Moon Ho Lee
,
Md. Hashem Ali Khan
,
Daechul Park
Jong Nang 3-Input NOR Channel, .
ACITY (1)
(2012)
Ramanuj Chouksey
,
R. Sivashankari
,
Piyush Singhai
ECDLP Based Proxy Multi-signature Scheme.
ACITY (1)
(2012)
Chandra Thapa
,
C. Chandrasekhar
Analysis of Fractional Frequency Reuse (FFR) over Classical Reuse Scheme in 4G (LTE) Cellular Network.
ACITY (1)
(2012)
volume 176, 2012
Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 1
ACITY (1)
176 (2012)