Zobrazeno 1 - 9
of 9
pro vyhledávání: '"E. Vishnu Balan"'
Publikováno v:
Procedia Computer Science. 50:109-114
Mobile adhoc network (MANET) is an infrastructure less wireless network and self-organized. During communication mobile adhoc network do not use any proper infrastructure so that MANET initiates request for data transfer, so MANET is vulnerable to va
Publikováno v:
Indian Journal of Science and Technology. 8
Background: The Distributed Denial of Service (DDoS) attack is one of the most recent and most vulnerable attacks that can happen to a web server to crash or stop providing survive. Many papers have been proposed to resolve this attack and have resol
Publikováno v:
Indian Journal of Science and Technology. 8
Background: Internet of Things (IoT) is the next emerging technique in which each and every thing in the world is getting connected to the internet by means of various communication techniques. By using the technique of multicasting, these things com
Publikováno v:
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM).
In today's computer world security is the major issue. For every project most of the money spent on the security and testing than developing. Because security issue is one of the major issue for everyone to protect data. According to the security ana
Publikováno v:
2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM).
Due to raising concerns about the privacy preserving of personal information, organizations which are using the customers' records in data mining activities are rammed to take actions for protecting the individual's privacy. Preserving of sensitive a
Publikováno v:
2014 IEEE International Conference on Computational Intelligence and Computing Research.
Energy consumption is major issue in any type of Wireless Sensor Network (WSN) application. The main concern of this paper is how to increase the lifetime of network in WSN application. In any WSN application, data is measured and the same is sent to
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.