Flooding Attacks Detection of Mobile Agents in IP Networks |
Jean Tajer, Mo Adda and Benjamin Aziz, University of Portmouth, United Kingdom |
Volume : 7 volume number : 5 pdf |
Dynamic Curative Mechanism for Geographic Routing in Wireless Multimedia Sensor Networks |
Mohamed Nacer Bouatit and Selma Boumerdassi, Conservatoire National des Arts et Metiers - Paris, France |
Volume : 7 volume number : 5 pdf |
Secret Image Transmission Through Mosaic Image |
Shahanaz N and Greeshma R, M Dasan Institute of Technology, India |
Volume : 7 volume number : 5 pdf |
Managing Security and Compliance Risks of Outsourced IT Projects |
Moneef Almutairi and Stephen Riddle, Newcastle University, United Kingdom |
Volume : 7 volume number : 5 pdf |
Large Scale Multi User MIMO Approach for Wireless Backhaul Based HETNETs |
Mostafa Hefnawi, Royal Military College of Canada, Canada |
Volume : 7 volume number : 5 pdf |
JCWAEED : Joint Channel Assignment and Weighted Average Expected End-To-End Delay Routing Protocol in Wireless Mesh Networks |
Wang Yi-rong1, Wang Yan-ru2, Zhang Hao3, Liu Kai-ming3 and Li Nan3, 1,2Beijing Guodiantong Network Technology Co.Ltd., China and 3Economic and Technical Research Institute, China |
Volume : 7 volume number : 5 pdf |
Reducing Frequency of Group Rekeying Operation |
YunSuk Yeo, Sangwon Hyun and Tai-Myoung Chung, Sungkyunkwan University, South Korea |
Volume : 7 volume number : 5 pdf |
Clustering Hyperspectral Data |
Arwa Alturki and Ouiem Bchir, King Saud University, Saudi Arabia |
Volume : 7 volume number : 5 pdf |
A Process of Link Mining |
Zakea Il-agure and Hicham Noureddine Itani, Higher Colleges of Technology, United Arab Emirates |
Volume : 7 volume number : 5 pdf |