A Method of Detecting Sql Injection Attack to Secure Web Applications |
Sruthy Manmadhan and Manesh T, Adi Shankara Institute of Engineering & Technology, India |
Volume : 3 volume number : 6 pdf |
A Beaconing Approach with Key Exchange in Vehicular Ad Hoc Networks |
Mohammed ERRITALI, Oussama Mohamed Reda and Bouabid El Ouahidi, Mohamed V University - Faculty of Sciences Rabat, Morocco |
Volume : 3 volume number : 6 pdf |
MECB-AODV: A Modified Energy Constrained Based Protocol for Mobile Ad hoc Networks |
Akhilesh Tripathi and Rakesh Kumar, Madan Mohan Malaviya Engineering College, India |
Volume : 3 volume number : 6 pdf |
Gsm Based Embedded System for Remote Laboratory Safety Monitoring and Alerting |
V.Ramya, B. Palaniappan and V.Sumathi, Annamalai University, India |
Volume : 3 volume number : 6 pdf |
Evaluation of Data Processing Using MapReduce Framework in Cloud and Stand - Alone Computing |
Samira Daneshyar and Ahmed Patel, Universiti Kebangsaan Malaysia, Malaysia |
Volume : 3 volume number : 6 pdf |
Wireless Sensor Network in Niger Delta Oil and Gas Field Monitoring: The Security Challenges and Countermeasures |
Fidelis C. Obodoeze, Hyacinth C. Inyiama and V.E. Idigo, Nnamdi Azikiwe University, Nigeria |
Volume : 3 volume number : 6 pdf |
Implementation of Network Community Profile using Local Spectral algorithm and its application in Community Networking |
Vaibhav VPrakash, Sri Jayachamarajendra College of Engineering, India |
Volume : 3 volume number : 6 pdf |
QOS Enhanced Hybrid Multipath Routing Protocol for Mobile Adhoc Networks |
P.Rama Devi1 and D.Srinivasa Rao2, 1Abhinav Hitech College of Engineering, Hyderabad and 2JNTU CE, Hyderabad |
Volume : 3 volume number : 6 pdf |
Fast Parallel Sorting Algorithms on GPUs |
Bilal Jan, Bartolomeo Montrucchio, Carlo Ragusa, Fiaz Gul Khan and Omar Khan, Politecnico di Torino, Italy |
Volume : 3 volume number : 6 pdf |
An Efficient Security Approach Using PGE and Parity Coding |
Ch. Rupa1, P. S Avadhani2 and E. SrinivasReddy3, 1VVIT, India, 2Andhra University, India and 3Nagarjuna University, India |
Volume : 3 volume number : 6 pdf |
Performance Assessment of Communication Network in WAMS |
Kiran Gajrani1, Krishan Gopal Sharma2 and Annapurna Bhargava1, 1Rajasthan Technical University, India and 2Government Engineering College, India |
Volume : 3 volume number : 6 pdf |
Enhancement of TCP Performance with the Help of Snoop Protocol in Wired CUM Wireless Network |
Maninder Kaur and and Parminder Singh, CEC Landran, India |
Volume : 3 volume number : 6 pdf |
Mining Association Rule for Horizontally Partitioned Databases Using CK Secure Sum Technique |
Jayanti Danasana, Raghvendra Kumar and Debadutta Dey, KIIT University, India |
Volume : 3 volume number : 6 pdf |
Adaptation of the Method of Estimation and Motion Compensation in the Transmission of the Video Sequence in Jpeg 2000 |
Abdou Khadre Diop, Khaly Tall, Idy Diop and Sidi Mohamed Farssi, Cheikh Anta Diop university, Senegal |
Volume : 3 volume number : 6 pdf |