Original Article article list


Restorative Justice: Concept and Practices

Author details : Shabeena Anjum

FUZZY IDEALS AND FUZZY DOT IDEALS ON BH-ALGEBRAS

Author details : K. Anitha ,Dr. N. Kandaraj

AN INTRUSION DETECTION AND AVOIDANCE MECHANISM TO SECURE MANETS

Author details : Syeda Kausar Fatima ,Dr. Syeda Gauhar Fatima ,Dr. Syed Abdul Sattar ,Dr. Anita Sheela

TRUST MODEL WITH DEFENSE SCHEME IN MANETS

Author details : Syeda Kausar Fatima ,Dr. Syeda Gauhar Fatima ,Dr. Syed Abdul Sattar ,Syed Mohd Ali

A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET

Author details : Syeda Kausar Fatima ,Dr. Syeda Gauhar Fatima ,Dr. Syed Abdul Sattar ,Dr. D.Srinivasa Rao

AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES

Author details : Syeda Kausar Fatima ,Dr. Syeda Gauhar Fatima ,Dr. Syed Abdul Sattar ,Dr. D. Srinivasa Rao

A MONITORING SCHEME WITH IOT AND SENSOR EXPERTISE

Author details : Syeda Kausar Fatima ,Dr. Syeda Gauhar Fatima ,Dr. Syed Abdul Sattar ,Dr. Anita Sheela

AN ADVANCED DATA SECURITY METHOD IN WSN

Author details : Syeda Kausar Fatima ,Dr. Syeda Gauhar Fatima ,Dr. Syed Abdul Sattar ,Dr. Anita Sheela

AN IMPROVED ROUTING PROTOCOL SCHEME IN ADHOC NETWORKS

Author details : Syeda Kausar Fatima ,Dr. Syeda Gauhar Fatima ,Dr. Syed Abdul Sattar ,Syed Mohd Ali

AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS

Author details : Syeda Kausar Fatima ,Dr. Syeda Gauhar Fatima ,Dr. Syed Abdul Sattar ,Dr. D. Srinivasa Rao

A RELATIVE STUDY ON CELLULAR, WSN AND MANETS

Author details : Syeda Kausar Fatima ,Dr. Syeda Gauhar Fatima ,Dr. Syed Abdul Sattar ,Syed Mohd Ali

MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY

Author details : Syeda kausar Fatima ,Dr. Syeda Gauhar Fatima ,Dr. Syed Abdul Sattar ,Syed Mohd Ali

PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR

Author details : Syeda Kausar Fatima ,Dr. Syeda Gauhar Fatima ,Dr.Syed Abdul Sattar , Syed Mohd Ali

METHODOLOGIES AND CHALLENGES OF WSN FOR IOT

Author details : Dr Syeda Gauhar Fatima ,Syeda Kausar Fatima ,Syed Mohd Ali ,Naseer Ahmed Khan ,Syed Adil

CLOUD COMPUTING AND LOAD BALANCING

Author details : Dr Syeda Gauhar Fatima ,Syeda Kausar Fatima ,Dr Syed Abdul Sattar ,Naseer Ahmed Khan ,Syed Adil

A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION IN WSNS

Author details : Dr Syeda Gauhar Fatima ,Syeda Kausar Fatima ,Dr Syed Abdul Sattar ,Naseer Ahmed Khan ,Syed Adil

A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS

Author details : Syeda Gauhar Fatima ,Syeda Kausar Fatima ,Syed Mohd.Ali



‹ First  < 845 846 847 848 849 >  Last ›