Browsing by Subject "Mobile security"
Now showing items 1-4 of 4
-
Combinational feature selection approach for network intrusion detection system
(Institute of Electrical and Electronics Engineers Inc., 2015)In the era of digital world, the computer networks are receiving multidimensional advancements. Due to these advancements more and more services are available for malicious exploitation. New vulnerabilities are found from ... -
Enhanced 2ACK scheme for reducing routing overhead in MANETs
(Institute of Electrical and Electronics Engineers Inc., 2015)An autonomous collection of the mobile nodes communicating with each other with the help of wireless links either in a direct or indirect manner or rely on other mobile nodes is referred as MANET. The routing protocols in ... -
Influence of link sensing mechanism of IMEP on the performance of TORA under different mobility models
(Institute of Electrical and Electronics Engineers Inc., 2015)The performance evaluation of Mobile Ad Hoc Network (MANET) routing protocols is an important as well as open area of research worldwide. Temporally Ordered Routing Algorithm (TORA) is an adaptable and distributed MANET ... -
Performance evaluation of various symmetric encryption algorithms
(Institute of Electrical and Electronics Engineers Inc., 2015)With rise in the use of internet in various fields like banking, military and government sector, the security and privacy of the data has been the main concern. Today, most of the data handling and electronic transactions ...