Now showing items 1-4 of 4

    • Combinational feature selection approach for network intrusion detection system 

      Garg, T.; Kumar, Y. (Institute of Electrical and Electronics Engineers Inc., 2015)
      In the era of digital world, the computer networks are receiving multidimensional advancements. Due to these advancements more and more services are available for malicious exploitation. New vulnerabilities are found from ...
    • Enhanced 2ACK scheme for reducing routing overhead in MANETs 

      Dhiman, D.; Sood, N. (Institute of Electrical and Electronics Engineers Inc., 2015)
      An autonomous collection of the mobile nodes communicating with each other with the help of wireless links either in a direct or indirect manner or rely on other mobile nodes is referred as MANET. The routing protocols in ...
    • Influence of link sensing mechanism of IMEP on the performance of TORA under different mobility models 

      Kaur, Amandeep; Mittal, Meenakshi (Institute of Electrical and Electronics Engineers Inc., 2015)
      The performance evaluation of Mobile Ad Hoc Network (MANET) routing protocols is an important as well as open area of research worldwide. Temporally Ordered Routing Algorithm (TORA) is an adaptable and distributed MANET ...
    • Performance evaluation of various symmetric encryption algorithms 

      Kansal, S.; Mittal, M. (Institute of Electrical and Electronics Engineers Inc., 2015)
      With rise in the use of internet in various fields like banking, military and government sector, the security and privacy of the data has been the main concern. Today, most of the data handling and electronic transactions ...