Search
Now showing items 1-7 of 7
GRAY HOLE ATTACK ON HYBRID 5G NETWORK
(International Journal of Advanced Research in Computer Science, 2017)
5G device to device communication is such a product of progressive thinking, a network that uses both LTE communication scenario in conjugation with Wi-Fi low band communication. The main idea for conjunction of two different ...
Deployment of Coordinated Multiple Sensors to Detect Stealth Man-in-the-Middle Attack in WLAN
(Modern Education and Computer Science Press, 2016)
The use of wireless devices is increasing tremendously in our day-to-day life because of their portability and ease of deployment. The augmented practices of using these technologies have put the user security at risk. The ...
TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection
(Modern Education and Computer Science Press, 2016)
Fast-flux service networks (FFSN) helps the cyber-criminals to hide the servers used for malicious activities behind a wall of proxies (bots). It provides the reliability and detection evasion to a malicious server. FFSN ...
Recovery Based Architecture To Protect Hids Log Files Using Time Stamps
(ACADEMY PUBLISHER, 2010)
After the great revolution in the field of Information Technology, many applications made necessity to run computer systems (either servers or client machines) all the time. Along with improvements and new inventions
in ...
SHED: Spam Ham Email Dataset
(International Journal on Recent and Innovation Trends in Computing and Communication (, 2017)
Automatic filtering of spam emails becomes essential feature for a good email service provider. To gain direct or indirect benefits organizations/individuals are sending a lot of spam emails. Such kind emails activities ...
SLA Aware Approach for Virtual Machine Placement in Cloud Datacenter
(Publishing India, 2014)
The massive adoption of cloud computing by IT industry has caused a dramatic increase in energy consumption and its impact on the environment in terms of carbon footprints. The high cost of energy and link between energy ...
Handover between Wi-Fi and WiMAX technologies using GRE tunnel
(Springer, 2019)
The next era of wireless grid inclines to be heterogeneous in the composition, i.e., wireless technologies like Wi-Fi and WiMAX networks desire co-breathe, so there is a demand for the best utilization of the accessible ...