Table of Contents
Articles
Distributed Hash Tables in P2P Network: Detection and Prevention of Threats and Vulnerability | |
Mohammad Naderuzzman, Md. Nasim Akhtar | 1-9 |
Getting Relational Database from Legacy Data-MDRE Approach | |
Omar EL BEGGAR, Brahim BOUSETTA, Taoufiq GADI | 10-32 |
Network Traffic Analysis: A Case Study of ABU Network | |
SB .A. Mohammed, S.M Sani, D.D. DAJAB | 33-39 |
An Evaluation of Mobile Phone Usage Restriction in Selected Public Places in Akure, Nigeria | |
Wasiu Lawal, E.O. Ogunti | 40-46 |
Investigating the Performance of VOIP over WLAN in Campus Network | |
U. R. ALO, NWEKE HENRY FRIDAY | 47-58 |
Paper submission email: CEIS@iiste.org
ISSN (Paper)2222-1727 ISSN (Online)2222-2863
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org