Table of Contents
Articles
A New Approach of Detecting Network Anomalies using Improved ID3 with Horizontal Partioning Based Decision Tree | |
Sonika Tiwari, Roopali Soni | 1-6 |
Implementation of Query Optimization for Reducing Run Time | |
S.C. Tawalare, S.S. Dhande | 7-11 |
Performance Evaluation of Network Security Protocols on Open Source and Microsoft Windows Platforms | |
Oluwaranti A.I., Adejumo, E.O. | 12-21 |
Elimination of Wormhole Attacker Node in MANET Using Performance Evaluation Multipath Algorithm | |
Rajpal Singh Khainwar, Anurag Jain, Jagdish Prasad Tyagi | 22-29 |
Energy Efficient Protocol with Static Clustering (EEPSC) Comparing with Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol | |
Vinidha roc, Ajay D. Vimalraj, C.Maria Antoine Pushparaj | 30-37 |
Using Multi-agent System for Solving Coverage Problem in Wireless Sensor Network | |
Sherehan aburomman, Khalaf khataneh | 38-45 |
Synthesis and Performance Analysis of Network Topology using Graph Theory | |
U N Bassey, K N Bassey, E N Bassey | 46-53 |
Paper submission email: NCS@iiste.org
ISSN (Paper)2224-610X ISSN (Online)2225-0603
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org