Vol 3, No 7 (2013)
Table of Contents
Articles
A New Approach of Detecting Network Anomalies using Improved ID3 with Horizontal Partioning Based Decision Tree | |
Sonika Tiwari, Roopali Soni | 1-6 |
Implementation of Query Optimization for Reducing Run Time | |
S.C. Tawalare, S.S. Dhande | 7-11 |
Performance Evaluation of Network Security Protocols on Open Source and Microsoft Windows Platforms | |
Oluwaranti A.I., Adejumo, E.O. | 12-21 |
Elimination of Wormhole Attacker Node in MANET Using Performance Evaluation Multipath Algorithm | |
Rajpal Singh Khainwar, Anurag Jain, Jagdish Prasad Tyagi | 22-29 |
Energy Efficient Protocol with Static Clustering (EEPSC) Comparing with Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol | |
Vinidha roc, Ajay D. Vimalraj, C.Maria Antoine Pushparaj | 30-37 |
Using Multi-agent System for Solving Coverage Problem in Wireless Sensor Network | |
Sherehan aburomman, Khalaf khataneh | 38-45 |
Synthesis and Performance Analysis of Network Topology using Graph Theory | |
U N Bassey, K N Bassey, E N Bassey | 46-53 |
Paper submission email: NCS@iiste.org
ISSN (Paper)2224-610X ISSN (Online)2225-0603