Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_61
R. Chandrashekhar, Manoj Mardithaya, P. S. Thilagam, Dipankar Saha
{"title":"SQL Injection Attack Mechanisms and Prevention Techniques","authors":"R. Chandrashekhar, Manoj Mardithaya, P. S. Thilagam, Dipankar Saha","doi":"10.1007/978-3-642-29280-4_61","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_61","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125047622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_43
B. S. Panda, D. Shetty
{"title":"Strong Minimum Interference Topology for Wireless Sensor Networks","authors":"B. S. Panda, D. Shetty","doi":"10.1007/978-3-642-29280-4_43","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_43","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126089834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_20
Sudha Subramani, Sathiyabhama Balasubramaniam
{"title":"Post Mining of Diversified Multiple Decision Trees for Actionable Knowledge Discovery","authors":"Sudha Subramani, Sathiyabhama Balasubramaniam","doi":"10.1007/978-3-642-29280-4_20","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_20","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114252181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_15
P. Cyriac, Philomina Simon
{"title":"Performance Analysis of Pedestrian Detection at Night Time with Different Classifiers","authors":"P. Cyriac, Philomina Simon","doi":"10.1007/978-3-642-29280-4_15","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_15","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121059723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_34
A. K. Karunakar, Younsong Qio, Brian A. Lee
{"title":"Scalable Video Delivery over Peer-to-Peer Network","authors":"A. K. Karunakar, Younsong Qio, Brian A. Lee","doi":"10.1007/978-3-642-29280-4_34","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_34","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121526422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_54
Prof. Jayappa(J) Hanumanthappa Davanagere, D. Manjaiah
{"title":"A Mathematical Model to Realize the Parallel Computing Based Diminution Tree with List Ranking Based BD-TTCS as a New IPv4/IPv6 Transition Mechanism","authors":"Prof. Jayappa(J) Hanumanthappa Davanagere, D. Manjaiah","doi":"10.1007/978-3-642-29280-4_54","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_54","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121787404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_70
J. Grover, V. Laxmi, M. Gaur
{"title":"Misbehavior Detection Based on Ensemble Learning in VANET","authors":"J. Grover, V. Laxmi, M. Gaur","doi":"10.1007/978-3-642-29280-4_70","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_70","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_55
Bartosz Brodecki, J. Brzeziński, Piotr Sasak, Michal Szychowiak
{"title":"Consistency Maintenance of Modern Security Policies","authors":"Bartosz Brodecki, J. Brzeziński, Piotr Sasak, Michal Szychowiak","doi":"10.1007/978-3-642-29280-4_55","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_55","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114246325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_52
Shreesha Kashyap, V. ShravanI., Anuraj Suman, T. K. Ramesh, R. VayaP.
{"title":"An Efficient and Reliable Centralized Connection Management Scheme for Computer Networks","authors":"Shreesha Kashyap, V. ShravanI., Anuraj Suman, T. K. Ramesh, R. VayaP.","doi":"10.1007/978-3-642-29280-4_52","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_52","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117336981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_8
Deivamani Mallayya, Baskaran Ramachandran
{"title":"Reconfigurable Web Service Composition Using Belief Revision","authors":"Deivamani Mallayya, Baskaran Ramachandran","doi":"10.1007/978-3-642-29280-4_8","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_8","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}