Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_65
Zakiya Malek, A. Koshti, C. Bhatt, Hemant Agrwal, Bhushan Trivedi
{"title":"Correlation in Distributed Intrusion Detection System Using Mobile Agent","authors":"Zakiya Malek, A. Koshti, C. Bhatt, Hemant Agrwal, Bhushan Trivedi","doi":"10.1007/978-3-642-29280-4_65","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_65","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127243800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_5
Joon-Mo Yang, Jun-Yong Park, Ryumduck Oh
{"title":"Context Awareness Acquisition for Safety Sensor Data Processing on Industrial Sensor Network","authors":"Joon-Mo Yang, Jun-Yong Park, Ryumduck Oh","doi":"10.1007/978-3-642-29280-4_5","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_5","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124503006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_51
M. Tahiliani, K. Shet, T. Basavaraju
{"title":"FARED: Fast Adapting RED Gateways for TCP/IP Networks","authors":"M. Tahiliani, K. Shet, T. Basavaraju","doi":"10.1007/978-3-642-29280-4_51","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_51","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125024798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_57
Priyanka Dadhich, Kamlesh Dutta, M. C. Govil
{"title":"Reputation-Based Trust for Mobile Agents","authors":"Priyanka Dadhich, Kamlesh Dutta, M. C. Govil","doi":"10.1007/978-3-642-29280-4_57","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_57","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130257805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_9
P. Harshavardhanan, J. Akilandeswari, K. Krishna
{"title":"Semantic Web Service Discovery with Structural Level Matching of Operations","authors":"P. Harshavardhanan, J. Akilandeswari, K. Krishna","doi":"10.1007/978-3-642-29280-4_9","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_9","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116188232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_42
R. Jha, A. Wankhade, U. Dalal
{"title":"An Optimum Approach for Radio Resource Allocation(RRA) in Mobile WiMAX Network","authors":"R. Jha, A. Wankhade, U. Dalal","doi":"10.1007/978-3-642-29280-4_42","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_42","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121777041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_27
K. Guruprasad
{"title":"EgressBug: A Real Time Path Planning Algorithm for a Mobile Robot in an Unknown Environment","authors":"K. Guruprasad","doi":"10.1007/978-3-642-29280-4_27","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_27","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124121023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_63
Ketki Arora, Krishan Kumar, M. Sachdeva
{"title":"Characterizing DDoS Attack Distributions from Emulation Based Experiments on DETER Testbed","authors":"Ketki Arora, Krishan Kumar, M. Sachdeva","doi":"10.1007/978-3-642-29280-4_63","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_63","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130602994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_19
S. Urolagin, K. Prema, N. Reddy
{"title":"Generalization Capability of Artificial Neural Network Incorporated with Pruning Method","authors":"S. Urolagin, K. Prema, N. Reddy","doi":"10.1007/978-3-642-29280-4_19","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_19","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115380888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-16DOI: 10.1007/978-3-642-29280-4_73
G. Karri, P. S. Thilagam
{"title":"Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network","authors":"G. Karri, P. S. Thilagam","doi":"10.1007/978-3-642-29280-4_73","DOIUrl":"https://doi.org/10.1007/978-3-642-29280-4_73","url":null,"abstract":"","PeriodicalId":210045,"journal":{"name":"International Conference on Advanced Computing, Networking and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124653140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}