Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_3
S. Sangeetha, S. Haripriya, S. G. Mohana Priya, V. Vaidehi, N. Srinivasan
{"title":"Fuzzy Rule-Base Based Intrusion Detection System on Application Layer","authors":"S. Sangeetha, S. Haripriya, S. G. Mohana Priya, V. Vaidehi, N. Srinivasan","doi":"10.1007/978-3-642-14478-3_3","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_3","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114948622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_23
T. Subashri, R. Arunachalam, B. Kumar, V. Vaidehi
{"title":"Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory","authors":"T. Subashri, R. Arunachalam, B. Kumar, V. Vaidehi","doi":"10.1007/978-3-642-14478-3_23","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_23","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132560547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_32
Niwas Maskey, G. Sachdeva
{"title":"Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks","authors":"Niwas Maskey, G. Sachdeva","doi":"10.1007/978-3-642-14478-3_32","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_32","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134161630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_13
N. Bhalaji, A. Shanmugam
{"title":"A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks","authors":"N. Bhalaji, A. Shanmugam","doi":"10.1007/978-3-642-14478-3_13","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_13","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114650963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_31
Ankur Gupta
{"title":"Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise","authors":"Ankur Gupta","doi":"10.1007/978-3-642-14478-3_31","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_31","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_26
R. Dhanalakshmi, C. Chellappan
{"title":"Detection and Recognition of File Masquerading for E-mail and Data Security","authors":"R. Dhanalakshmi, C. Chellappan","doi":"10.1007/978-3-642-14478-3_26","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_26","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123454997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_47
J. Grover, Deepak Kumar, M. Sargurunathan, M. Gaur, V. Laxmi
{"title":"Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks","authors":"J. Grover, Deepak Kumar, M. Sargurunathan, M. Gaur, V. Laxmi","doi":"10.1007/978-3-642-14478-3_47","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_47","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123973423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}