2010-01-27

[Tccc] TOC:International Journal of Network Security & Its Applications (IJNSA)

 

Table of contents

International Journal of Network Security & Its Applications   
http://airccse.org/journal/ijnsa.html

Year: 2010 - Volume: 2 - Issue: 1


DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-HOC NETWORKS
Author: James Cannady Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 01-07
   

A Frame Work for Ontological Privacy Preserved Mining
Author: Geetha Mary. A --- Sriman Narayana Iyengar. N.Ch. Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 09-20
   

WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS
Author: Yan Luo Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 22-41
   

STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO AND VIDEO COVER MEDIA
Author: Natarajan Meghanathan --- Lopamudra Nayak Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 43-55
   

WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
Author: Omessaad Hamdi --- Manel abdelhedi --- Ammar Bouallegue --- Sami Harari Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 57-63
   

Advanced Security Management in Metro Ethernet Networks
Author: Ammar Rayes Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 65-80
   

COMBINING PRIVATE AND PUBLIC KEY ENCRYPTION TECHNIQUES FOR PROVIDING EXTREME SECURE ENVIRONMENT FOR AN ACADEMIC INSTITUTION APPLICATION
Author: Syed S. Rizvi --- Aasia Riasat --- Khaled M. Elleithy Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 82-96
   

PLEDGE: A POLICY-BASED SECURITY PROTOCOL FOR PROTECTING CONTENT ADDRESSABLE STORAGE ARCHITECTURES
Author: Wassim Itani --- Ayman Kayssi --- Ali Chehab Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 98-115
   

 Paper submission Authors are invited to submit papers for this journal through e-mail ijnsa@airccse.org Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.Important Dates Submission deadline:     28 February 2010Acceptance notification: 31 March  2010Final manuscript due:    15 April 2010 Publication date:        determined by the Editor-in-Chief
 



_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: