Table of contents
International Journal of Network Security & Its Applications
http://airccse.org/journal/ijnsa.html
Year: 2010 - Volume: 2 - Issue: 1
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-HOC NETWORKS
Author: James Cannady Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 01-07
A Frame Work for Ontological Privacy Preserved Mining
Author: Geetha Mary. A --- Sriman Narayana Iyengar. N.Ch. Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 09-20
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS
Author: Yan Luo Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 22-41
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO AND VIDEO COVER MEDIA
Author: Natarajan Meghanathan --- Lopamudra Nayak Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 43-55
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
Author: Omessaad Hamdi --- Manel abdelhedi --- Ammar Bouallegue --- Sami Harari Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 57-63
Advanced Security Management in Metro Ethernet Networks
Author: Ammar Rayes Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 65-80
COMBINING PRIVATE AND PUBLIC KEY ENCRYPTION TECHNIQUES FOR PROVIDING EXTREME SECURE ENVIRONMENT FOR AN ACADEMIC INSTITUTION APPLICATION
Author: Syed S. Rizvi --- Aasia Riasat --- Khaled M. Elleithy Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 82-96
PLEDGE: A POLICY-BASED SECURITY PROTOCOL FOR PROTECTING CONTENT ADDRESSABLE STORAGE ARCHITECTURES
Author: Wassim Itani --- Ayman Kayssi --- Ali Chehab Journal: International Journal of Network Security & Its Applications Year: 2010 Vol: 2 Issue: 1 Pages/record No.: 98-115
Paper submission Authors are invited to submit papers for this journal through e-mail ijnsa@airccse.org Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.Important Dates Submission deadline: 28 February 2010Acceptance notification: 31 March 2010Final manuscript due: 15 April 2010 Publication date: determined by the Editor-in-Chief
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment