Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine
Bakshi, Aman, Dujodwala, Yogesh B.
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
A Novel Handover Mechanism Between Femtocell and Macrocell for LTE Based Networks
Zhang, Haijun, Wen, Xiangming, Wang, Bo, Zheng, Wei, Sun, Yong
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
ARIMA Based Network Anomaly Detection
Yaacob, A.H., Tan, I.K.T., Su Fong Chien, Hon Khi Tan
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
Network Traffic Analysis and Intrusion Detection Using Packet Sniffer
Qadeer, M.A., Zahid, M., Iqbal, A., Siddiqui, M.R.
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
Peak to Average Power Ratio Analysis for LTE Systems
Rana, M.M., Islam, M.S., Kouzani, A.Z.
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
VANET Security Framework for Trusted Grouping Using TPM Hardware
Wagan, A.A., Mughal, B.M., Hasbullah, H.
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
Personal Authentication Based on Keystroke Dynamics Using Soft Computing Techniques
Karnan, M., Akila, M.
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
Optimal Multiple Sink Nodes Deployment in Wireless Sensor Networks Based on Gene Expression Programming
Shucheng Dai, Changjie Tang, Shaojie Qiao, Kaikuo Xu, Hongjun Li, Jun Zhu
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
AES Encryption Algorithm Based on the High Performance Computing of GPU
Fei Shao, Zinan Chang, Yi Zhang
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
New Handover Scheme Based on User Profile: A Comparative Study
Pushpa, Sehgal, A., Agrawal, R.
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
A Novel Recursive Method for Analysis Performance of TCP Flow in Wireless LAN
Hassani, M.M., Mohammadi, M., Pashforoush, S.
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
Implementation of OFDM Baseband Trasmitter Compliant IEEE Std 802.16d on FPGA
Abbas, S., Khan, W.A., Khan, T.A., Ahmed, S.
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
Modulation Classification of MQAM Signals from Their Constellation Using Clustering
Changyi Yin, Bingbing Li, Yanling Li
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
Design and Analysis of Stream Cipher for Network Security
Lamba, C.S.
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
Stock Data Analysis Based on BP Neural Network
Zhou Yixin, Jie Zhang
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
A Review of Some Security Aspects of WiMAX and Converged Network
Habib, M., Ahmad, M.
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
A Comparative Study of Six Software Packages for Complex Network Research
Kaikuo Xu, Changjie Tang, Rong Tang, Ghulam Ali, Jun Zhu
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
Finding Optimal LSB Substitution Using Ant Colony Optimization Algorithm
Ching-Sheng Hsu, Shu-Fen Tu
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
Spectrum Allocation in Cognitive Radio Networks Using Swarm Intelligence
Zhang, Beiwei, Hu, Kunyuan, Zhu, Yunlong
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding
An Improved Implementation of Brain Tumor Detection Using Soft Computing
Logeswari, T., Karnan, M.
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Published in 2010 Second International Conference on Communication Software and Networks (01.02.2010)
Get full text
Conference Proceeding