To increase the usability of a public transport system it needs to go under revolutionary changes in its operating procedure. It is an attempt to make this possible using recent computer technology, mobile computin...
As an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company’s high-performance computing and storage infrastructure...
Peer-to-Peer systems have become, in a short period of
time, one of the fastest growing and most popular
applications. The decentralized and distributed nature of P2P
systems leads to living aside the client-...
With the rapid development of the internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, unauthorized access of the information over the network become greater issues now a d...
Intrusion detection and clustering have always been hot topics in the field of machine learning. Clustering as an intrusion detection technique has long before proved to be beneficial. But as the methods and types of att...
EP ID EP86005
DOI -
Views 126
Downloads 0
How To Cite
Anuradha Bhatia, Shefali Patil (2011). . International Journal of Computer Science and Communication Networks, 1(2),
111-116. https://europub.co.uk/articles/-A-86005
Sign In Europub
For faster login or register use your social account.
Intelligent Public Transport System with Information Forensics and Security
To increase the usability of a public transport system it needs to go under revolutionary changes in its operating procedure. It is an attempt to make this possible using recent computer technology, mobile computin...
Secure Cloud Storage
As an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company’s high-performance computing and storage infrastructure...
Implementation of Session- State -Service -A Framework for P2P Network
Peer-to-Peer systems have become, in a short period of time, one of the fastest growing and most popular applications. The decentralized and distributed nature of P2P systems leads to living aside the client-...
Study of Information Hiding Techniques and their Counterattacks: A Review Article
With the rapid development of the internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, unauthorized access of the information over the network become greater issues now a d...
Fuzzy Clustering as an Intrusion Detection Technique
Intrusion detection and clustering have always been hot topics in the field of machine learning. Clustering as an intrusion detection technique has long before proved to be beneficial. But as the methods and types of att...