Abstract

Authors and Affiliations

Anuradha Bhatia , Shefali Patil

Keywords

Related Articles

Intelligent Public Transport System with Information Forensics and Security

 To increase the usability of a public transport system it needs to go under revolutionary changes in its operating procedure. It is an attempt to make this possible using recent computer technology, mobile computin...

Secure Cloud Storage

As an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company’s high-performance computing and storage infrastructure...

Implementation of Session- State -Service -A Framework for P2P Network

 Peer-to-Peer systems have become, in a short period of time, one of the fastest growing and most popular applications. The decentralized and distributed nature of P2P systems leads to living aside the client-...

Study of Information Hiding Techniques and their Counterattacks: A Review Article

With the rapid development of the internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, unauthorized access of the information over the network become greater issues now a d...

Fuzzy Clustering as an Intrusion Detection Technique

Intrusion detection and clustering have always been hot topics in the field of machine learning. Clustering as an intrusion detection technique has long before proved to be beneficial. But as the methods and types of att...

Download PDF file
  • EP ID EP86005
  • DOI -
  • Views 126
  • Downloads 0

How To Cite

Anuradha Bhatia, Shefali Patil (2011).  . International Journal of Computer Science and Communication Networks, 1(2), 111-116. https://europub.co.uk/articles/-A-86005