Implementation of ICMPPSO Algorithm to Minimize PVTHD of Three-Level Inverter Journal title: International Research Journal of Applied and Basic Sciences Authors: HadiVadizadeh*| Department of Electrical Engineering, West Tehran Branch, Islamic Azad University, T... Subject(s): Public Health and Community Medicine
Access Control List Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Nahush Kulkarni, Harsh Kothari, Hardik Ashar, Sanchit Patil Subject(s): Engineering, Applied Linguistics
Detection and Classification of Distributed Denial of Service (DDoS) Attack Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Rida Anwar, Shruti Gorasia Subject(s): Engineering, Applied Linguistics
Closing the Location of IP Spoofers Using Greedy Algorithm Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: S. Srithar, Deepthi C J, R Dinesh Kumar, S. Jeevarekha, Sneha Varghese Subject(s): Engineering, Applied Linguistics
Types of Routing Protocols to maintain Message Security Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Ramanpreet Kaur, Cherry Goyal, Harjeet Kaur , Mandeep Singh Subject(s): Engineering, Applied Linguistics
Assessment of High and Low Rate Protocol-based Attacks on Ethernet Networks Journal title: International Journal of Advanced Computer Science & Applications Authors: Mina Malekzadeh, M.A. Beiruti, M.H. Abadi Subject(s):
Passive IP Traceback: Tracing spoofer IP and Blocking IP spoofer from Data access using Greedy Algorithm Journal title: International journal of Emerging Trends in Science and Technology Authors: Mrs KarpagaPriya. P Subject(s):
Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory Journal title: Annals of Emerging Technologies in Computing Authors: Faisal Waheed, Maaruf Ali Subject(s):
A Study of Two Different Attacks to IPv6 Network Journal title: IOSR Journals (IOSR Journal of Computer Engineering) Authors: Ayman M. A. Shabour, M.A. Elshaikh Subject(s):
Hardening CISCO Devices based on Cryptography and Security Protocols - Part II: Implementation and Evaluation Journal title: Annals of Emerging Technologies in Computing Authors: Faisal Waheed, Maaruf Ali Subject(s):
Аналіз скритності та стійкості до шуму в каналах зв’язку методів мережної стеганографії Journal title: Проблеми телекомунікацій Authors: Анна Олегівна Щербак, Андрій Анатолійович Астраханцев, Олег Володимирович Щербак, Галина Євгеніївна... Subject(s):
Analysis of privacy and stability to interference in the communication channel of network steganography methods Journal title: Проблеми телекомунікацій Authors: Анна Олегівна Щербак, Андрій Анатолійович Астраханцев, Олег Володимирович Щербак, Галина Євгеніївна... Subject(s):
Анализ скрытности и устойчивости к помехам в канале связи методов сетевой стеганографии Journal title: Проблеми телекомунікацій Authors: Анна Олегівна Щербак, Андрій Анатолійович Астраханцев, Олег Володимирович Щербак, Галина Євгеніївна... Subject(s):