An Approach to Identify Node Clones in Wireless Sensor Networks Journal title: International Journal of Research in Computer and Communication Technology Authors: M Gowthami, Jessy Nirmal.A.G, P.S.K Patra Subject(s): Computer and Information Science, Telecommunications
Detection and Prevention Of Cooperative Black Hole Attack in a MANET Journal title: International Journal of Research in Computer and Communication Technology Authors: P. S. Hiremath, Anuradha T. Subject(s): Computer and Information Science, Telecommunications
An Enhanced Digital Campus Security System Using RFID, GPS, GSM Journal title: International Journal of Research in Computer and Communication Technology Authors: A.Ashok Kumar, P.Swapna Subject(s): Computer and Information Science, Telecommunications
Multichannel Contact Center Journal title: International Journal of Research in Computer and Communication Technology Authors: Priya K. Ithape, Dr. Prof. Anil S. Hiwale Subject(s): Computer and Information Science, Telecommunications
Design And Implementation of CMOS Adder Cell With Reduced Leakage Power Technique In 90nm Technology Journal title: International Journal of Research in Computer and Communication Technology Authors: J Manohar, Ch. Janardhan, K.V. Ramanaiah Subject(s): Computer and Information Science, Telecommunications
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks Journal title: International Journal of Research in Computer and Communication Technology Authors: Dantam.Ramesh, Dasari .Koteswara Rao Subject(s): Computer and Information Science, Telecommunications
Providing High Security for WSN’s Using Distributed Hash Table (DHT) Journal title: International Journal of Research in Computer and Communication Technology Authors: V Sarah Grace, Ramu Vikruthi Subject(s): Computer and Information Science, Telecommunications
Multichannel Contact Center Performance Analysis Journal title: International Journal of Research in Computer and Communication Technology Authors: Priya K. Ithape, Dr. Prof. Anil S. Hiwale Subject(s): Computer and Information Science, Telecommunications
Side-Channel Passive Attacks Implementation to Cryptographic Hardware Using FPGA Journal title: International Journal of Research in Computer and Communication Technology Authors: K.Durga Rajasekhar, O.Sudha Bharathi, K. Sirisha, R.Satish Kumar Subject(s): Computer and Information Science, Telecommunications
Detecting Network And Application Layer Attacks in Networks Journal title: International Journal of Research in Computer and Communication Technology Authors: N.V.V. Soujanya, G.Uma Mahesh Subject(s): Computer and Information Science, Telecommunications
Distributed Hash Table (DHT) Based Clone Detection In WSN’s Journal title: International Journal of Research in Computer and Communication Technology Authors: P.V. Siva Durga, U. Vinod Kumar Subject(s): Computer and Information Science, Telecommunications
Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE) Journal title: International Journal of Research in Computer and Communication Technology Authors: B Hemanth, U Vinod Kumar Subject(s): Computer and Information Science, Telecommunications
Cloud Computing Security With Two-Level Mechanism Journal title: International Journal of Research in Computer and Communication Technology Authors: H. V. Taiwade Subject(s): Computer and Information Science, Telecommunications
Secure Fog Computing: Providing Data Security Journal title: International Journal of Research in Computer and Communication Technology Authors: T.Rajesh Kanna, M. Nagaraju, Ch. Vijay Bhaskar Subject(s): Computer and Information Science, Telecommunications
Exemplary Instinctive Repression Of Worms Journal title: International Journal of Research in Computer and Communication Technology Authors: Manuri Parthasarathi, Jhansi Rani S Subject(s): Computer and Information Science, Telecommunications