Tuesday 30 July 2013

latest ieee 2012-02013 project - networking

www.abdenttechnology.com                        09787307830    

Networking & Network Security
1
Secure Data Aggregation in Wireless Sensor Networks
2
Risk-Aware Mitigation for MANET Routing Attacks
3
Packet-Hiding Methods for Preventing Selective Jamming Attacks
4
Improve Efficiency and Reliability in Single hop WSNs with Transmit-Only Nodes
5
ESM: Efficient and Scalable Data Center Multicast Routing
6
An Efficient Method for Attack RSA Scheme
7
Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks
Using Sequential Hypothesis Testing
8
Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports
9
Detecting Spam Zombies by Monitoring Outgoing Message
10
Dynamic Security Risk Management Using Bayesian Attack Graphs
11
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme
with Enhanced Revocation Capabilities
12
Secured Trust: A Dynamic Trust Computation Model for Secured Communication in Multi agent Systems
13
Abnormally Malicious Autonomous Systems and Their Internet Connectivity
14
Zone Trust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing
15
Privacy Vulnerability of Published Anonymous Mobility Traces
16
A Cross-Domain Privacy-Preserving Protocol for Cooperative Firewall Optimization
17
On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability
18
Defenses against large scale online password guessing attacks by using
Persuasive click points
19
Security schemes for wireless sensor networks  With mobile sink
20
Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
21
Network intrusion detection System on wireless mobile adhoc Networks
22
DSS: Distributed SINR-Based Scheduling Algorithm for Multihop Wireless Networks
23
Routing Protocol Based on Grover’s Searching Algorithm for Mobile Ad-hoc Networks
24
A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization
25
A Privacy Leakage Upper Bound Constraint-Based Approach for
Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
26
Evaluating Implementation Strategies for Location-Based Multicast Addressing
27
Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
28
Topological Conditions for In-Network Stabilization of Dynamical Systems
29
Lightweight Sybil Attack Detection in MANETs
30
DSS: Distributed SINR-Based Scheduling Algorithm for Multihop Wireless Networks
31
Randomized Information Dissemination in Dynamic Environments
32
Scalable Routing Modeling for Wireless Ad Hoc Networks by Using Polychromatic Sets
33
Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
34
Failure-Aware Cascaded Suppression
in Wireless Sensor Networks
35
Diffusion Dynamics of Network Technologies With
Bounded Rational Users: Aspiration-Based Learning
36
A Rank Correlation Based Detection against
Distributed Reflection DoS Attacks

                                           




No comments:

Post a Comment