TDG Scholar TDGScholar Committed to research! Version 1.7

Bibliography

| Report | Share
A total of 73 records were found in 0.312 seconds
Research on Heteregeneous Data for Recognizing Threat
ICSOFT (1), 222-225, 2011
Provision of Quality of Service Based on RSVP on Mobile IPv6 networks
ICWN, 209-214, 2010
A Review on Blackhole Attack in Mobile Ad Hoc Networks
ICWN, 116-121, 2010
Routing Attacks in Mobile Ad Hoc Network
ICWN, 552-558, 2010
Fault-Tolerant Meta-Scheduler for Price-based Job Scheduling by Applying Multi-Reservation Method
JDIM, 8(3), 2010
To Identify Suspicious Activity in Anomaly Detection based on Soft Computing
Artificial Intelligence and Applications, 359-364, 2006
Enforcing Multilevel Security Policies for Network Firewall
CITA, 244-246, 2003