International Journal of Computer Network and Information Security(IJCNIS)
ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
DOI: 10.5815/ijcnis
Published By: MECS Press
IJCNIS Vol. 6, No. 11, Oct. 2014
Cover page and Table of Contents: PDF (size: 113KB)
Contents
REGULAR PAPERS
-
Cellular Automata based Encrypted ECG-hash Code Generation: An Application in Inter human Biometric Authentication System
Subrata Nandi, Satyabrata Roy, Jayanti Dansana, Wahiba Ben Abdessalem Karaa, Ruben Ray, Shatadru Roy Chowdhury, Sayan Chakraborty, Nilanjan Dey
Abstract | References | Full Paper: PDF (Size:717KB), PP.1-12, Pub. Date: 2014-10-08
DOI: 10.5815/ijcnis.2014.11.01
-
An Improved Trusted Greedy Perimeter Stateless Routing for Wireless Sensor Networks
P. Raghu Vamsi, Krishna Kant
Abstract | References | Full Paper: PDF (Size:397KB), PP.13-19, Pub. Date: 2014-10-08
DOI: 10.5815/ijcnis.2014.11.02
-
Implementation of Risk Management with SCRUM to Achieve CMMI Requirements
Eman Talal Alharbi, M. Rizwan Jameel Qureshi
Abstract | References | Full Paper: PDF (Size:441KB), PP.20-25, Pub. Date: 2014-10-08
DOI: 10.5815/ijcnis.2014.11.03
-
Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network
Bhavana Butani, Piyush Kumar Shukla, Sanjay Silakari
Abstract | References | Full Paper: PDF (Size:294KB), PP.26-34, Pub. Date: 2014-10-08
DOI: 10.5815/ijcnis.2014.11.04
-
HTTP Packet Inspection Policy for Improvising Internal Network Security
Kuldeep Tomar, S.S. Tyagi
Abstract | References | Full Paper: PDF (Size:518KB), PP.35-42, Pub. Date: 2014-10-08
DOI: 10.5815/ijcnis.2014.11.05
-
VoIP Performance Analysis over IPv4 and IPv6
Monjur Ahmed, Alan T Litchfield, Shakil Ahmed, Adnan Mahmood, Md. Emran Hossain Meazi
Abstract | References | Full Paper: PDF (Size:240KB), PP.43-48, Pub. Date: 2014-10-08
DOI: 10.5815/ijcnis.2014.11.06
-
OpenFlow Technology: A Journey of Simulation Tools
Rakesh k. Jha, Pooja Kharga, Idris Z. Bholebawa, Sangeet Satyarthi , Anuradha, Shashi Kumari
Abstract | References | Full Paper: PDF (Size:573KB), PP.49-55, Pub. Date: 2014-10-08
DOI: 10.5815/ijcnis.2014.11.07
-
Detection Block Model for SQL Injection Attacks
Diksha G. Kumar, Madhumita Chatterjee
Abstract | References | Full Paper: PDF (Size:448KB), PP.56-63, Pub. Date: 2014-10-08
DOI: 10.5815/ijcnis.2014.11.08