Journal of Network Security and Data Mining (e-ISSN: 3048-5169)

Open Journal Systems
Journal Help
Subscription Login to verify subscription
User
Notifications
  • View
  • Subscribe
Journal Content

Browse
  • By Issue
  • By Author
  • By Title
  • Other Journals
  • Categories
Font Size

Information
  • For Readers
  • For Authors
  • For Librarians
  • Home
  • About
  • Login
  • Register
  • Categories
  • Search
  • Current
  • Archives
  • Contact Us
Home > Archives > Vol 1, No 2 (2018)

Vol 1, No 2 (2018)

Open Access Open Access  Restricted Access Subscription Access

Table of Contents

Articles

To Perform Development of Collision Alleviating DCF Protocol with Efficient Back off Algorithm for Wireless AD HOC Networks
K. Selvakumar
PDF Restricted Access
1-8
Efficient Method to Secure the Information Contents of an Image – A Parallel Approach
Jalesh Kumar
PDF Restricted Access
9-17
Reactive Monitoring Adaptation for Dynamic Dataflow on Variable Infrastructure
Piyush Kumar
PDF Restricted Access
18-25
Optimal Utilization of Dynamic Hop-Aware Buffer Management Scheme for Manet
R. Manikandan
PDF Restricted Access
26-33
Deployement of Data Analytics in Defending Web Attacks
K. Thirumoorthy
PDF Restricted Access
34-37


ISSN: 3048-5169