Showing 145–148 of 148 results

  • Virtual Servers Co-Migration for Mobile Accesses: Online vs. Off-line

    Virtual Servers Co-Migration for Mobile Accesses: Online vs. Off-line

    0 out of 5
    4,500

    Virtual Servers Co-Migration for Mobile Accesses: Online vs. Off-line Abstract?Virtual Servers Co-Migration for Mobile Accesses Online vs. Off-line .Firstly we study the problem of co-migrating a set of service replicas residing on one or more redundant virtual servers in clouds in order to satisfy a sequence of mobile batch-request emands in a cost effective way….

  • Vulnerable Concealed Map-Reading Inside Mobile Ad Hoc Networks

    Vulnerable Concealed Map-Reading Inside Mobile Ad Hoc Networks

    0 out of 5
    4,500

    Vulnerable Concealed Map-Reading Inside Mobile Ad Hoc Networks Abstract– In the first place , number of techniques has been used based on packet encryption to protect the dat forwarding in MANETs, Still MANETs are attacked by hackers. To get over these attack a new technique called statistical traffic pattern discovery system can be used. It…

  • Vulnerable Concealed Map-Reading Inside Mobile Ad Hoc Networks

    Vulnerable Concealed Map-Reading Inside Mobile Ad Hoc Networks

    0 out of 5
    4,500

    Vulnerable Concealed Map-Reading Inside Mobile Ad Hoc Networks Abstract-Number of techniques has been used based on packet encryption to protect the data forwarding in MANETs, Still MANETs are attacked by hackers. To get over these attack a new technique called statistical traffic pattern discovery system can be used. It is an approach to discover entire…

  • Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

    Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

    0 out of 5
    4,500

    Wormhole Attack Detection Algorithms in Wireless Network Coding Systems Abstract?Wormhole Attack Detection Algorithms in Wireless Network Coding Systems. Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that…

End of content

End of content