You are on page 1of 2

Network Security S.

no
1.

Title
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks Nymble: Blocking Misbehaving Users in Anonymizing Networks A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree Online Intrusion Alert Aggregation with Generative Data Stream Modeling.

Domain
Secure Computing (Transaction) Secure Computing (Transaction) Secure Computing (Transaction) Secure Computing (Transaction) Secure Computing (Transaction) Secure Computing (Conference) Image Processing & Secure computing (Transaction) Secure Computing (Conference) Secure Computing (Conference) Secure Computing (Conference) Image Processing & Secure computing (Transaction) Image Processing (Transaction) Image Processing & Secure computing (Transaction) Secure Computing (Conference) Secure Computing (Conference)

Year
2011

2.

2011

3.

2011

2011

4.

Anomaly Detection in Network Traffic Based on Statistical Inference and Stable Modeling Self-Organizing Feature Maps for User-to-Root and Remoteto Local Network Intrusion Detection on the KDD Cup 1999 Dataset

2011

2011

5.

Embedded Extended Visual Cryptography Schemes

2011

Architecting a Secure Enterprise Data Sharing. 6. Construction P2P firewall HTTP-Botnet defense mechanism A Hierarchical Hybrid Structure for Botnet Control and Command. Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective Embedding An Optimal Data Hiding Scheme With Tree-Based Parity Check Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error 8. A Competitive Study of Cryptography Techniques over Block Cipher. Analysis on Credit Card Fraud Detection Methods.

2011 2011 2011 2011

7.

2011

2011

2011

9.

2011

10.

Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks Intrusion detection An Energy efficient approach

Secure Computing (Transaction) Secure Computing (Conference) Image Processing & Secure Computing (Transaction) Secure Computing (Transaction) Secure Computing (Transaction)

2011

11.

2011

12.

Lossy Compression and Iterative Reconstruction for Encrypted Image Nymble- Blocking Misbehaving Users in Anonymizing Networks Modeling and Detection of Camouflaging Worm

2011

13.

2011

14.

2011

You might also like