You are on page 1of 4

Sheet1

S.NO IEEE 2009 Project Titles Language


1 Route Stability in MANETs under the Random Direction Mobility Model 2009/.Net
2 On the Security of Route Discovery in MANETs 2009/.Net
3 Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading in Cognitive
Radio Networks 2009/.Net
4 RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc
Networks 2009/.Net
5 A Gen2-Based RFID Authentication Protocol for Security and Privacy for
Security 2009/.Net
6 Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks 2009/.Net
7 On the Planning of Wireless Sensor Networks:Energy-Efficient Clustering under
the Joint Routing and Coverage Constraint 2009/.Net
8 Information Content-Based Sensor Selection and Transmission Power
Adjustment for Collaborative Target Tracking 2009/.Net
9 Energy Maps for Mobile Wireless Networks Coherence Time versus Spreading
Period 2009/.Net
10 An Integrated Approach to Sensor Role Selection 2009/.Net
11 A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks 2009/.Net
12 Biased Random Walks in Uniform Wireless Networks 2009/.Net
13 Secure and Policy-Compliant Source Routing 2009/.Net
14 Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel
Communications 2009/.Net
15 Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks 2009/.Net
16 Resource Allocation in OFDMA Wireless Communications Systems Supporting
Multimedia Services 2009/.Net
17 Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair
Resolutions for RFID Tag Identification 2009/.Net
18 Explicit Load Balancing Technique for NGEO Satellite IP Networks With On-
Board Processing Capabilities 2009/.Net
19 Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows 2009/.Net
20 Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor
Networks 2009/.Net
21 Cell Breathing Techniques for Load Balancing in Wireless LANs 2009/.Net

IEEE 2009 Project Titles in JAVA


Mitigation of Control Channel Jamming under Node Capture Attacks
1 2009/Java
Monitoring the Application-Layer DDoS Attacks for Popular Websites
2 2009/Java
Multiple Routing Configurations for Fast IP Network Recovery
3 2009/Java
The Effectiveness of Checksums for Embedded Control Networks
4 2009/Java
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing
5 Analysis 2009/.Java
Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor
6 Networks 2009/.Java
A Faithful Distributed Mechanism for Sharing the Cost of Multicast
7 Transmissions 2009/.Java
Multipath Dissemination in Regular Mesh Topologies
8 2009/.Java
Detecting Malicious Packet Losses
9 2009/.Java

Page 1
Sheet1

Dynamic Routing with Security Considerations


10 2009/.Java
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing
11 Analysis 2009/.Java
Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments
12 2009/.Java
Security Analysis of the SASI Protocol
13 2009/.Java
Spatio-Temporal Network Anomaly Detection by
14 2009/.Java
Capturing Router Congestion and Delay
15 2009/.Java
Using Sociology for Personal Mobility
16 2009/.Java
Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows
17 2009/.Java
Scalable Routing in Cyclic Mobile Networks
18 2009/.Java
Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
19 2009/.Java

Page 2
Sheet1
Technology
MOBILE COMPUTING
MOBILE COMPUTING,

MOBILE COMPUTING,

MOBILE COMPUTING,

MOBILE COMPUTING,
MOBILE COMPUTING,

MOBILE COMPUTING,

MOBILE COMPUTING,

MOBILE COMPUTING,
MOBILE COMPUTING,
MOBILE COMPUTING,
MOBILE COMPUTING,
ACM TRANSACTIONS ON NETWORKING

ACM TRANSACTIONS ON NETWORKING


ACM TRANSACTIONS ON NETWORKING

ACM TRANSACTIONS ON NETWORKING

ACM TRANSACTIONS ON NETWORKING

ACM TRANSACTIONS ON NETWORKING


TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,

TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,


TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,

MOBILE COMPUTING,

TRANSACTIONS ON NETWORKING,

TRANSACTIONS ON NETWORKING,

TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,

EVALUATING THE VULNERABILITY OF NETWORK TRAFFIC USING JOINT SECURITY AND ROUTING ANALYSI

TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,

TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,

TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,

TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,

Page 3
Sheet1

TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,

EVALUATING THE VULNERABILITY OF NETWORK TRAFFIC USING JOINT SECURITY AND ROUTING ANALYSIS

TRANSACTIONS ON MOBILE COMPUTING,

TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING

TRANSACTIONS ON NETWORKING

TRANSACTIONS ON NETWORKING,

TRANSACTIONS ON NETWORKING

TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS

TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS

TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING

Page 4

You might also like