IJPTT - Volume 3 Issue 1 2013
S.No
|
Title/Author Name
|
Paper ID
|
1
|
Security Issues and Sybil Attack in Wireless Sensor Networks
-Pooja , Manisha, Dr. Yudhvir Singh
|
IJPTT-V3I1P402
|
2
|
Efficient Patterns Using Hidden Web Trajectory Concept
-K.Kavitha, Dr. E.Ramaraj
|
IJPTT-V3I1P403
|
3
|
A Review: Comparative Analysis Of Routing Protocols in Wireless Sensor Network
-Prabhdeep Singh, Navdeep Kaur, Ravneet Kaur
|
IJPTT-V3I1P406
|
4
|
Improving Accuracy in Decision Making for Detecting Intruders
-Monika Sehgal, Nitin Umesh
|
IJPTT-V3I1P407 |
5
|
Comparative Analysis Of Leach And Its Descendant Protocols In Wireless Sensor Network
-Ravneet Kaur, Deepika Sharma, Navdeep Kaur
|
IJPTT-V3I1P410 |
6
|
Classification of Hierarchical Routing Protocols in Wireless Sensor Network: A Survey
-Navdeep Kaur, Deepika Sharma, Prabhdeep Singh
|
IJPTT-V3I1P411 |
7
|
Secure Efficient Geographic Multicast Protocol For Mobile AdHoc Networks
-Jyoti M.Karbhal , Kishor B. Sadafale
|
IJPTT-V3I1P412 |
8
|
Anomaly Intrusion Detection System using Random Forests and k-Nearest Neighbor
-Phyu Thi Htun, Kyaw Thet Khaing
|
IJPTT-V3I1P413 |