Skip to main content
... like attacks like Smurf and TCP-SYN uses Rahul Chowdary Bobba(B.Tech), Raghunath. ... San Diego, Jan 2004. [9] HR Nagesh, Chandra Sekaran K. Department of Computer Engineering, PA College of Engineering, Mangalore, Karnataka, INDIA... more
    • by 
    •   11  
      Computer ScienceComputer NetworksAuthenticationDDoS
Will 5G primary access technology keeping IoT in mind or will it act as another form of Backhaul for IoT Gateways?
    • by 
    •   8  
      TechnologyWireless CommunicationsMobile TechnologyMobile Communication
The security of the existing ambient intelligence model presents a particular challenge because this architecture combines different networks, being prone to vulnerabilities and attacks. Specific techniques are required to be studied in... more
    • by 
    •   13  
      Grid ComputingComputational IntelligenceComputer NetworksPervasive Computing
The future networks will provide a new digital infrastructure to automate everything. The total number of Internet subscribers will continue to grow and Internet traffic will increase tremendously. The new applications can easily overload... more
    • by 
    •   3  
      Future NetworksAutonomous SystemsInternetworking
    • by 
    •   2  
      Future NetworksHome networking
An increasingly wireless world will mean that devices with multiple network interfaces will soon become commonplace. Users will expect to be always connected from anywhere and at any time as connections will be switched to available... more
    • by 
    •   7  
      Future Internet ArchitectureNext Generation NetworksNext Generation Internet ResearchFuture Networks
Multi hop Networking
Air Ground Networking
And future…
    • by 
    •   6  
      Vehicular Ad Hoc NetworksWireless Mesh NetworksFuture NetworksMultihop Networks
... like attacks like Smurf and TCP-SYN uses Rahul Chowdary Bobba(B.Tech), Raghunath. ... San Diego, Jan 2004. [9] HR Nagesh, Chandra Sekaran K. Department of Computer Engineering, PA College of Engineering, Mangalore, Karnataka, INDIA... more
    • by 
    •   11  
      Computer ScienceComputer NetworksAuthenticationDDoS
Wireless mesh networks (WMNs) have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organized, self-configured and self-healed, with the nodes in the... more
    • by 
    •   11  
      Routing protocolsPerformance AnalysisAd Hoc NetworksFuture Networks
Overview of Internet of things
    • by 
    •   7  
      Wireless CommunicationsMobile TechnologyFuture NetworksInternet of Things (IoT)
International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all... more
    • by  and +5
    •   18  
      Antennas & Radio Wave PropagationVehicular-To-Vehicular (V2V) Communication EngineeringChannel CodingResource Allocation
This book provides holistic coverage of the Internet of things (IoT) model, which includes its concepts and enabling technologies as well as some advanced topics. In addition, the book includes chapters on some popular areas that... more
    • by 
    •   7  
      Computer NetworksWireless Sensor NetworksCloud ComputingFuture Networks
The security of the existing ambient intelligence model presents a particular challenge because this architecture combines different networks, being prone to vulnerabilities and attacks. Specific techniques are required to be studied in... more
    • by 
    •   13  
      Grid ComputingComputational IntelligenceComputer NetworksPervasive Computing
In this paper we overview the different types of DDoS attacks, and their defense mechanism proposed till now, and propose a new approach. In this paper we propose a simple-to-integrate DDoS destination based defense method, which aims at... more
    • by 
    •   11  
      Computer ScienceComputer NetworksAuthenticationDDoS
... like attacks like Smurf and TCP-SYN uses Rahul Chowdary Bobba(B.Tech), Raghunath. ... San Diego, Jan 2004. [9] HR Nagesh, Chandra Sekaran K. Department of Computer Engineering, PA College of Engineering, Mangalore, Karnataka, INDIA... more
    • by 
    •   11  
      Computer ScienceComputer NetworksAuthenticationDDoS
... like attacks like Smurf and TCP-SYN uses Rahul Chowdary Bobba(B.Tech), Raghunath. ... San Diego, Jan 2004. [9] HR Nagesh, Chandra Sekaran K. Department of Computer Engineering, PA College of Engineering, Mangalore, Karnataka, INDIA... more
    • by 
    •   11  
      Computer ScienceComputer NetworksAuthenticationDDoS
The growing usage of cyber resources like forums, chat groups, browsing, demands the modeling of a framework that may use an individual's personality profile for simulating the user's personality in the cyberspace, Acting as a... more
    • by 
    •   13  
      PsychologyCognitive ScienceComputer ScienceSocial Interaction
The security of the existing ambient intelligence model presents a particular challenge because this architecture combines different networks, being prone to vulnerabilities and attacks. Specific techniques are required to be studied in... more
    • by  and +1
    •   13  
      Grid ComputingComputational IntelligenceComputer NetworksPervasive Computing