Journal of Network Security

Open Journal Systems
Journal Help
Subscription Login to verify subscription
User
Notifications
  • View
  • Subscribe
Journal Content

Browse
  • By Issue
  • By Author
  • By Title
  • Other Journals
Font Size

Information
  • For Readers
  • For Authors
  • For Librarians
Current Issue Atom logo
RSS2 logo
RSS1 logo
  • Home
  • About
  • Login
  • Register
  • Search
  • Current
  • Archives
  • Announcements
  • Author Guidelines
  • Referencing Pattern
  • Sample Research Paper
  • Sample Review Paper
  • Publication Management Team
  • STM Home Page
  • Register
  • Publication Ethics & Malpractice Statement
  • Editorial Team
Home > Archives > Vol 5, No 3 (2017)

Vol 5, No 3 (2017)

Open Access Open Access  Restricted Access Subscription Access

Table of Contents

Research Articles

CBIR using Feature Extraction approaches and Application: A survey
Shailja Rawat, Rajendra Kumar
PDF Restricted Access
9-16
Data Mining Methods for Terrorist Activity
Ezhilarasi R, P. Arumugam
PDF Restricted Access
17-22
Public Services through Cloud Computing
Priyanka Sengar, Nishit Gupta
PDF Restricted Access
23-25

Review Articles

A Review on AODV Protocol and Various Attacks in Mobile Ad Hoc Network
Saurabh Garg, Krishna Kumar Joshi
PDF Restricted Access
1-8
Wireless Sensor Network: A Review
Bhavin Suthar, Deepti Singh
PDF Restricted Access
26-29


  • eISSN: 2395–6739
  • ISSN: 2321–8517