Journal of Network Security

Open Journal Systems
Journal Help
Subscription Login to verify subscription
User
Notifications
  • View
  • Subscribe
Journal Content

Browse
  • By Issue
  • By Author
  • By Title
  • Other Journals
Font Size

Information
  • For Readers
  • For Authors
  • For Librarians
Current Issue Atom logo
RSS2 logo
RSS1 logo
  • Home
  • About
  • Login
  • Register
  • Search
  • Current
  • Archives
  • Announcements
  • Author Guidelines
  • Referencing Pattern
  • Sample Research Paper
  • Sample Review Paper
  • Publication Management Team
  • STM Home Page
  • Register
  • Publication Ethics & Malpractice Statement
  • Editorial Team
Home > Archives > Vol 6, No 1 (2018)

Vol 6, No 1 (2018)

Open Access Open Access  Restricted Access Subscription Access

Table of Contents

Research Articles

MODIFIED KEY GENERATION OF BLOWFISH ALGORITHM FOR TEXTUAL AND IMAGE DATA
Aastha Sharma
PDF Restricted Access
27-30
Performance Analysis of Flying Ad-Hoc Network Over cloud with Variation of Protocal with Variation of Antenna of Flying Unmanned Air Vehicle (UAVs
Akanksha Pandey, Laxmi Shrivastav
PDF Restricted Access
8-14
CHMOD LEACH: INNOVATIVE TECHNIQUE FOR CLUSTER HEAD SELECTION
Abhilash Shokeen
PDF Restricted Access
20-26

Review Articles

HIDDEN MARKOV MODEL FOR DETECTION AND PREVENTION OF SQL INJECTION ATTACKS
SINCY ABRAHAM, GHILBY VARGESHE JAISON
PDF Restricted Access
15-19
A Survey on Congestion Control in Mobile in Mobile Ad Hoc Network
Pooja Tripathi, Krishna Kumar Joshi
PDF Restricted Access
1-7


  • eISSN: 2395–6739
  • ISSN: 2321–8517