Journal of Network Security

Open Journal Systems
Journal Help
Subscription Login to verify subscription
User
Notifications
  • View
  • Subscribe
Journal Content

Browse
  • By Issue
  • By Author
  • By Title
  • Other Journals
Font Size

Information
  • For Readers
  • For Authors
  • For Librarians
Current Issue Atom logo
RSS2 logo
RSS1 logo
  • Home
  • About
  • Login
  • Register
  • Search
  • Current
  • Archives
  • Announcements
  • Author Guidelines
  • Referencing Pattern
  • Sample Research Paper
  • Sample Review Paper
  • Publication Management Team
  • STM Home Page
  • Register
  • Publication Ethics & Malpractice Statement
  • Editorial Team
Home > Archives > Vol 6, No 3 (2018)

Vol 6, No 3 (2018)

Open Access Open Access  Restricted Access Subscription Access

Table of Contents

Research Articles

Entropy of Network Analysis and Cluster Detection Using Markov Theory
N Siranjeevi, P. Priya, S. Thangavelu
PDF Restricted Access
1-4
OCL Fault Injection-Based Detection & Prevention of LDAP Query Injection Vulnerabilities
Anjumol T Many, Ushus Maria Joseph
PDF Restricted Access
5-8
Energy conserving Detection Model for cooperative region Attacks in Wireless detector Networks
S. Gayathri
PDF Restricted Access
18-22
Blockchain for Cryptocurrencies – A Literature Survey
Heenal Sapovadia, Adarsh Sutariya
PDF Restricted Access
23-27
A Study on Energy Efficient Coverage Aware Clustering Protocols in Wireless Sensor Networks
Amandeep Kaur Sohal, A. K. Sharma, N. Sood
PDF Restricted Access
9-17


  • eISSN: 2395–6739
  • ISSN: 2321–8517