Monday, September 5, 2011

 IEEE Java Project Titles in Dependable and Secure Computing


IEEE JAVA PROJECT TITLES 
DEPENDABLE AND SECURE COMPUTING PROJECT TITLES 2011
  • Anomaly Detection in Network Traffic Based on Statistical Inference and alpha-Stable Modeling 
  • ELMO: Energy Aware Local Monitoring in Sensor Networks
  • Efficient Fault Detection and Diagnosis in Complex Software Systems with Information-Theoretic Monitoring 
  • Privacy-Preserving Updates to Anonymous and Confidential Databases
  • Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks 
  • Low-Energy Symmetric Key Distribution in Wireless Sensor Networks 
  • Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
  • Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
  • Online Intrusion Alert Aggregation with Generative Data Stream Modeling
  • A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
  • Chip Self-Organization and Fault-Tolerance in Massively Defective Multicore Arrays
  • Comparative Evaluation of Spoofing Defense
  • Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
  • Modeling and Detection of Camou?aging Worm
  • Nymble Blocking Misbehaving Users in Anonymizing Networks
  • RITAS Services for Randomized Intrusion Tolerance
  • SAT A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
  • A Fault-Tolerant Token based Atomic Broadcast Algorithm
  • A Tamper-Resistant Programming Language System
  • Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime
  • The Geometric Efficient Matching Algorithm for Firewalls


DEPENDABLE AND SECURE COMPUTING PROJECT TITLES 2010, 2009...
  • Layered Approach Using Conditional Random Fields for Intrusion Detection, 2010
  • SiGFree Asignature based free buffer overflow attack blocker, 2010
  • Secure Data Objects Replication in Data Grid, 2010
  • Evaluating the Vulnerability of Network Traffic Using Joint, 2009
  • Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing, 2009
  • Security Analysis of the SASI Protocol, 2009
  • Controlling IP Spoofing Through Inter Domain Packet Filters, 2008
  • A Precise Termination Condition of the Probabilistic Packet Marking Algorithm, 2008
  • An Adaptive Programming Model for Fault Tolerant Distributed Computing, 2007
  • Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes, 2007

No comments:

Post a Comment