IEEE JAVA PROJECT TITLES
DEPENDABLE AND SECURE COMPUTING PROJECT TITLES 2011
- Anomaly Detection in Network Traffic Based on Statistical Inference and alpha-Stable Modeling
- ELMO: Energy Aware Local Monitoring in Sensor Networks
- Efficient Fault Detection and Diagnosis in Complex Software Systems with Information-Theoretic Monitoring
- Privacy-Preserving Updates to Anonymous and Confidential Databases
- Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
- Low-Energy Symmetric Key Distribution in Wireless Sensor Networks
- Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
- Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
- Online Intrusion Alert Aggregation with Generative Data Stream Modeling
- A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
- Chip Self-Organization and Fault-Tolerance in Massively Defective Multicore Arrays
- Comparative Evaluation of Spoofing Defense
- Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
- Modeling and Detection of Camou?aging Worm
- Nymble Blocking Misbehaving Users in Anonymizing Networks
- RITAS Services for Randomized Intrusion Tolerance
- SAT A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
- A Fault-Tolerant Token based Atomic Broadcast Algorithm
- A Tamper-Resistant Programming Language System
- Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime
- The Geometric Efficient Matching Algorithm for Firewalls
DEPENDABLE AND SECURE COMPUTING PROJECT TITLES 2010, 2009...
- Layered Approach Using Conditional Random Fields for Intrusion Detection, 2010
- SiGFree Asignature based free buffer overflow attack blocker, 2010
- Secure Data Objects Replication in Data Grid, 2010
- Evaluating the Vulnerability of Network Traffic Using Joint, 2009
- Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing, 2009
- Security Analysis of the SASI Protocol, 2009
- Controlling IP Spoofing Through Inter Domain Packet Filters, 2008
- A Precise Termination Condition of the Probabilistic Packet Marking Algorithm, 2008
- An Adaptive Programming Model for Fault Tolerant Distributed Computing, 2007
- Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes, 2007
No comments:
Post a Comment