Showing posts with label  IEEE Java Project Titles in Dependable and Secure Computing. Show all posts
Showing posts with label  IEEE Java Project Titles in Dependable and Secure Computing. Show all posts

Monday, September 5, 2011

 IEEE Java Project Titles in Dependable and Secure Computing


IEEE JAVA PROJECT TITLES 
DEPENDABLE AND SECURE COMPUTING PROJECT TITLES 2011
  • Anomaly Detection in Network Traffic Based on Statistical Inference and alpha-Stable Modeling 
  • ELMO: Energy Aware Local Monitoring in Sensor Networks
  • Efficient Fault Detection and Diagnosis in Complex Software Systems with Information-Theoretic Monitoring 
  • Privacy-Preserving Updates to Anonymous and Confidential Databases
  • Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks 
  • Low-Energy Symmetric Key Distribution in Wireless Sensor Networks 
  • Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
  • Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
  • Online Intrusion Alert Aggregation with Generative Data Stream Modeling
  • A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
  • Chip Self-Organization and Fault-Tolerance in Massively Defective Multicore Arrays
  • Comparative Evaluation of Spoofing Defense
  • Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
  • Modeling and Detection of Camou?aging Worm
  • Nymble Blocking Misbehaving Users in Anonymizing Networks
  • RITAS Services for Randomized Intrusion Tolerance
  • SAT A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
  • A Fault-Tolerant Token based Atomic Broadcast Algorithm
  • A Tamper-Resistant Programming Language System
  • Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime
  • The Geometric Efficient Matching Algorithm for Firewalls


DEPENDABLE AND SECURE COMPUTING PROJECT TITLES 2010, 2009...
  • Layered Approach Using Conditional Random Fields for Intrusion Detection, 2010
  • SiGFree Asignature based free buffer overflow attack blocker, 2010
  • Secure Data Objects Replication in Data Grid, 2010
  • Evaluating the Vulnerability of Network Traffic Using Joint, 2009
  • Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing, 2009
  • Security Analysis of the SASI Protocol, 2009
  • Controlling IP Spoofing Through Inter Domain Packet Filters, 2008
  • A Precise Termination Condition of the Probabilistic Packet Marking Algorithm, 2008
  • An Adaptive Programming Model for Fault Tolerant Distributed Computing, 2007
  • Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes, 2007