SigFree: A Signature-free Buffer Overflow Attack Blocker
Abstract: This project propose SigFree, a realtime, signature-free, out-ofthe-box, application layer blocker for preventing buffer…
secure and dynamic multi keyword ranked search over encrypted data
ABSTRACT Due to the increasing popularity of cloud computing, more and more data owners are…
Bandwidth Recycling in IEEE 802.16 Networks
Bandwidth Recycling in IEEE 802.16 Networks Abstract IEEE 802.16 standard was designed to support the…
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
ABSTRACT: Due to limited computational power and energy resources, aggregation of data from multiple sensor…
Conditional Shortest Path Routing in Delay Tolerant Networks(2010)
ABSTRACT: Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore…
WHAT IS SUBMERSIBLE PUMP AND HOW IT WORKS?
What is Submersible Pump and How it Works? A submersible pump (or electric submersible pump…
MECHANICAL TECHNICAL INTERVIEW QUESTIONS : THERMODYNAMICS
Thermodynamics most frequently asked question at the viva or Interview: [caption id="attachment_52411" align="alignnone" width="470"]…
TYPES OF EXTRUSION AND ADVANTAGES OF EXTRUSION
INTRODUCTION Â TO EXTRUSION TECHNOLOGY Extrusion is a process in which the metal is subjected to…
Catching Packet Droppers and Modifiers in Wireless Sensor Networks(2012)
Abstract Packet dropping and modification are common attacks that can be launched by an adversary…