
| A Co-operative Intrusion Detection System in Mobile Ad-Hoc Network S. S. Chopade and N. N. Mhala |

| A Modified Mechanism for Misbehavior Detection in Mobile Ad Hoc Networks S. Gopinath and J. Sugesh |

| A Quantitative Analysis to Solve the Performance Issues in IEEE 802.11 Multi Hop Ad Hoc Networks K. Saravanan and T. Ravichandran |

| A Secure Cookie Protocol S. Vinoth and S. Anandhi |

| A Secure Wireless Sensor Network using Key Management Scheme Vismay Jain |

| A Survey of Critical Security Issues and Network Management in Wireless Mesh Networks M. S. Joshi, A. A. Bakare, Vijaya V. Pangave and Vishakha C. Kulkarni |

| A Survey of Educational Learning Styles: Improving Quality in Higher Education using Knowledge Management K. Kalaiselvi and G. V. Uma |

| An Application based Secure Network Against Malicious Rogue System Threats Neha Mehra and Yogendra Kumar Jain |

| An Overview of Ad Hoc and Wi-Fi Networks Poonam Sawant |

| Analysing the Covert Channels in Adhoc Networks S. K. Indumathi |

| Analyzing and Comparing the Cryptographic Hash Algorithms T. Lalitha and R. Umarani |

| Broadcast Server Architecture for Wireless Sensor Networks P. Ashok, J. Kaviyarasan, A. R. Naveen Prasad and S. R. Seetha Ram |

| Capacity Measurement for VoIP Traffic in IEEE 802.11b Standard Geetu dhawan and Vijay Chaudhary |

| Comparative Study of Mobile Ad Hoc & Wireless Sensor Network G. Jeyakodi |

| Comparison of Various Ant Colony based Routing Algorithms Amit Chauhan and Nidhi Shah |

| Cyber Threat: A Challenge to the Society and Network Security Geeta Arwindekar and Nusrat Parveen |

| Design and Implementation of Secure Network System using Windows Environment Nitin and Yogendra Kumar Jain |

| Design of Policy based Packet Filtering Firewall V. Anantha Krishna and T. Aruldoss Albert Victoire |

| Energy Efficient, Power Aware Routing Algorithm Kanchan M. Miskin |

| Enhancing Voice- over- IP In An Audio Mixing Environment Anitha Amarnath and A. Anasuya Threse Innocent |

| Extended Adaptive TTL based Cache Invalidation Strategy In Manet Nakeeb Sabiyath Fatima and Peer Mohammed Sheik Abdul Khader |

| Hierarchical Semantic Search Over A P2P Network V. Jothirlatha, Divya Ria Thomas, T. S. Ashwin kumar and K. R. Bindu |

| Implementation of P2P Computing with PDSR Routing Protocol in Mobile Ad- Hoc Networks (P-MAN) L. Agilandeeswari and K. Muralibabu |

| Intelligent Grid Computing R. Nanda Kumar, P. Aravindhan and T. Dinesh |

| Kohonen Neural Network S. Naganandhini |

| Machine fault Diagnosis using a Multi Layer Perceptron Neural Network Mehrdad Nouri Khajavi and Ebrahim Babaei |

| Mechanism to Mitigate App-DDoS Attacks on Web Sites Manisha M. Patil and U. L. Kulkarni |

| Middleware Processing Approach for Wireless Sensor Networks R. Selvakumar, S. Mohamed Saleem and V. Vipul Jain |

| Mobile Computing with Sensors & Social Data for Enhanced In-store shopping for Individuals and Groups Sanjeev Kulkarni and Ravindra R. Mudholkar |

| Network Intrusion Detection in Wireless Sensor Networks A. Sheryas.B, B. Lakshaman Naika.R and C. Arun Kumar.G |

| Network System of Detection with Incomplete Audit Data Shailesh Gaikwad and Vijay Shah |

| Performance Evaluation of AODV and DSR Sharda Prasad Patel, Ashish Chaurasia and Shivendu Dubey |

| Performance Measures for Clustered Heterogeneous Wireless Sensor Network Anil Khandelwal and Ravi S. Mishra |

| Performance of Encryption Techniques for Real Time Video Streaming Shiva Priya Katta |

| Present Personal Sensor Network with Pros and Cons Sanjeev Kulkarni, A. M. Sankpal and R. R. Mudholkar |

| Protocols for Transport and Network Layer in WSNs: A Review Ankit Jain and A. K. Verma |

| RCCM: A Novel Method for Data Transmission in Vehicular Sensor Networks R. Pushpaak and L. Keerthana |

| Restricted Hoping Routing Protocol Kinjal Roy and Himadri Nath Saha |

| Role of Cryptography and Steganography in Baysian Network Security Bharti R. Dikhit, S. B. Kishor and Ravindra Mangal |

| Security Dissemination with Dynamic IP Routing T. Aarthy and P. Shrividhya |

| Sense the Technology Behind Intelligent Tires Gargi Mishra and Navkant Upadhyay |

| Sensor Network using CAN BUS for Steel Industry Rashmi Jain and N. G. Bawane |

| Sharing a Secret in Network Pallavi V. Chavan |

| Strengths and Weakness of Present Social Networks sanjeev Kulkarni, Satish H. Patil and R. A. Patil |

| Tracing and Spotting Bomb using Wireless Sensor, Neural Network and GPS Tracking System S. Prabakaran and S. Sharon Rosy |

| Usage of Internet Protocal (IP) Network in Digital Library T. Charan Raj, V. Kumar Raja, S. Suresh Kumar and P. Vamsi Krishna |

| Use of Smart Antennas in Ad Hoc Networks Mohammed Ali Hussain, K. Satya Rajesh, Y. Srinivasa Rao, T. Kranthi Kumar and J. Sirisha |

| Using Deployment Knowledge for Key Management Scheme in Wireless Sensor Networks Suman Ashokkumar |

| Wireless, Internet Based, Temperature Monitoring System Ketki Khante and Chandrashekhar Gode |

| Art of Writing Good Technical Abstracts (Non IEEE – Informative Paper) K. Kokula Krishna Hari |

| Art of Writing Effective Technical Paper and Presentation K. Kokula Krishna Hari and S. Prithiv Rajan |