| A Co-operative Intrusion Detection System in Mobile Ad-Hoc Network S. S. Chopade and N. N. Mhala |
| A Modified Mechanism for Misbehavior Detection in Mobile Ad Hoc Networks S. Gopinath and J. Sugesh |
| A Quantitative Analysis to Solve the Performance Issues in IEEE 802.11 Multi Hop Ad Hoc Networks K. Saravanan and T. Ravichandran |
| A Secure Cookie Protocol S. Vinoth and S. Anandhi |
| A Secure Wireless Sensor Network using Key Management Scheme Vismay Jain |
| A Survey of Critical Security Issues and Network Management in Wireless Mesh Networks M. S. Joshi, A. A. Bakare, Vijaya V. Pangave and Vishakha C. Kulkarni |
| A Survey of Educational Learning Styles: Improving Quality in Higher Education using Knowledge Management K. Kalaiselvi and G. V. Uma |
| An Application based Secure Network Against Malicious Rogue System Threats Neha Mehra and Yogendra Kumar Jain |
| An Overview of Ad Hoc and Wi-Fi Networks Poonam Sawant |
| Analysing the Covert Channels in Adhoc Networks S. K. Indumathi |
| Analyzing and Comparing the Cryptographic Hash Algorithms T. Lalitha and R. Umarani |
| Broadcast Server Architecture for Wireless Sensor Networks P. Ashok, J. Kaviyarasan, A. R. Naveen Prasad and S. R. Seetha Ram |
| Capacity Measurement for VoIP Traffic in IEEE 802.11b Standard Geetu dhawan and Vijay Chaudhary |
| Comparative Study of Mobile Ad Hoc & Wireless Sensor Network G. Jeyakodi |
| Comparison of Various Ant Colony based Routing Algorithms Amit Chauhan and Nidhi Shah |
| Cyber Threat: A Challenge to the Society and Network Security Geeta Arwindekar and Nusrat Parveen |
| Design and Implementation of Secure Network System using Windows Environment Nitin and Yogendra Kumar Jain |
| Design of Policy based Packet Filtering Firewall V. Anantha Krishna and T. Aruldoss Albert Victoire |
| Energy Efficient, Power Aware Routing Algorithm Kanchan M. Miskin |
| Enhancing Voice- over- IP In An Audio Mixing Environment Anitha Amarnath and A. Anasuya Threse Innocent |
| Extended Adaptive TTL based Cache Invalidation Strategy In Manet Nakeeb Sabiyath Fatima and Peer Mohammed Sheik Abdul Khader |
| Hierarchical Semantic Search Over A P2P Network V. Jothirlatha, Divya Ria Thomas, T. S. Ashwin kumar and K. R. Bindu |
| Implementation of P2P Computing with PDSR Routing Protocol in Mobile Ad- Hoc Networks (P-MAN) L. Agilandeeswari and K. Muralibabu |
| Intelligent Grid Computing R. Nanda Kumar, P. Aravindhan and T. Dinesh |
| Kohonen Neural Network S. Naganandhini |
| Machine fault Diagnosis using a Multi Layer Perceptron Neural Network Mehrdad Nouri Khajavi and Ebrahim Babaei |
| Mechanism to Mitigate App-DDoS Attacks on Web Sites Manisha M. Patil and U. L. Kulkarni |
| Middleware Processing Approach for Wireless Sensor Networks R. Selvakumar, S. Mohamed Saleem and V. Vipul Jain |
| Mobile Computing with Sensors & Social Data for Enhanced In-store shopping for Individuals and Groups Sanjeev Kulkarni and Ravindra R. Mudholkar |
| Network Intrusion Detection in Wireless Sensor Networks A. Sheryas.B, B. Lakshaman Naika.R and C. Arun Kumar.G |
| Network System of Detection with Incomplete Audit Data Shailesh Gaikwad and Vijay Shah |
| Performance Evaluation of AODV and DSR Sharda Prasad Patel, Ashish Chaurasia and Shivendu Dubey |
| Performance Measures for Clustered Heterogeneous Wireless Sensor Network Anil Khandelwal and Ravi S. Mishra |
| Performance of Encryption Techniques for Real Time Video Streaming Shiva Priya Katta |
| Present Personal Sensor Network with Pros and Cons Sanjeev Kulkarni, A. M. Sankpal and R. R. Mudholkar |
| Protocols for Transport and Network Layer in WSNs: A Review Ankit Jain and A. K. Verma |
| RCCM: A Novel Method for Data Transmission in Vehicular Sensor Networks R. Pushpaak and L. Keerthana |
| Restricted Hoping Routing Protocol Kinjal Roy and Himadri Nath Saha |
| Role of Cryptography and Steganography in Baysian Network Security Bharti R. Dikhit, S. B. Kishor and Ravindra Mangal |
| Security Dissemination with Dynamic IP Routing T. Aarthy and P. Shrividhya |
| Sense the Technology Behind Intelligent Tires Gargi Mishra and Navkant Upadhyay |
| Sensor Network using CAN BUS for Steel Industry Rashmi Jain and N. G. Bawane |
| Sharing a Secret in Network Pallavi V. Chavan |
| Strengths and Weakness of Present Social Networks sanjeev Kulkarni, Satish H. Patil and R. A. Patil |
| Tracing and Spotting Bomb using Wireless Sensor, Neural Network and GPS Tracking System S. Prabakaran and S. Sharon Rosy |
| Usage of Internet Protocal (IP) Network in Digital Library T. Charan Raj, V. Kumar Raja, S. Suresh Kumar and P. Vamsi Krishna |
| Use of Smart Antennas in Ad Hoc Networks Mohammed Ali Hussain, K. Satya Rajesh, Y. Srinivasa Rao, T. Kranthi Kumar and J. Sirisha |
| Using Deployment Knowledge for Key Management Scheme in Wireless Sensor Networks Suman Ashokkumar |
| Wireless, Internet Based, Temperature Monitoring System Ketki Khante and Chandrashekhar Gode |
| Art of Writing Good Technical Abstracts (Non IEEE – Informative Paper) K. Kokula Krishna Hari |
| Art of Writing Effective Technical Paper and Presentation K. Kokula Krishna Hari and S. Prithiv Rajan |