Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.9 Issue.2

Submission
Last date
30-Apr-2023
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-9,Issue-2. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  A Approach For Detecting Forgery And Provenance To Packet Attacking
PaperId: :  1669
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 2 Issue 2 2016
DUI:    16.0415/IJARIIE-1669
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
VIGNESH.VVEL TECH HIGH TECH DR.RANGARAJAN DR.SAKUTHALA ENGINEERING COLLEGE
Manigandan.s.kVel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College, Avadi, Chennai-62

Abstract

computer application
,,,
The giving out of caches among Web proxy is an important technique to reduce Web traffic and alleviate network bottlenecks. As sensor networks are existence gradually organized in choice making structures such as battlefield monitor systems and SCADA (Guiding Switch and Data Gaining) systems, making choice creators aware of the dependability of the composed data is a critical. Capabilities-based networks present a fundamental shift in the security design of network architectures. As swelling expanses of valuable material are shaped and continue digitally, the ability to conclude the origin of data becomes essential. In science, medicine, commerce, and government, data provenance tracking is essential for rights fortification, authoritarian conformity, management of intelligence and medical data, and confirmation of material as it flows through workstation tasks Large-scale sensor networks are deployed in numerous application domains, and the data they pull together are used in administrative for critical infrastructures. Data are streamed from multiple source through intermediary handing out nodes that aggregate information The rapid advances in processor, memory, and radio knowledge have enabled the growth of disseminated networks of small, inexpensive nodes that are talented of detecting, addition, and wireless statement We present the Tiny Aggregation (TAG) service for aggregation in low-power, distributed, wireless environments. A Provenance-Aware Storage System (PASS) is a storage system that automatically collects and maintains attribution or lineage, the absolute history or ancestry of an item. Much scientific data is not obtained from dimensions but rather derivative from other data by the application of computational procedures.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE VIGNESH.V, and Manigandan.s.k. "A Approach For Detecting Forgery And Provenance To Packet Attacking" International Journal Of Advance Research And Innovative Ideas In Education Volume 2 Issue 2 2016 Page 161-168
MLA VIGNESH.V, and Manigandan.s.k. "A Approach For Detecting Forgery And Provenance To Packet Attacking." International Journal Of Advance Research And Innovative Ideas In Education 2.2(2016) : 161-168.
APA VIGNESH.V, & Manigandan.s.k. (2016). A Approach For Detecting Forgery And Provenance To Packet Attacking. International Journal Of Advance Research And Innovative Ideas In Education, 2(2), 161-168.
Chicago VIGNESH.V, and Manigandan.s.k. "A Approach For Detecting Forgery And Provenance To Packet Attacking." International Journal Of Advance Research And Innovative Ideas In Education 2, no. 2 (2016) : 161-168.
Oxford VIGNESH.V, and Manigandan.s.k. 'A Approach For Detecting Forgery And Provenance To Packet Attacking', International Journal Of Advance Research And Innovative Ideas In Education, vol. 2, no. 2, 2016, p. 161-168. Available from IJARIIE, http://ijariie.com/AdminUploadPdf/A_Approach_For_Detecting_Forgery_And_Provenance_To_Packet_Attacking_ijariie1669.pdf (Accessed : ).
Harvard VIGNESH.V, and Manigandan.s.k. (2016) 'A Approach For Detecting Forgery And Provenance To Packet Attacking', International Journal Of Advance Research And Innovative Ideas In Education, 2(2), pp. 161-168IJARIIE [Online]. Available at: http://ijariie.com/AdminUploadPdf/A_Approach_For_Detecting_Forgery_And_Provenance_To_Packet_Attacking_ijariie1669.pdf (Accessed : )
IEEE VIGNESH.V, and Manigandan.s.k, "A Approach For Detecting Forgery And Provenance To Packet Attacking," International Journal Of Advance Research And Innovative Ideas In Education, vol. 2, no. 2, pp. 161-168, Mar-App 2016. [Online]. Available: http://ijariie.com/AdminUploadPdf/A_Approach_For_Detecting_Forgery_And_Provenance_To_Packet_Attacking_ijariie1669.pdf [Accessed : ].
Turabian VIGNESH.V, and Manigandan.s.k. "A Approach For Detecting Forgery And Provenance To Packet Attacking." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 2 number 2 ().
Vancouver VIGNESH.V, and Manigandan.s.k. A Approach For Detecting Forgery And Provenance To Packet Attacking. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2016 [Cited : ]; 2(2) : 161-168. Available from: http://ijariie.com/AdminUploadPdf/A_Approach_For_Detecting_Forgery_And_Provenance_To_Packet_Attacking_ijariie1669.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads



Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
Visual Sentiment Analysis Based On Image Captioning Using Deep LearningComputer Science and EngineeringR.Abishek Download
REAL TIME CHATTING APPLICATION FOR NATIVE ORGANIZATIONComputer EngineeringNIRANJAN V Download
AN INTRUSION DETECTION SYSTEM TO PREVENT THE K-ZERO DAY ATTACK PROPAGATIONCOMPUTER ENGINEERING BHARATH A Download
Street Dancers web applicationComputer science Veluguri Bhavitha kumari Download
Base Station Monitoring SystemComputer EngineeringDheenuka M Download
Remote workforce checkin systemComputer EngineeringDhaniesh M Download
DIGITAL CAMPUS QUERY ACQUISITION SYSTEMComputer Scence and EngineeringGOWTHAMA KURINJI VEANDAN R M Download
Hand Gesture Controlled Virtual Mouse Using Artificial Intelligence.Computer Science and EngineeringKAVITHA R Download
REAL TIME DETECTION AND CLASSIFICATION OF YOGA POSE USING TENSORFLOW MOVENETComputer EngineeringJayasurya J Download
CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM FOR REAL ESTATECOMPUTER ENGINEERINGHEMAPRIYA R Download
CROP DISEASE DETECTION USING CNNCOMPUTER SCIENCE AND ENGINEERINGE.Angel Anna Prathiba Download
Customer Segmentation using Tableau MethodComputer Science and EngineeringS.Sivaselvi Download
Bank loan prediction system using Logistic RegressionComputer Science and EngineeringS.Sivaselvi Download
Street Light Monitoring and Controlling SystemComputer Science and EngineeringProf. Virendra Yadav Download
Bluetooth Based Device For Integrating Wireless WT Sets With Smartphones Through An AppComputer Engineering, Electrical Engineering, Wireless SystemShudhanshu Ranjan Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2023. IJARIIE. All Rights Reserved.