Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.11 Issue.3

Submission
Last date
28-Jun-2025
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-11,Issue-3. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  A Approach For Detecting Forgery And Provenance To Packet Attacking
PaperId: :  1669
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 2 Issue 2 2016
DUI:    16.0415/IJARIIE-1669
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
VIGNESH.VVEL TECH HIGH TECH DR.RANGARAJAN DR.SAKUTHALA ENGINEERING COLLEGE
Manigandan.s.kVel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College, Avadi, Chennai-62

Abstract

computer application
,,,
The giving out of caches among Web proxy is an important technique to reduce Web traffic and alleviate network bottlenecks. As sensor networks are existence gradually organized in choice making structures such as battlefield monitor systems and SCADA (Guiding Switch and Data Gaining) systems, making choice creators aware of the dependability of the composed data is a critical. Capabilities-based networks present a fundamental shift in the security design of network architectures. As swelling expanses of valuable material are shaped and continue digitally, the ability to conclude the origin of data becomes essential. In science, medicine, commerce, and government, data provenance tracking is essential for rights fortification, authoritarian conformity, management of intelligence and medical data, and confirmation of material as it flows through workstation tasks Large-scale sensor networks are deployed in numerous application domains, and the data they pull together are used in administrative for critical infrastructures. Data are streamed from multiple source through intermediary handing out nodes that aggregate information The rapid advances in processor, memory, and radio knowledge have enabled the growth of disseminated networks of small, inexpensive nodes that are talented of detecting, addition, and wireless statement We present the Tiny Aggregation (TAG) service for aggregation in low-power, distributed, wireless environments. A Provenance-Aware Storage System (PASS) is a storage system that automatically collects and maintains attribution or lineage, the absolute history or ancestry of an item. Much scientific data is not obtained from dimensions but rather derivative from other data by the application of computational procedures.

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE VIGNESH.V, and Manigandan.s.k. "A Approach For Detecting Forgery And Provenance To Packet Attacking" International Journal Of Advance Research And Innovative Ideas In Education Volume 2 Issue 2 2016 Page 161-168
MLA VIGNESH.V, and Manigandan.s.k. "A Approach For Detecting Forgery And Provenance To Packet Attacking." International Journal Of Advance Research And Innovative Ideas In Education 2.2(2016) : 161-168.
APA VIGNESH.V, & Manigandan.s.k. (2016). A Approach For Detecting Forgery And Provenance To Packet Attacking. International Journal Of Advance Research And Innovative Ideas In Education, 2(2), 161-168.
Chicago VIGNESH.V, and Manigandan.s.k. "A Approach For Detecting Forgery And Provenance To Packet Attacking." International Journal Of Advance Research And Innovative Ideas In Education 2, no. 2 (2016) : 161-168.
Oxford VIGNESH.V, and Manigandan.s.k. 'A Approach For Detecting Forgery And Provenance To Packet Attacking', International Journal Of Advance Research And Innovative Ideas In Education, vol. 2, no. 2, 2016, p. 161-168. Available from IJARIIE, https://ijariie.com/AdminUploadPdf/A_Approach_For_Detecting_Forgery_And_Provenance_To_Packet_Attacking_ijariie1669.pdf (Accessed : ).
Harvard VIGNESH.V, and Manigandan.s.k. (2016) 'A Approach For Detecting Forgery And Provenance To Packet Attacking', International Journal Of Advance Research And Innovative Ideas In Education, 2(2), pp. 161-168IJARIIE [Online]. Available at: https://ijariie.com/AdminUploadPdf/A_Approach_For_Detecting_Forgery_And_Provenance_To_Packet_Attacking_ijariie1669.pdf (Accessed : )
IEEE VIGNESH.V, and Manigandan.s.k, "A Approach For Detecting Forgery And Provenance To Packet Attacking," International Journal Of Advance Research And Innovative Ideas In Education, vol. 2, no. 2, pp. 161-168, Mar-App 2016. [Online]. Available: https://ijariie.com/AdminUploadPdf/A_Approach_For_Detecting_Forgery_And_Provenance_To_Packet_Attacking_ijariie1669.pdf [Accessed : ].
Turabian VIGNESH.V, and Manigandan.s.k. "A Approach For Detecting Forgery And Provenance To Packet Attacking." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 2 number 2 ().
Vancouver VIGNESH.V, and Manigandan.s.k. A Approach For Detecting Forgery And Provenance To Packet Attacking. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2016 [Cited : ]; 2(2) : 161-168. Available from: https://ijariie.com/AdminUploadPdf/A_Approach_For_Detecting_Forgery_And_Provenance_To_Packet_Attacking_ijariie1669.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads



Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
Edge-to-Cloud Synergy: An Autoencoder-GAN Framework for Anomaly Detection in Healthcare Records, Financial Statements, and Secure Cloud StorageInformation TechnologyKarthik Kushala Download
E-Commerce Fraud Detection Based on Machine Learning TechniquesComputer Science EngneeringVikram Ankush Ade Download
Detection of Phishing Website Using Gradient Boosting AlgorithmComputer Science and EngineeringYAWALKAR PRASAD PRAMOD Download
Property Dealing WebComputer Science EngineeringYash Chaudhari Download
Reinforcement Learning for the Evolution of Antimicrobial Nano formulationsmachine learningMadhusudan Download
SecuraVault: A secured blockchain based cloud storage systemComputer Engineering Anshika Jaiswal Download
Autoimmune Disease Detection in women Using Machine Learning Approachcomputer science EngineeringJ. L. V. S. Download
Medicine Overdose Detection System Using Machine LearningComputer Science EngineeringDr.Somashekhar B M Download
Home Price Prediction Using Machine LearningComputer Science & Engineering G Tushar Download
Heat diseases prediction using machine learningComputer EngineeringProf. Meghashree M B Download
GRIDSHIELD AIComputer EngineeringDr. Archana B Download
Diabetic Retinopathy Detection with AI InsightsComputer EngineeringJay Mahesh Gurav Download
Personalized Fitness Segmentation with Actionable InsightsMachine LearningAnju Tiwari Download
Sentiment-Based Machine Learning Approach for Mapping Citizen ProblemsComputer science and EngineeringDr. Madhu B K Download
Deligro: A Dual-Purpose Web Platform for Food Ordering and Leftover Food Donation ManagementComputer Science EngineeringRakesh Reddy K Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2025. IJARIIE. All Rights Reserved.