Contact Us:09993897203
Email: dstarenainfo@gmail.com
1st Branch: 121,Malviya Nagar,
New Market,Bhopal-462003
2nd Branch:146/7/2 Premium Center
Zone-1,MP Nagar
Bhopal-462011
Arrow Registration
MATLAB,PHP,VHDL(VLSI),EMBEDDED SYSTEM,ANDROID WEBSITE DESIGN Industrial Training will be start Soon

NETWORKING & SECURITY

Branch: Computer Science

Topic: NETWORKING AND SECURITY

 

2018-2019 NETWORKING TITLES

S.NO TITLES  DOMAIN download
NETWORKING
DST TO N 01 High Throughput Opportunistic Cooperative Device-to-Device Communications With Caching NETWORKING
DST TO N 02 Uncertain Data Clustering in Distributed Peer-to-Peer Networks NETWORKING
DST TO N 03 A Novel Approximation for Multi-Hop Connected Clustering Problem in Wireless Networks NETWORKING
DST TO N 04 Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs NETWORKING
DST TO N 05 A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks NETWORKING
DST TO N 06 Event-based Fault Detection Filtering for Complex Networked Jump Systems NETWORKING
DST TO N 07 Incremental Deployment and Throughput Maximization Routing for a Hybrid SDN NETWORKING
DST TO N 08 Analytical Modeling of Multipath TCP Over Last-Mile Wireless NETWORKING
DST TO N 09 User-Centric Network MIMO With Dynamic Clustering NETWORKING
DST TO N 10 Topological Properties of Secure Wireless Sensor Networks Under the q-Composite Key Pre-distribution Scheme With Unreliable Links NETWORKING
DST TO N 11 Social Norm Incentives for Network Coding in MANETs NETWORKING
DST TO N 12 An Overlay Architecture for Throughput Optimal Multipath Routing NETWORKING
DST TO N 13 Routing in Accumulative Multi-Hop Networks NETWORKING
DST TO N 14 Coding for Improved Throughput Performance in Network Switches NETWORKING
DST TO N 15 Power Efficiency and Delay Tradeoff of 10GBase-T Energy Efficient Ethernet Protocol NETWORKING
DST TO N 16 A Scalable Framework for Wireless Distributed Computing NETWORKING
DST TO N 17 Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels NETWORKING
DST TO N 18 Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems NETWORKING
DST TO N 19 Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks NETWORKING
DST TO N 20 A Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G Networks Over High Speed Rails NETWORKING
DST TO N 21 On Oblivious Neighbor Discovery in Distributed Wireless Networks With Directional Antennas: Theoretical Foundation and Algorithm Design NETWORKING
DST TO N  22 When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks NETWORKING
DST TO N 23 Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks NETWORKING
DST TO N 24 Security Implications of Permission Models in Smart-Home Application Frameworks NETWORKING
DST TO N 25 Data-Driven Faulty Node Detection Scheme for Wireless Sensor Networks NETWORKING
DST TO N 26 Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks NETWORKING
DST TO N 27 Congestion Control for Background Data Transfers With Minimal Delay Impact NETWORKING
DST TO N 28 Transient Community Detection and Its Application to Data Forwarding in Delay Tolerant Networks NETWORKING
DST TO N 29 A Statistical Exploration of Protocol Adoption NETWORKING
DST TO N 30 No Packet Left Behind: Avoiding Starvation in Dynamic Topologies NETWORKING
DST TO N 31 Green Virtualization for Multiple Collaborative Cellular Operators NETWORKING
DST TO N 32 DORE: An Experimental Framework to Enable Outband D2D Relay in Cellular Networks NETWORKING
DST TO N 33 Congestion Control for Web Real-Time Communication NETWORKING
DST TO N 34 Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexitys NETWORKING
DST TO N 35 Network-Based Modeling for Characterizing Human Collective Behaviors During Extreme Events NETWORKING
DST TO N 36 Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches NETWORKING
DST TO N 37 Someone in Your Contact List: Cued Recall- Based Textual Passwords NETWORKING
DST TO N 38 A Game-Theoretic Analysis of Adversarial Classification NETWORKING
DST TO N 39 A New Rule for Cost Reassignment in Adaptive Steganography NETWORKING
DST TO N 40 On the Maximum Rate of Networked Computation in a Capacitated Network NETWORKING
DST TO N 41 Towards Optimal Connectivity on Multi- layered Networks NETWORKING
DST TO N 42 Uncertain Data Clustering in Distributed Peer-to-Peer Networks NETWORKING
DST TO N 43 A Secure and Practical Authentication Scheme Using Personal Devices NETWORKING
DST TO N 44 Full Verifiability for Outsourced Decryption in Attribute Based Encryption NETWORKING
DST TO N 45 LOMCF: Forwarding and Caching in Named Data Networking based MANETs NETWORKING
DST TO N 46 Probability of Partially Decoding Network- Coded Messages NETWORKING
DST TO N 47 Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks NETWORKING
DST TO N 48 Knowledge Guided Hierarchical Multi-Label Classification over Ticket Data NETWORKING
DST TO N 49 Knowledge Guided Hierarchical Multi-Label Classification over Ticket Data NETWORKING
DST TO N 50 An Efficient Cloud Market Mechanism for Computing Jobs With Soft Deadlines NETWORKING

 




    Login Page

    Inquiry Form