Code Directory
 Visual Basic & VB.NET
New Code
Javascript Hashset 1.0
dbExpress driver for SQLite 3.7
IP2Location Geolocation Database 2015
Hex Comparison 5.11756
Airbnb Clone Script 4.3.0
Blasting Fax Server
dbExpress driver for InterBase 4.7
Database Workbench Pro 5.1.4
Exe Guarder 4.1344
EntityDAC 1.4
dbExpress driver for SQL Server 7.1
Luxand FaceSDK 6.0.1
Inout Shopping Cart 2.0
Fax Server Pro 9.3.0922
Top Code
Image Editor Using JavaFX 1.0
Sine Wave Using JavaFX 1.0
Animation Demo JavaFX 1.0
Movie Rating Script 1.0.2
ICPennyBid Penny Auction Script 4.0
PHP Review Script 1.0
Quick Maintenance and Backup for MS SQL
ATN Resume Finder 2.0
ATN Site Builder 3.0
Bus Booking Script 1.0.4
Time Slot Booking Calendar PHP 1.0
Availability Booking Calendar PHP 1.0
PHP GZ Blog Script 1.1
WeBuilder 2015 13.3
PHP Digital Download Script 1.0.4
Top Search
Code To Add Url
Android Live Wallpaper
Joomla Directory
Website Value
Elgg Videochat
Free Community Software
Carpooling Website Php
Php Guestbook Spam
Pdf File For Library Management Using Sdlc
Words To Digits
Video Search Php Scripts
Press Release Section
Guestbook In Php
Autonomous Region In Muslim Mindanao
E Shop Php Sql
Related Search
Intrusion Detection On Wireless Sensor Networks
Intrusion Detection In Wireless Sensor Networks
Intrusion Detection In Wireless Networks
Sending Adv In Wireless Sensor Networks
Intrusion Detection On Java
Wireless Sensor Networks In Java
Data Fusion In Wireless Sensor Networks
Wireless Sensor Networks In C
ns2 Codes For Wireless Sensor Networks
Energy Efficiency In Wireless Sensor Networks
ns2 Code For Wireless Sensor Networks
Wireless Sensor Networks Tree Routing
Wireless Sensor Networks Routing
Routing Protocols For Wireless Sensor Networks
Source Codes For Wireless Sensor Networks
 Intrusion Detection On Wireless Sensor Networks 

Code 1-20 of 60   Pages: Go to  1  2  3  Next >>  page  

it is used for genetic algorithm implementation for scheduling in wireless sensor networks

GSN is a middleware (extendible software infrastructure) for rapid deployment and integration of heterogeneous wireless sensor networks. It is tested with Mica2, Mica2Dot, TinyNodes, Wisenode ,Wired & Wireless cameras, several RFID...

A feedback-enhanced framework for routing in wireless sensor networks. Speeds up the process of implementing routing techniques. Enables piggybacking of routing information on data packets. Written for the Omnet++ simulator and the Mobility...

Logical Neighborhoods is a a high-level programming abstraction for wireless sensor networks that simplifies the development of fully distributed, embedded networked applications.

SENSIX is middleware that bridges wireless sensor networks and distributed object-oriented software such as CORBA.

TRMSim-WSN (Trust and Reputation Models Simulator for Wireless Sensor Networks) is a Java-based simulator aimed to test Trust and Reputation models for WSNs. It provides several Trust and Reputation models and new ones can be easily added.

Wireless sensor networks offer an entire new field open for research and development. These types of networks conceptually offer many exciting features including scalability, self-configuration, self-healing, multicast routing, and easy...

SnortSMS, a highly configurable sensor management system that provides the ability to remotely manage Snort [Barnyard] based Intrusion Detection Systems.

The project is designed to push configuration files, monitor sensor health, and...

Recent advances in Micro Electro Mechanical Systems (MEMS) technology, wireless communications, and digital electronics have enabled the development of low cost, low power, multifunctional sensor nodes that are small in size and communicate...

SecurityFusion is an open source network intrusion detection and preventionsystem based in Hogwash, capable of performing real-time traffic analysis and packetlogging on IP networks.

Ida, is a Apache log security analyzer written in PHP.

Ida - Intrusion Detection for Apache will scan Apache logs and report about security incidents like SQL injections, XSS attacks, path traveling and so on.

CIDSS - Common Intrusion Detection Signatures Standard is our standard based on experiences due to tries of automatic translating signatures various companies. CIDSS is now the most extensible language that can describe network intrusions.

An open-source configurable virtual testbed (based on the Eucalyptus cloud platform) for Intrusion Detection System Evaluation.

Framework to simplify developing applications that use wireless body sensor networks (bodynets). Manages sensor sampling, data buffering, local processing and communication. Supports embedded devices running TinyOS and any Java-capable gateway.

Simplistic implementation of the Paper 'A Simple and Robust Vertical Handoff algorithm for Heterogenous Wireless Mobile Networks' by Daojing He, Caixia Chi, Sammy Chan, Chun Chen, Jiajun Bu, Mingjian Yin.

IDSRG stands for Intrusion Detection System Report Generator. It generates graphic reports from a snort database of alerts.

The main goal of the project IDS Report Generator is to provide instant reports of your ids events. It has 7...

OpenAanval - The Open Source version of the Commercial Aanval Console - A full featured advanced Intrusion Detection System (IDS) Console for Snort.

Real-time LIVE event monitoring, comprehensive statistics, multi-user, email / audio...

Journeta is a zero-configuration-required peer-to-peer (P2P) discovery and communications library for Ruby applications on a closed networks, by OpenRain, LLC.

WiND is a Web application targeted at Wireless Community Networks. It was created as a replacement for NodeDB for the members of Athens Wireless Metropolitan Network (AWMN) located in Athens, Greece.

The Boolean Network Toolkit is an efficient and easy-to-use object-oriented C++ library which enables researchers to simulate ad carry out experiments (like attractor sampling and Derrida plot computation) on large boolean networks.