Skip to content

COMPUTER SCIENCE ENGINEERING

The Computer Science Engineering category in Krazytech.com hosts technical presentation topics for college students, technical topics for presentations for Computer Science and Engineering, technical topics for seminars, and paper presentation topics. In addition to this, you can also get the latest trends in science and technology, research topics, artificial intelligence, Internet of Things (IoT),  etc

Jamming and anti-Jamming Techniques example

Jamming and anti-Jamming Techniques

jamming, the adversary corrupts the content of original message by transmitting radio frequency signals in the network or by blocking the message so that it cannot reach to the intended receiver.

Honeypot in cyber security

Honeypot

A honeypot is used in the area of computer and Internet security . It is a security resource, whose value lies in being probed, attacked or compromised. They are special decoy servers to catch the‚ Blackhats (people with evil and illegal intents). Honeypots attract the hackers to attack a vulnerable computer system, which is under observation, by a security team. All the information about the attackers is logged, and monitored.

Security Requirements in Wireless Sensor Networks

Security requirements in Wireless Sensor Networks

The confidentiality objective is required in sensors environment to protect information traveling between the sensor nodes of the network or between the sensors and the base station from disclosure, since an adversary having the appropriate equipment may eavesdrop on the communication.

Mobile ad hoc network

Mobile Ad Hoc Network Routing Protocols and Applications

Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently.