1.CHECKPOINT BASED RECOVERY AWARE COMPONENT SYSTEM IN GRID COMPUTING
Authors : A.Suganthi,R.Bharathi
Paper Id :IJCRCST-SEPTEMBER16-01
Page No : 995 – 1000
2.SECURITY AND NETWORK MANAGEMENT
Authors : Saranya J,Vaishnavi A.B,Anusha Mary Sunny Thomas
Paper Id :IJCRCST-SEPTEMBER16-02
Page No : 1001 – 1003
3.A STUDY ON ATTACKS AND SECURITY OF MANET ROUTING PROTOCOLS IN MALICIOUS ENVIRONMENTS
Authors : S.Vaitheki, K.Sudha
Paper Id :IJCRCST-SEPTEMBER16-03
Page No : 1004 – 1008
4.A STUDY ON MULTICASTING STRATEGIES OF ROUTING IN WIRELESS MOBILE AD HOC NETWORKS
Authors : C.Aruna, S.Mythili
Paper Id :IJCRCST-SEPTEMBER16-04
Page No : 1009 – 1015
5.A STUDY ON PACKET ROUTING AND DROPPING IN MANET MALICIOUS NODES
Authors : T.Jayanthi,K.Sumathi
Paper Id :IJCRCST-SEPTEMBER16-05
Page No : 1016 – 1020