Sara Qaisar

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
In cloud environment, chances of intrusion are more with cultivation of intruder's attacks because cloud computing is internet based computing where virtual servers provide software, Platform, Infrastructure or other computing resources to customer on pay-as-you-basis. With increment in need of computing services of cloud computing, demand of security(More)
BACKGROUND Conjugated and drug loaded silver nanoparticles are getting an increased attention for various biomedical applications. Nanoconjugates showed significant enhancement in biological activity in comparison to free drug molecules. In this perspective, we report the synthesis of bioactive silver capped with 5-Amino-β-resorcylic acid hydrochloride(More)
The security is a critical issue in wireless sensor networks (WSNs). A complex form of Denial of Service attack type is collaborative black hole attacks which challenge the security of wireless sensor networks. The purpose of this attack is to receive and drop all packets. Wireless sensor network nodes have limited energy and also have limited processing(More)
  • 1