Table of Contents
Vol 5, No 6 (2013)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
Cognitive Energy Monitoring System using Arduino | ||
S. B. Sanukrishnan | ||
DOI:10.36039/ciitaas/5/6/2013/106813.219-225 , Vol 5, No 6 (2013), Pagination: 219-225 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 240 | PDF Views: 2 |
Intrusion Detection and Prevention Technology using Sensor Networks to Protect Firewall from Attacks | ||
R Mahesh Kumar | ||
DOI:10.36039/ciitaas/5/6/2013/106816.226-232 , Vol 5, No 6 (2013), Pagination: 226-232 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 273 | PDF Views: 2 |
An Overview of Social Network in Cloud Computing Threats to Privacy | ||
K. Pavithra, T. Vijayalakshmi | ||
DOI:10.36039/ciitaas/5/6/2013/106817.233-237 , Vol 5, No 6 (2013), Pagination: 233-237 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 247 | PDF Views: 2 |
Improved Security Intelligence in Cloud Computing | ||
R. Sundar Raj | ||
DOI:10.36039/ciitaas/5/6/2013/106818.238-243 , Vol 5, No 6 (2013), Pagination: 238-243 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 262 | PDF Views: 2 |
Network Intrusion Detection & Prevention | ||
K. Arul Marie Joycee, R. Parkavi, R. Senthikumari | ||
DOI:10.36039/ciitaas/5/6/2013/106820.244-247 , Vol 5, No 6 (2013), Pagination: 244-247 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 255 | PDF Views: 3 |