Issue | Title | |
Vol 1, No 3 (2009) | Core-Stateless Fair Queuing For Fair Bandwidth Allocations in Internet | Abstract |
M. Azath, K. Murugan | ||
Vol 4, No 2 (2012) | Correlation-Based Traffic Analysis Attacks on Anonymity Networks | Abstract |
R. Gopinath, J. Balakumar, R. Gnanakumaran, M. Manikandaprabu | ||
Vol 3, No 3 (2011) | Coverage and Connectivity Analysis of ADHOC Networks in Presence of Channel Randomness | Abstract |
T. Shankar, Vurandala Kiran Kumar, S. Shanmugavel | ||
Vol 7, No 8 (2015) | Cross Layer Based Intrusion Detection in MANET Using Intelligent Paradigms | Abstract |
G. Usha, K. Mahalakshmi | ||
Vol 4, No 4 (2012) | Crosstalk Due to XPM under the Impact of Higher Order Dispersion Parameters in SCM-WDM Link | Abstract |
Vishal Sharma, Jagvir Kaur, Amarpal Singh | ||
Vol 7, No 5 (2015) | Cryptographic Algorithm Based on Triangular Form | Abstract |
Subhankar Ghosh, Pranam Paul | ||
Vol 8, No 8 (2016) | Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks | Abstract |
Anupriya K Haridas, Sneha Johnson | ||
Vol 11, No 12 (2019) | Current Research Technologies and Challenges on IoT Networking | Abstract |
V. Azhaharasan, S. Janarthanam, P. Prabhusundhar | ||
Vol 8, No 10 (2016) | Data Dissemination in Mobile Computing | Abstract |
P. Anbumani, N. M. Abroja | ||
Vol 10, No 5 (2018) | Data Encryption Using XTEA and OTP Generation for E-Payment System | Abstract |
K. C. Chandana, Deepak B. Desai, V. Geetha, S. N. Kavitha, N. Sushmitha | ||
Vol 4, No 2 (2012) | Data Leakage Detection | Abstract |
J. Balakumar, R. Gopinath | ||
Vol 10, No 1 (2018) | Data Mining in Network Security Using Intrusion Detection System | Abstract |
A. Meena, U. Sinthuja | ||
Vol 2, No 9 (2010) | Data Model Framework for Intruder Information Sharing in Sensor Networks | Abstract |
K. Venkatesh Sharma, K. Hanumantha Rao, Vannoj Ravi Kumar | ||
Vol 6, No 8 (2014) | Data Rescue Process in Network Medium with Higher End Security Measures | Abstract |
D. Shanmathy | ||
Vol 6, No 5 (2014) | Data Security and Privacy in Cloud Using RC6 and SHA Algorithms | Abstract |
O. M. Soundararajan, Y. Jenifer, S. Dhivya, T. K. P. Rajagopal | ||
Vol 9, No 9 (2017) | Data Security in System Socket Layer | Abstract |
K. Aiswarya, C. Bhuvaneswari, R. Sowmiya | ||
Vol 3, No 10 (2011) | Data Security Risks and Solutions in Cloud Computing | Abstract |
K. Vasantha Kokilam, S. Samson Dinakaran | ||
Vol 5, No 7 (2013) | Data Sharing Accountability in Cloud | Abstract |
S. Arul Murugan, M. A. Bhagyaveni, A. K. P. Kovendan | ||
Vol 3, No 15 (2011) | Data Storage on Clients for Implementation of Network RAID | Abstract |
Ankit Parekh, Anuya Welling, Pallak Jhawar, Pratik Munot, Amit Savyanavar | ||
Vol 6, No 7 (2014) | Database Migration Along with Architecture Using Bee Colony Optimization | Abstract |
Amarjit Kaur, Usvir Kaur, Dheerendra Singh | ||
Vol 5, No 3 (2013) | DDoS Attacks Detection and Trace Back the System | Abstract |
D. Delhi Ganesh | ||
Vol 3, No 9 (2011) | DDOS( Distributed Denial of Services) Attack and its Removal | Abstract |
Gaurav Mittal, Sheenam Goyal | ||
Vol 4, No 8 (2012) | Decoupling IPv7 from the World Wide Web in Reinforcement Learning | Abstract |
A. C. Reddy Sagar, G. M. Chanakya, S. Shiva Prakash | ||
Vol 10, No 3 (2018) | Decoupling the Ethernet from Systems in Consistent Hashing | Abstract |
J. Vinothkumar | ||
Vol 10, No 3 (2018) | Dedicated Automotive Network Design Using Zigbee for V2V | Abstract |
V. Gomathy, S. Sheeba Rani | ||
326 - 350 of 922 Items | First Previous 9 10 11 12 13 14 15 16 17 18 Next Last |
Browse Title Index
Scroll