Issue | Title | |
Vol 4, No 6 (2012) | Ensuring Security and Dynamic Operation Support for Storage Services in Cloud Computing | Abstract |
V. K. Deepa, S. Jothichellammal | ||
Vol 1, No 3 (2009) | Ensuring Trustworthy File Sharing in Decentralized Peer to Peer Networking | Abstract |
S. Umamaheswari, Arun M. Kudtarkar, T. Hamsapriya, R. Mekala | ||
Vol 4, No 6 (2012) | Entropy Variation Based Detecting DDoS Attack in Large Scale Networks | Abstract |
M. Uthaya Kumar, B. Aysha Banu | ||
Vol 4, No 7 (2012) | ERAF-Extensive Reputed ARAN using Fuzzy Logic | Abstract |
R. Sudha, D. Sivakumar | ||
Vol 12, No 1 (2020) | Estimation of Energy Efficient Consumption of Reactive and Proactive Routing Protocols in MANET | Abstract |
S. Vinod Kumar, V. Anuratha | ||
Vol 10, No 3 (2018) | Evaluation of Traditional SPAs with AODV Routing Protocol for MANETs | Abstract |
K. Thamizhmaran | ||
Vol 3, No 10 (2011) | Evolutionary ATM Network Optimization | Abstract |
V. Sathiya | ||
Vol 4, No 3 (2012) | Exploration of Taxonomical Vulnerabilities in Operating System V | Abstract |
A. Ramachandran, S. Ramachandran, A. Sathiyaraj | ||
Vol 4, No 14 (2012) | Extended B.A.T.M.A.N-A Novel Approach with Node Stability for Reliable Transmission in MANETS | Abstract |
R. Jeeva | ||
Vol 5, No 11 (2013) | Extending AODV to Avoid Black Hole Attack (AOMDV) | Abstract |
K. M. Naseera, C. Chandrasekar | ||
Vol 5, No 1 (2013) | Extending Social Privacy Protector for Twitter Social Network | Abstract |
S. Thiraviya Regina Rajam, P. Joseph Charles, S. Britto Ramesh Kumar | ||
Vol 10, No 7 (2018) | Facing Security Problems in Big Data and Hadoop | Abstract |
P. S. Vijayalakshmi, S. Lakshmidevi, T. Arunambika | ||
Vol 5, No 8 (2013) | Fault Forbearance Methods for Randomized Intrusion Tolerance | Abstract |
R. Vikkram, M. Sathya Prasath, R. Vidhyalakshmi | ||
Vol 4, No 5 (2012) | Fault Tolerance by Quartile Method with Outlier Detection in Wireless Sensor and Actor Networks | Abstract |
P. Ganesh Kumar, S. Kamalesh, B. Muthukarthick, D. Prasaath | ||
Vol 3, No 1 (2011) | Fault Tolerant Dynamic Scheduling in Grid Environment | Abstract |
K. Saravanan, Ponsy R. K. Sathiya Bhama | ||
Vol 3, No 7 (2011) | Fault Tree Analysis for Safety Critical Network Infrastructure | Abstract |
P. Vaishnavi, Rajesh Prasanna | ||
Vol 3, No 2 (2011) | Fault-Tolerant Scheduling Techniques for Computational Grid | Abstract |
S. Uma Maheswari, A. Shamila Ebenezer | ||
Vol 8, No 4 (2016) | Fine Grained Distributed Data Access Control with Portable Billing Scheme for Service Oriented Vehicular Network | Abstract |
M. Balashankar, K. Sowmya | ||
Vol 7, No 7 (2015) | Flexible Authentication with User Revocation for DAC in Cloud | Abstract |
G. Keerthi, Golda Selia | ||
Vol 11, No 5 (2019) | Fog Computing: Common Security Issues and Proposed Countermeasure for Intrusion due to Password Theft | Abstract |
Riyaz Ahmad Shah, Danish Khan Khan | ||
Vol 5, No 2 (2013) | FPGA Implementation of Multi Layer Perceptron Neural Network for Signal Processing | Abstract |
A. Thilagavathy, K. Vijaya Kanth | ||
Vol 6, No 8 (2014) | Framework to Monitor Big Data Processing in the Cloud | Abstract |
R. Vijaya Arjunan, Nagapandu Potti | ||
Vol 12, No 1 (2020) | Fraud Find: Cash Related Intimidation Acknowledgment Inevitably Tom’s Investigating Progressing Down Human Direct | Abstract |
M. Divya, P. Suganya | ||
Vol 1, No 4 (2009) | Frequency Domain Equalization for Single Carrier Wireless Systems | Abstract |
M. Lakshmanan, V. Noor Mohammed, S. Nandakumar | ||
Vol 4, No 6 (2012) | Fuzzy-Ant Based Dynamic Routing on Large Road Networks | Abstract |
M. Geetha, G. M. Kadhar Nawaz | ||
451 - 475 of 922 Items | First Previous 14 15 16 17 18 19 20 21 22 23 Next Last |
Browse Title Index
Scroll