Table of Contents
Vol 6, No 2 (2014)
Articles
Application Layer Intrusion Detection with Combination of Explicit-rule-based and Machine Learning Algorithms and Deployment in Cyber-Defence Program | ||
Amal Saha, Sugata Sanyal | ||
Vol 6, No 2 (2014), Pagination: 2202-2208 | ||
ABSTRACT | PDF | Abstract Views: 170 | PDF Views: 0 |
Investigation and Application of Personalizing Recommender Systems based on ALIDATA DISCOVERY | ||
Tang Zhi-Hang | ||
Vol 6, No 2 (2014), Pagination: 2209-2213 | ||
ABSTRACT | PDF | Abstract Views: 152 | PDF Views: 0 |
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms and Messenger Environments | ||
Jatinderkumar R. Saini | ||
Vol 6, No 2 (2014), Pagination: 2214-2221 | ||
ABSTRACT | PDF | Abstract Views: 156 | PDF Views: 0 |
Applying Content-Based Image Retrieval Techniques to Provide New Services for Tourism Industry | ||
Zobeir Raisi, Farahnaz Mohanna, Mehdi Rezaei | ||
Vol 6, No 2 (2014), Pagination: 2222-2232 | ||
ABSTRACT | PDF | Abstract Views: 162 | PDF Views: 0 |
Software Defined Networking: A Concept and Related Issues | ||
Deepak Kumar, Manu Sood | ||
Vol 6, No 2 (2014), Pagination: 2233-2239 | ||
ABSTRACT | PDF | Abstract Views: 155 | PDF Views: 2 |
Security Issues in Cloud Computing - A Review | ||
Irfan Hussain, Imran Ashraf | ||
Vol 6, No 2 (2014), Pagination: 2240-2243 | ||
ABSTRACT | PDF | Abstract Views: 169 | PDF Views: 0 |
A Novel Technique in Software Engineering for Building Scalable Large Parallel Software: Demonstration on Dynamical Core of Varsha - A Global Circulation Model Software | ||
T. Venkatesh, U. N. Sinha | ||
Vol 6, No 2 (2014), Pagination: 2244-2252 | ||
ABSTRACT | PDF | Abstract Views: 179 | PDF Views: 0 |
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks | ||
P. V. Siva Kumar, Rajasekhara Rao Kurra, Appala Naidu Tentu, G. Padmavathi | ||
Vol 6, No 2 (2014), Pagination: 2253-2261 | ||
ABSTRACT | PDF | Abstract Views: 163 | PDF Views: 4 |
Securing Cloud from Cloud Drain | ||
Niva Das, Tanmoy Sarkar | ||
Vol 6, No 2 (2014), Pagination: 2262-2265 | ||
ABSTRACT | PDF | Abstract Views: 158 | PDF Views: 0 |
Survey on Host and Network Based Intrusion Detection System | ||
Niva Das, Tanmoy Sarkar | ||
Vol 6, No 2 (2014), Pagination: 2266-2269 | ||
ABSTRACT | PDF | Abstract Views: 173 | PDF Views: 0 |
The Management of Information Systems and its Impact on the Quality of Services (From the Perspective of Students: A Case Study) | ||
Hiyam S. Ensour, Tareg M. Lafi Alinizi | ||
Vol 6, No 2 (2014), Pagination: 2270-2284 | ||
ABSTRACT | PDF | Abstract Views: 164 | PDF Views: 1 |
Analysis of Applicability of ISO 9564 Pin Based Authentication to Closed-Loop Mobile Payment Systems | ||
Amal Saha, Sugata Sanyal | ||
Vol 6, No 2 (2014), Pagination: 2285-2290 | ||
ABSTRACT | PDF | Abstract Views: 155 | PDF Views: 5 |