Issue | Title | |
Vol 8, No 5 (2021) | Securing Service Discovery from Denial of Service Attack in Mobile Ad Hoc Network (MANET) | Abstract PDF |
Smitha Kurian, Loganathan Ramasamy | ||
Vol 2, No 4 (2015) | Security and Fraud Issues of E-Banking | Abstract PDF |
Emad Abu-Shanab, Salam Matalqa | ||
Vol 9, No 1 (2022) | Security Challenges and Related Solutions in Software Defined Networks: A Survey | Abstract PDF |
Konda Srikar Goud, Srinivasa Rao Gidituri | ||
Vol 2, No 2 (2015) | Security Concerns at Various Levels of Cloud Computing Paradigm: A Review | Abstract PDF |
Aarti Singh, Manisha Malhotra | ||
Vol 2, No 2 (2015) | Security Enhancement in Shoulder Surfing Attacks using Passpoints for Random Similar Images (PRSIm) | Abstract PDF |
A. Meiappane, V. Prasanna Venkataesan, V. Premanand | ||
Vol 10, No 1 (2023) | Security Model to Mitigate Black Hole Attack on Internet of Battlefield Things (IoBT) Using Trust and K-Means Clustering Algorithm | Abstract PDF |
P. Rutravigneshwaran, G. Anitha | ||
Vol 3, No 5 (2016) | Self-Correcting Localization Scheme for Vehicle to Vehicle Communication | Abstract PDF |
Salah Abdel Mageid | ||
Vol 11, No 3 (2024) | SOAVMP: Multi-Objective Virtual Machine Placement in Cloud Computing Based on the Seagull Optimization Algorithm | Abstract |
Aristide Ndayikengurukiye, Rim Doukha, Eric Niyukuri, Eric Muheto, Abderrahmane Ez-zahout, Fouzia Omary | ||
Vol 9, No 4 (2022) | Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks | Abstract PDF |
M. Gobi | ||
Vol 8, No 4 (2021) | Source Location Privacy for Geographical Routing in Wireless Sensor Networks: SLPGR | Abstract PDF |
Manjunath D R, Anil Kumar B | ||
Vol 10, No 2 (2023) | Spectrum Management in 6G HetNet Based on Smart Contracts and Harmonized Software-Defined Networking-Enabled Approach | Abstract PDF |
S. Markkandan, P. Santhosh Kumar, Prathipa R, K. Vengatesan, Garikapati Bindu | ||
Vol 11, No 2 (2024) | Strategies for Achieving Energy Efficiency and Data Security Through Data Aggregation in IoT Healthcare Applications: A Comprehensive Study | Abstract PDF |
Ganesh Srinivasa Shetty, Raghu. N | ||
Vol 7, No 4 (2020) | Support Vector Regressive Dragonfly Optimized Shift Invariant Deep Neural Learning Based Handover for Seamless Data Delivery in Heterogeneous Network | Abstract PDF |
D. Somashekhara Reddy, C. Chandrasekhar | ||
Vol 9, No 5 (2022) | Survey and testing of the IoT Cybersecurity Framework Using Intrusion Detection Systems | Abstract PDF |
Carmen Beatriz Espinosa Garrido, Sandra Sendra Compte, Luis Rosales Roldan, Alejandra Aldrette Malacara | ||
Vol 3, No 3 (2016) | TabSecure: An Anti-Phishing Solution with Protection against Tabnabbing | Abstract PDF |
Priyanka Joshi, Madhumita Chatterjee | ||
Vol 2, No 3 (2015) | Task scheduling in Cloud Using Hybrid Cuckoo Algorithm | Abstract PDF |
Sumandeep Aujla, Amandeep Ummat | ||
Vol 10, No 4 (2023) | Taxonomy of Various Routing Protocols of IoT-Based on Wireless Sensor Networks for Healthcare: Review | Abstract PDF |
Monika Pahuja, Dinesh Kumar | ||
Vol 7, No 4 (2020) | Taylor Based Grey Wolf Optimization Algorithm (TGWOA) For Energy Aware Secure Routing Protocol | Abstract PDF |
Robbi Rahim, S. Murugan, S. Priya, S. Magesh, R. Manikandan | ||
Vol 10, No 4 (2023) | TCP Performance Enhancement in IoT and MANET: A Systematic Literature Review | Abstract PDF |
Sultana Parween, Syed Zeeshan Hussain | ||
Vol 5, No 6 (2018) | Textual Data Hiding in Digital Images Using Chaotic Maps | Abstract PDF |
Vipul Sharma, Roohie Naaz Mir | ||
Vol 8, No 5 (2021) | The Impact of Mobility Models on Geographic Routing in Multi-Hop Wireless Networks and Extensions – A Survey | Abstract PDF |
T. Sakthivel, Allam Balaram | ||
Vol 2, No 2 (2015) | The Influence of Smart Phones on Human Health and Behavior: Jordanians' Perceptions | Abstract PDF |
Emad Abu-Shanab, Eman Haddad | ||
Vol 2, No 4 (2015) | The Provision of Information Technology Security Considerations by Legal Prescripts: South African Case | Abstract PDF |
Ntjatji Gosebo, Sipho Seepe | ||
Vol 3, No 2 (2016) | Throughput and Delay Analysis of AODV, DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks | Abstract PDF |
Saima Zafar, Hina Tariq, Kanza Manzoor | ||
Vol 8, No 4 (2021) | Throughput Optimization - Based Gateways Placement Methods in Wireless Networks | Abstract PDF |
Suvarna Patil, Prasad Gokhale | ||
301 - 325 of 343 Items | First Previous 8 9 10 11 12 13 14 Next Last |
Browse Title Index
Scroll