Browse Title Index


 
Issue Title
 
Vol 10, No 2 (2023) Spectrum Management in 6G HetNet Based on Smart Contracts and Harmonized Software-Defined Networking-Enabled Approach Abstract   PDF
S. Markkandan, P. Santhosh Kumar, Prathipa R, K. Vengatesan, Garikapati Bindu
 
Vol 11, No 2 (2024) Strategies for Achieving Energy Efficiency and Data Security Through Data Aggregation in IoT Healthcare Applications: A Comprehensive Study Abstract   PDF
Ganesh Srinivasa Shetty, Raghu. N
 
Vol 7, No 4 (2020) Support Vector Regressive Dragonfly Optimized Shift Invariant Deep Neural Learning Based Handover for Seamless Data Delivery in Heterogeneous Network Abstract   PDF
D. Somashekhara Reddy, C. Chandrasekhar
 
Vol 9, No 5 (2022) Survey and testing of the IoT Cybersecurity Framework Using Intrusion Detection Systems Abstract   PDF
Carmen Beatriz Espinosa Garrido, Sandra Sendra Compte, Luis Rosales Roldan, Alejandra Aldrette Malacara
 
Vol 3, No 3 (2016) TabSecure: An Anti-Phishing Solution with Protection against Tabnabbing Abstract   PDF
Priyanka Joshi, Madhumita Chatterjee
 
Vol 2, No 3 (2015) Task scheduling in Cloud Using Hybrid Cuckoo Algorithm Abstract   PDF
Sumandeep Aujla, Amandeep Ummat
 
Vol 10, No 4 (2023) Taxonomy of Various Routing Protocols of IoT-Based on Wireless Sensor Networks for Healthcare: Review Abstract   PDF
Monika Pahuja, Dinesh Kumar
 
Vol 7, No 4 (2020) Taylor Based Grey Wolf Optimization Algorithm (TGWOA) For Energy Aware Secure Routing Protocol Abstract   PDF
Robbi Rahim, S. Murugan, S. Priya, S. Magesh, R. Manikandan
 
Vol 10, No 4 (2023) TCP Performance Enhancement in IoT and MANET: A Systematic Literature Review Abstract   PDF
Sultana Parween, Syed Zeeshan Hussain
 
Vol 5, No 6 (2018) Textual Data Hiding in Digital Images Using Chaotic Maps Abstract   PDF
Vipul Sharma, Roohie Naaz Mir
 
Vol 8, No 5 (2021) The Impact of Mobility Models on Geographic Routing in Multi-Hop Wireless Networks and Extensions – A Survey Abstract   PDF
T. Sakthivel, Allam Balaram
 
Vol 2, No 2 (2015) The Influence of Smart Phones on Human Health and Behavior: Jordanians' Perceptions Abstract   PDF
Emad Abu-Shanab, Eman Haddad
 
Vol 2, No 4 (2015) The Provision of Information Technology Security Considerations by Legal Prescripts: South African Case Abstract   PDF
Ntjatji Gosebo, Sipho Seepe
 
Vol 3, No 2 (2016) Throughput and Delay Analysis of AODV, DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks Abstract   PDF
Saima Zafar, Hina Tariq, Kanza Manzoor
 
Vol 8, No 4 (2021) Throughput Optimization - Based Gateways Placement Methods in Wireless Networks Abstract   PDF
Suvarna Patil, Prasad Gokhale
 
Vol 2, No 6 (2015) Time Based Fault Detection and Isolation in Wireless Sensors Network Abstract   PDF
Imane Merzougui, Youssef Benabbassi
 
Vol 9, No 5 (2022) Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT) Abstract   PDF
R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran
 
Vol 10, No 1 (2023) Towards Blockchain-Based Secure IoT Communication for 5G Enabled Intelligent Transportation System Abstract   PDF
Sakthi Kumaresh
 
Vol 8, No 1 (2021) Towards Improved Detection of Intrusions with Constraint-Based Clustering (CBC) Abstract   PDF
J. Rene Beulah, C. Pretty Diana Cyril, S. Geetha, D. Shiny Irene
 
Vol 11, No 1 (2024) TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol Abstract   PDF
Jayantkumar A. Rathod, Manjunath Kotari
 
Vol 9, No 6 (2022) Trust Management Techniques and their Challenges in Cloud Computing: A Review Abstract   PDF
Pooja Goyal, Sukhvinder Singh Deora
 
Vol 9, No 3 (2022) Trust-Based Co-Operative Cross-Layer Routing Protocol for Industrial Wireless Sensor Networks Abstract   PDF
Manish Panchal, Raksha Upadhyay, Prakash Vyavahare
 
Vol 8, No 4 (2021) Trust-Based Energy Efficient Secure Multipath Routing in MANET Using LF-SSO and SH2E Abstract   PDF
Valanto Alappatt, Joe Prathap P. M.
 
Vol 6, No 5 (2019) Two-Level Grid Access Control Model Based on Resource Performance and Request Priority Abstract   PDF
Sarra Namane, Nacira Ghoualmi
 
Vol 3, No 6 (2016) Usage of Machine Learning for Intrusion Detection in a Network Abstract   PDF
Prachi
 
301 - 325 of 333 Items First Previous 8 9 10 11 12 13 14 Next Last