Issue | Title | |
Vol 10, No 2 (2023) | Spectrum Management in 6G HetNet Based on Smart Contracts and Harmonized Software-Defined Networking-Enabled Approach | Abstract PDF |
S. Markkandan, P. Santhosh Kumar, Prathipa R, K. Vengatesan, Garikapati Bindu | ||
Vol 11, No 2 (2024) | Strategies for Achieving Energy Efficiency and Data Security Through Data Aggregation in IoT Healthcare Applications: A Comprehensive Study | Abstract PDF |
Ganesh Srinivasa Shetty, Raghu. N | ||
Vol 7, No 4 (2020) | Support Vector Regressive Dragonfly Optimized Shift Invariant Deep Neural Learning Based Handover for Seamless Data Delivery in Heterogeneous Network | Abstract PDF |
D. Somashekhara Reddy, C. Chandrasekhar | ||
Vol 9, No 5 (2022) | Survey and testing of the IoT Cybersecurity Framework Using Intrusion Detection Systems | Abstract PDF |
Carmen Beatriz Espinosa Garrido, Sandra Sendra Compte, Luis Rosales Roldan, Alejandra Aldrette Malacara | ||
Vol 3, No 3 (2016) | TabSecure: An Anti-Phishing Solution with Protection against Tabnabbing | Abstract PDF |
Priyanka Joshi, Madhumita Chatterjee | ||
Vol 2, No 3 (2015) | Task scheduling in Cloud Using Hybrid Cuckoo Algorithm | Abstract PDF |
Sumandeep Aujla, Amandeep Ummat | ||
Vol 10, No 4 (2023) | Taxonomy of Various Routing Protocols of IoT-Based on Wireless Sensor Networks for Healthcare: Review | Abstract PDF |
Monika Pahuja, Dinesh Kumar | ||
Vol 7, No 4 (2020) | Taylor Based Grey Wolf Optimization Algorithm (TGWOA) For Energy Aware Secure Routing Protocol | Abstract PDF |
Robbi Rahim, S. Murugan, S. Priya, S. Magesh, R. Manikandan | ||
Vol 10, No 4 (2023) | TCP Performance Enhancement in IoT and MANET: A Systematic Literature Review | Abstract PDF |
Sultana Parween, Syed Zeeshan Hussain | ||
Vol 5, No 6 (2018) | Textual Data Hiding in Digital Images Using Chaotic Maps | Abstract PDF |
Vipul Sharma, Roohie Naaz Mir | ||
Vol 8, No 5 (2021) | The Impact of Mobility Models on Geographic Routing in Multi-Hop Wireless Networks and Extensions – A Survey | Abstract PDF |
T. Sakthivel, Allam Balaram | ||
Vol 2, No 2 (2015) | The Influence of Smart Phones on Human Health and Behavior: Jordanians' Perceptions | Abstract PDF |
Emad Abu-Shanab, Eman Haddad | ||
Vol 2, No 4 (2015) | The Provision of Information Technology Security Considerations by Legal Prescripts: South African Case | Abstract PDF |
Ntjatji Gosebo, Sipho Seepe | ||
Vol 3, No 2 (2016) | Throughput and Delay Analysis of AODV, DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks | Abstract PDF |
Saima Zafar, Hina Tariq, Kanza Manzoor | ||
Vol 8, No 4 (2021) | Throughput Optimization - Based Gateways Placement Methods in Wireless Networks | Abstract PDF |
Suvarna Patil, Prasad Gokhale | ||
Vol 2, No 6 (2015) | Time Based Fault Detection and Isolation in Wireless Sensors Network | Abstract PDF |
Imane Merzougui, Youssef Benabbassi | ||
Vol 9, No 5 (2022) | Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT) | Abstract PDF |
R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran | ||
Vol 10, No 1 (2023) | Towards Blockchain-Based Secure IoT Communication for 5G Enabled Intelligent Transportation System | Abstract PDF |
Sakthi Kumaresh | ||
Vol 8, No 1 (2021) | Towards Improved Detection of Intrusions with Constraint-Based Clustering (CBC) | Abstract PDF |
J. Rene Beulah, C. Pretty Diana Cyril, S. Geetha, D. Shiny Irene | ||
Vol 11, No 1 (2024) | TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol | Abstract PDF |
Jayantkumar A. Rathod, Manjunath Kotari | ||
Vol 9, No 6 (2022) | Trust Management Techniques and their Challenges in Cloud Computing: A Review | Abstract PDF |
Pooja Goyal, Sukhvinder Singh Deora | ||
Vol 9, No 3 (2022) | Trust-Based Co-Operative Cross-Layer Routing Protocol for Industrial Wireless Sensor Networks | Abstract PDF |
Manish Panchal, Raksha Upadhyay, Prakash Vyavahare | ||
Vol 8, No 4 (2021) | Trust-Based Energy Efficient Secure Multipath Routing in MANET Using LF-SSO and SH2E | Abstract PDF |
Valanto Alappatt, Joe Prathap P. M. | ||
Vol 6, No 5 (2019) | Two-Level Grid Access Control Model Based on Resource Performance and Request Priority | Abstract PDF |
Sarra Namane, Nacira Ghoualmi | ||
Vol 3, No 6 (2016) | Usage of Machine Learning for Intrusion Detection in a Network | Abstract PDF |
Prachi | ||
301 - 325 of 333 Items | First Previous 8 9 10 11 12 13 14 Next Last |
Browse Title Index
Scroll