Browse Title Index


 
Issue Title
 
Vol 2, No 6 (2015) Time Based Fault Detection and Isolation in Wireless Sensors Network Abstract   PDF
Imane Merzougui, Youssef Benabbassi
 
Vol 9, No 5 (2022) Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT) Abstract   PDF
R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran
 
Vol 10, No 1 (2023) Towards Blockchain-Based Secure IoT Communication for 5G Enabled Intelligent Transportation System Abstract   PDF
Sakthi Kumaresh
 
Vol 8, No 1 (2021) Towards Improved Detection of Intrusions with Constraint-Based Clustering (CBC) Abstract   PDF
J. Rene Beulah, C. Pretty Diana Cyril, S. Geetha, D. Shiny Irene
 
Vol 11, No 1 (2024) TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol Abstract   PDF
Jayantkumar A. Rathod, Manjunath Kotari
 
Vol 9, No 6 (2022) Trust Management Techniques and their Challenges in Cloud Computing: A Review Abstract   PDF
Pooja Goyal, Sukhvinder Singh Deora
 
Vol 9, No 3 (2022) Trust-Based Co-Operative Cross-Layer Routing Protocol for Industrial Wireless Sensor Networks Abstract   PDF
Manish Panchal, Raksha Upadhyay, Prakash Vyavahare
 
Vol 8, No 4 (2021) Trust-Based Energy Efficient Secure Multipath Routing in MANET Using LF-SSO and SH2E Abstract   PDF
Valanto Alappatt, Joe Prathap P. M.
 
Vol 6, No 5 (2019) Two-Level Grid Access Control Model Based on Resource Performance and Request Priority Abstract   PDF
Sarra Namane, Nacira Ghoualmi
 
Vol 3, No 6 (2016) Usage of Machine Learning for Intrusion Detection in a Network Abstract   PDF
Prachi
 
Vol 11, No 1 (2024) Vehicular Ad Hoc Networks Assisted Clustering Nodular Framework for Optimal Packet Routing and Scaling Abstract   PDF
V. M. Niaz Ahamed, K. Sivaraman
 
Vol 5, No 4 (2018) Virtualization and IoT Resource Management:A Survey Abstract   PDF
Saniya Zahoor, Roohie Naaz Mir
 
Vol 7, No 1 (2020) Vulnerability Exploitations Using Steganography in PDF Files Abstract   PDF
Istteffanny Isloure Araujo, Hassan Kazemian
 
Vol 8, No 4 (2021) Whale Optimization Routing Protocol for Minimizing Energy Consumption in Cognitive Radio Wireless Sensor Network Abstract   PDF
J. Ramkumar, R. Vadivel
 
Vol 5, No 4 (2018) Wireless Sensor Network Surveillance on Forest Illegal Mining using ‘Planned Behaviour Abortion Tower’:Analytical Modelling Abstract   PDF
Eric Opoku Osei, James B. Hayfron-Acquah, Michael Asante
 
Vol 2, No 6 (2015) Wireless Sensor Network-Based Health Monitoring System for the Elderly and Disabled Abstract   PDF
Gurkan Tuna, Resul Das, Ayse Tuna
 
Vol 8, No 4 (2021) Wormhole Detection Using Encrypted Node IDs and Hop Counts in the Event Report of Statistical En-Route Filtering Abstract   PDF
Ga-Hyeon An, Tae-Ho Cho
 
Vol 6, No 3 (2019) ZBLE:Zone Based Leader Election Energy Constrained AOMDV Routing Protocol Abstract   PDF
Rani Sahu, Sanjay Sharma, M. A. Rizvi
 
326 - 343 of 343 Items First Previous 9 10 11 12 13 14