Issue | Title | |
Vol 9, No 6 (2022) | A Novel Agent-Based Multipath Routing Protocol to Extend Lifetime and Enhancing Reliability of Clustered Wireless Sensor Networks | Abstract PDF |
Binaya Kumar Patra, Sarojananda Mishra, Sanjay Kumar Patra | ||
Vol 9, No 1 (2022) | A Novel Algorithm for Secured Data Sharing in Cloud using GWOA-DNA Cryptography | Abstract PDF |
Mercy Joseph, Gobi Mohan | ||
Vol 10, No 4 (2023) | A Novel All Members Group Search Optimization Based Data Acquisition in Cloud Assisted Wireless Sensor Network for Smart Farming | Abstract PDF |
Vuppala Sukanya, Ramachandram S | ||
Vol 4, No 4 (2017) | A Novel Application Based Generic Cluster Creation Mechanism in Ad Hoc Networks | Abstract PDF |
S. Thirumurugan, Jasmine Beulah Gnanadurai | ||
Vol 3, No 4 (2016) | A Novel Approach for Data Privacy Using Attribute Based Scheme Algorithm for Cloud Computing | Abstract PDF |
A. Nithya, B. Ramakrishnan, Resul Das | ||
Vol 2, No 1 (2015) | A Novel Design of Instant Messaging Service Extended from Short Message Service with XMPP | Abstract PDF |
Heng-Te Chu, Lili Hsieh, Wen-Shiung Chen | ||
Vol 9, No 4 (2022) | A Novel Distributed Token-Based Access Control Algorithm Using A Secret Sharing Scheme for Secure Data Access Control | Abstract PDF |
Jansi Rani Amalraj, Robert Lourdusamy | ||
Vol 10, No 5 (2023) | A Novel Dynamic Link Prediction Protocol for Frequent Link Disconnections in Vehicular Ad Hoc Networks | Abstract PDF |
H. Ateeq Ahmed, Dhanaraj Cheelu | ||
Vol 11, No 2 (2024) | A Novel Dynamic Message Time Synchronization Protocol for Real Time Data Exchange in Vehicular Ad Hoc Networks | Abstract PDF |
H. Ateeq Ahmed, Dhanaraj Cheelu | ||
Vol 3, No 2 (2016) | A Novel Efficient Rebroadcast Protocol for Minimizing Routing Overhead in Mobile Ad-Hoc Networks | Abstract PDF |
Priyaganga Guruswamy, Madhumita Chatterjee | ||
Vol 7, No 6 (2020) | A Novel Fragmentation Scheme for Textual Data Using Similarity-Based Threshold Segmentation Method in Distributed Network Environment | Abstract PDF |
Sashi Tarun, Ranbir Singh Batth, Sukhpreet Kaur | ||
Vol 8, No 5 (2021) | A Novel Golden Eagle Optimizer Based Trusted Ad Hoc On-Demand Distance Vector (GEO-TAODV) Routing Protocol | Abstract PDF |
Sachidanand S. Joshi, Sangappa Ramachandra Biradar | ||
Vol 4, No 2 (2017) | A Novel Hybrid Approach for Detection of Web-Based Attacks in Intrusion Detection Systems | Abstract PDF |
Muhammet Baykara, Resul Das | ||
Vol 3, No 4 (2016) | A Novel Routing Scheme to Avoid Link Error and Packet Dropping in Wireless Sensor Networks | Abstract PDF |
M. Kavitha, B. Ramakrishnan, Resul Das | ||
Vol 8, No 5 (2021) | A Novel Technique for Blackhole Discernment Employing Big Data Analytics in IoT Networks | Abstract PDF |
Gauri Mathur, Wiqas Ghai | ||
Vol 8, No 4 (2021) | A Novel Three Layer Filtering (3L-F) Framework for Prevention of DDoS Attack in Cloud Environment | Abstract PDF |
A. Somasundaram, V. S. Meenakshi | ||
Vol 9, No 6 (2022) | A Novel Trust Negotiation Protocol for Analysing and Approving IoT Edge Computing Devices Using Machine Learning Algorithm | Abstract PDF |
V. Maruthi Prasad, B. Bharathi | ||
Vol 11, No 3 (2024) | A Power-Aware River Formation Dynamics Routing Algorithm for Enhanced Longevity in MANETs | Abstract |
Augustina Dede Agor, Michael Asante, James Benjamin Hayfron-Acquah, James Tetteh Ami-Narh, Lawrence Kwami Aziale, Kwame Ofosuhene Peasah | ||
Vol 2, No 2 (2015) | A Probabilistic Key Management Protocol based on Kryptograph for WSN | Abstract PDF |
Prachi | ||
Vol 9, No 1 (2022) | A Review of Chronological Development in Group and Hierarchical Key management Schemes in Access Control Model: Challenges and Solutions | Abstract PDF |
Smita Athanere, Ramesh Thakur | ||
Vol 6, No 5 (2019) | A Review of Static Malware Detection for Android Apps Permission Based on Deep Learning | Abstract PDF |
Hamida Lubuva, Qiming Huang, Godfrey Charles Msonde | ||
Vol 9, No 1 (2022) | A Review on Intrusion Detection Systems to Secure IoT Networks | Abstract PDF |
A. Arul Anitha, L. Arockiam | ||
Vol 3, No 3 (2016) | A Robust Hybrid Steganography Mechanism for Security in Data Communication Networks | Abstract PDF |
Neha Tayal, Sangeeta Dhall, Shailender Gupta | ||
Vol 8, No 5 (2021) | A Secure and Reliable Handoff Authentication Protocol with Batch Verification for Internet of Things Environment | Abstract PDF |
Ramandeep Kaur, Sumit Mittal | ||
Vol 9, No 3 (2022) | A Secure Image Encryption and Embedding Approach using MRSA and RC6 with DCT Transformation | Abstract PDF |
M. Ganavi, S. Prabhudeva, Sankhya N. Nayak | ||
26 - 50 of 353 Items | First Previous 1 2 3 4 5 6 7 8 9 10 Next Last |
Browse Title Index
Scroll