Browse Title Index


 
Journal Issue Title
 
Automation and Autonomous Systems Vol 5, No 4 (2013) Securing Android Application with Anti- Reversing Techniques Abstract
Sudipta Ghosh, Kamlesh Lahre, S. R. Tandan
 
Networking and Communication Engineering Vol 7, No 4 (2015) Securing API Using API Gateway Abstract
Arpita Gangrade, Bhawna Nigam
 
International Journal of Advanced Networking and Applications Vol 6, No 2 (2014) Securing Cloud from Cloud Drain Abstract   PDF
Niva Das, Tanmoy Sarkar
 
ICTACT Journal on Communication Technology Vol 15, No 1 (2024) Securing Cyberspace against Cyberbullying: A Wireless Network Security Perspective Abstract
Neerav Nishant, Parul Saxena, S.G. Surya, Ullal Akshatha Nayak, Subharun Pal
 
International Journal of Computer Networks and Applications Vol 11, No 4 (2024) Securing Data Communication in the Cloud Using Machine Learning-Based Blockchain Approach Abstract
Shanmugapriya Velmurugan, Amalraj Irudayasamy, Natesh Mahadev, Rajesh Natarajan, Sujatha Krishna
 
Data Mining and Knowledge Engineering Vol 7, No 6 (2015) Securing Data in Cloud Using Ring Signature Abstract
C. K. Sangeetha, Golda Dilip
 
National Journal of System and Information Technology Vol 3, No 1 (2010) Securing Datawarehouse Using Multidimensional Modeling with Virtual Private Database Abstract
Veena N. Jokhakar, S.V. Patel
 
Networking and Communication Engineering Vol 8, No 5 (2016) Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography Abstract
K. Saranya, P. Kavitha
 
Networking and Communication Engineering Vol 5, No 4 (2013) Securing Information Using Cryptography and Steganography Technique Abstract
V. Hemanth, Mahammad Shareef
 
Networking and Communication Engineering Vol 4, No 2 (2012) Securing IP Address to Control IP Spoofing Abstract
Rainey C. Lal, Mridu Sahu
 
ICTACT Journal on Communication Technology Vol 14, No 4 (2023) Securing It Networking Environment in Cran Using Dehaene–changeux Model Driven Moth-flame Optimization Abstract
Rahul Laxmanrao Paikrao, Prashant Laxmanrao Paikrao
 
Biometrics and Bioinformatics Vol 7, No 6 (2015) Securing IWR in Cloud Using Various Trait Based Encryption Methods Abstract
F. Antony Xavier Bronson, S. P. Rajagopalan
 
ICTACT Journal on Communication Technology Vol 15, No 1 (2024) Securing Mobile Ad-Hoc Networks Using Robust Secured IPS Routing Approach through Attack Identification and Elimination in MANETs Abstract
Punitha Murugesan, Callins Christiyana Chelladurai, Priyadharsini Kuluchamy, Umesh Rajendran
 
International Journal of Advanced Networking and Applications Vol 7, No 6 (2016) Securing Mobile Data using Cryptography Abstract   PDF
Shikhar Bhagoliwal, Jyotirmoy Karjee
 
Biometrics and Bioinformatics Vol 3, No 3 (2011) Securing Multi-Application Smart Cards with Remote User Authentication and Biometric Identification in Banking Solutions Abstract
M. Latha Karthigaa, R. S. Milton
 
International Journal of Advanced Networking and Applications Vol 4, No 2 (2012) Securing Oracle Database from Search Engines Attack Abstract   PDF
N. M. A. Ayad, H. M. Klash, S. Sorour
 
International Journal of Computer Networks and Applications Vol 8, No 5 (2021) Securing Service Discovery from Denial of Service Attack in Mobile Ad Hoc Network (MANET) Abstract   PDF
Smitha Kurian, Loganathan Ramasamy
 
Wireless Communication Vol 8, No 5 (2016) Securing Smart Grid Communication against False Data Injection Attacks Abstract
A. Anandhi, Dr. G. Kalpana
 
Software Engineering Vol 3, No 5 (2011) Securing the Database Using SAAS Approach for Banking Application Abstract
T. Mythili, V. Venkatesakumar
 
Current Science Vol 119, No 5 (2020) Securing the Livelihood of Small and Marginal Farmers by Diversifying Farming Systems Abstract   PDF
Bussa Bhargavi, Umakanta Behera
 
Networking and Communication Engineering Vol 1, No 4 (2009) Securing Web Services through WS-Security in SOAP Protocol Abstract
N. Sasikala Devi, L. Arockiam
 
ICTACT Journal on Communication Technology Vol 14, No 3 (2023) Securing Wireless Communication Using Novel Transfer Learning for Encryption in Wireless Networks Abstract
Jayaganesh Jagannathan, S. G. Prasanna Kumara, T. Lakshmi Narayana, Mohammad Shabbir Alam
 
Fuzzy Systems Vol 4, No 4 (2012) Securing Wireless Sensor Networks Using Cryptographic Functions Abstract
Arunlal Nadar, S. Janani
 
ICTACT Journal on Communication Technology Vol 14, No 2 (2023) Securing Wireless Sensor Networks Using Deep Learning-Based Approach for Eliminating Data Modification in Sensor Nodes Abstract
S. Karthigai, Sushiladevi B. Vantamuri, C. Anupriya, Vinod Sesai, A. Nicholas Daniel
 
Networking and Communication Engineering Vol 1, No 4 (2009) Securing WLAN Using Reconfigurable YAGI Antenna Abstract
P. Muthu Kannan, V. Palanisamy, R. Swaminathan
 
89276 - 89300 of 110868 Items First Previous 3567 3568 3569 3570 3571 3572 3573 3574 3575 3576 Next Last