Journal | Issue | Title | |
Automation and Autonomous Systems | Vol 5, No 4 (2013) | Securing Android Application with Anti- Reversing Techniques | Abstract |
Sudipta Ghosh, Kamlesh Lahre, S. R. Tandan | |||
Networking and Communication Engineering | Vol 7, No 4 (2015) | Securing API Using API Gateway | Abstract |
Arpita Gangrade, Bhawna Nigam | |||
International Journal of Advanced Networking and Applications | Vol 6, No 2 (2014) | Securing Cloud from Cloud Drain | Abstract PDF |
Niva Das, Tanmoy Sarkar | |||
ICTACT Journal on Communication Technology | Vol 15, No 1 (2024) | Securing Cyberspace against Cyberbullying: A Wireless Network Security Perspective | Abstract |
Neerav Nishant, Parul Saxena, S.G. Surya, Ullal Akshatha Nayak, Subharun Pal | |||
International Journal of Computer Networks and Applications | Vol 11, No 4 (2024) | Securing Data Communication in the Cloud Using Machine Learning-Based Blockchain Approach | Abstract |
Shanmugapriya Velmurugan, Amalraj Irudayasamy, Natesh Mahadev, Rajesh Natarajan, Sujatha Krishna | |||
Data Mining and Knowledge Engineering | Vol 7, No 6 (2015) | Securing Data in Cloud Using Ring Signature | Abstract |
C. K. Sangeetha, Golda Dilip | |||
National Journal of System and Information Technology | Vol 3, No 1 (2010) | Securing Datawarehouse Using Multidimensional Modeling with Virtual Private Database | Abstract |
Veena N. Jokhakar, S.V. Patel | |||
Networking and Communication Engineering | Vol 8, No 5 (2016) | Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography | Abstract |
K. Saranya, P. Kavitha | |||
Networking and Communication Engineering | Vol 5, No 4 (2013) | Securing Information Using Cryptography and Steganography Technique | Abstract |
V. Hemanth, Mahammad Shareef | |||
Networking and Communication Engineering | Vol 4, No 2 (2012) | Securing IP Address to Control IP Spoofing | Abstract |
Rainey C. Lal, Mridu Sahu | |||
ICTACT Journal on Communication Technology | Vol 14, No 4 (2023) | Securing It Networking Environment in Cran Using Dehaene–changeux Model Driven Moth-flame Optimization | Abstract |
Rahul Laxmanrao Paikrao, Prashant Laxmanrao Paikrao | |||
Biometrics and Bioinformatics | Vol 7, No 6 (2015) | Securing IWR in Cloud Using Various Trait Based Encryption Methods | Abstract |
F. Antony Xavier Bronson, S. P. Rajagopalan | |||
ICTACT Journal on Communication Technology | Vol 15, No 1 (2024) | Securing Mobile Ad-Hoc Networks Using Robust Secured IPS Routing Approach through Attack Identification and Elimination in MANETs | Abstract |
Punitha Murugesan, Callins Christiyana Chelladurai, Priyadharsini Kuluchamy, Umesh Rajendran | |||
International Journal of Advanced Networking and Applications | Vol 7, No 6 (2016) | Securing Mobile Data using Cryptography | Abstract PDF |
Shikhar Bhagoliwal, Jyotirmoy Karjee | |||
Biometrics and Bioinformatics | Vol 3, No 3 (2011) | Securing Multi-Application Smart Cards with Remote User Authentication and Biometric Identification in Banking Solutions | Abstract |
M. Latha Karthigaa, R. S. Milton | |||
International Journal of Advanced Networking and Applications | Vol 4, No 2 (2012) | Securing Oracle Database from Search Engines Attack | Abstract PDF |
N. M. A. Ayad, H. M. Klash, S. Sorour | |||
International Journal of Computer Networks and Applications | Vol 8, No 5 (2021) | Securing Service Discovery from Denial of Service Attack in Mobile Ad Hoc Network (MANET) | Abstract PDF |
Smitha Kurian, Loganathan Ramasamy | |||
Wireless Communication | Vol 8, No 5 (2016) | Securing Smart Grid Communication against False Data Injection Attacks | Abstract |
A. Anandhi, Dr. G. Kalpana | |||
Software Engineering | Vol 3, No 5 (2011) | Securing the Database Using SAAS Approach for Banking Application | Abstract |
T. Mythili, V. Venkatesakumar | |||
Current Science | Vol 119, No 5 (2020) | Securing the Livelihood of Small and Marginal Farmers by Diversifying Farming Systems | Abstract PDF |
Bussa Bhargavi, Umakanta Behera | |||
Networking and Communication Engineering | Vol 1, No 4 (2009) | Securing Web Services through WS-Security in SOAP Protocol | Abstract |
N. Sasikala Devi, L. Arockiam | |||
ICTACT Journal on Communication Technology | Vol 14, No 3 (2023) | Securing Wireless Communication Using Novel Transfer Learning for Encryption in Wireless Networks | Abstract |
Jayaganesh Jagannathan, S. G. Prasanna Kumara, T. Lakshmi Narayana, Mohammad Shabbir Alam | |||
Fuzzy Systems | Vol 4, No 4 (2012) | Securing Wireless Sensor Networks Using Cryptographic Functions | Abstract |
Arunlal Nadar, S. Janani | |||
ICTACT Journal on Communication Technology | Vol 14, No 2 (2023) | Securing Wireless Sensor Networks Using Deep Learning-Based Approach for Eliminating Data Modification in Sensor Nodes | Abstract |
S. Karthigai, Sushiladevi B. Vantamuri, C. Anupriya, Vinod Sesai, A. Nicholas Daniel | |||
Networking and Communication Engineering | Vol 1, No 4 (2009) | Securing WLAN Using Reconfigurable YAGI Antenna | Abstract |
P. Muthu Kannan, V. Palanisamy, R. Swaminathan | |||
89276 - 89300 of 110868 Items | First Previous 3567 3568 3569 3570 3571 3572 3573 3574 3575 3576 Next Last |
Browse Title Index
Scroll