Journal | Issue | Title | |
International Journal of Distributed and Cloud Computing | Vol 5, No 2 (2017) | Security Issues in Wireless Sensor Network | Abstract |
Moirangthem Marjit Singh, Nishigandha Dutta | |||
Networking and Communication Engineering | Vol 10, No 10 (2018) | Security Issues in Wireless Sensor Network and Healthcare Related Applications | Abstract |
P. Anushree, N.G. Harish Kumar, S. Sarathambekai | |||
Networking and Communication Engineering | Vol 4, No 5 (2012) | Security Issues Using Multi Clouds | Abstract |
R. Kavitha | |||
Oriental Journal of Computer Science and Technology | Vol 3, No 2 (2010) | Security Management System for Oilfield Based on Embedded Wireless Communications:A Design Approach | Abstract PDF |
Syed Minhaj Ali, Satish V. Reve, Roohi Ali, Sana Iqbal | |||
Oriental Journal of Computer Science and Technology | Vol 7, No 1 (2014) | Security Measures of WSN Networks by Avoiding Message Replay Attacks | Abstract PDF |
Geetanjali Kandhari, Deepak Aggarwal | |||
Asian Journal of Management | Vol 8, No 1 (2017) | Security Measures to Protect Sensitive Customer Data in Cloud Computing | Abstract |
Sunil K. Bedi | |||
Digital Image Processing | Vol 8, No 5 (2016) | Security Mechanism for Image Authentication Based on Pixels Adaption | Abstract |
Dr. B. D. Parameshachari, Dr. Reshma Banu, P. Rashmi, C. R. Rachana, B. Rajesh Rao | |||
International Journal of Distributed and Cloud Computing | Vol 7, No 2 (2019) | Security Mechanism for Twitter Data Using Cassandra in Cloud | Abstract |
Sangeeta Gupta, Nikitha Kumari | |||
International Journal of Science, Engineering and Computer Technology | Vol 4, No 1-2 (2014) | Security Model for Wireless Sensor Networks | Abstract |
Sunil Moun | |||
International Journal of Computer Networks and Applications | Vol 10, No 1 (2023) | Security Model to Mitigate Black Hole Attack on Internet of Battlefield Things (IoBT) Using Trust and K-Means Clustering Algorithm | Abstract PDF |
P. Rutravigneshwaran, G. Anitha | |||
Artificial Intelligent Systems and Machine Learning | Vol 3, No 12 (2011) | Security Monitoring, Breach Alert & Image Capturing System | Abstract |
D. Gopi Krishna | |||
International Journal of Vehicle Structures and Systems | Vol 3, No 2 (2011) | Security of Bolted Joints during Explosive Loading | Abstract |
Ian Horsfall, Bjarne Hansen, Debra Carr | |||
Journal of Applied Information Science | Vol 5, No 1 (2017) | Security of Staff in Academic Libraries:A Study of Sam Jonah Library, University of Cape Coast | Abstract |
E. B. Yeboah, P. Kwafoa, G. B. Amoah | |||
Wireless Communication | Vol 5, No 7 (2013) | Security on Mobile Agent Based Communication System | Abstract |
Tarun Dhar Diwan, Jahangeer Mohiudin Lone | |||
Software Engineering | Vol 1, No 4 (2009) | Security Over Web Services Using Evidence Based Access Control | Abstract |
E. S. Shameem Sulthana, S. Kanmani | |||
Research Cell: An International Journal of Engineering Sciences | Vol 5 (2011) | Security Performance Issues on ASRP in MANETS | Abstract PDF |
R. Balakrishna, K. S. Rajesh | |||
International Journal of Technology | Vol 1, No 2 (2011) | Security Problems and Issues for Data Forwarding in Ad-Hoc Wireless Sensor Networks | Abstract |
P. K. Singh, Narendra Pal Singh | |||
International Journal of Advanced Networking and Applications | Vol 16, No 2 (2024) | Security Reinforcement: An Overview of Multilevel Authentication Techniques | Abstract |
Thamilvaani Arvaree | |||
Wireless Communication | Vol 8, No 4 (2016) | Security Related Issues in Mobile Ad Hoc Networks | Abstract |
S. Ananthalakshmi, D. Jayakumar, S. Sivachandrian | |||
International Journal of Advanced Networking and Applications | Vol 7, No 1 (2015) | Security Solutions against Computer Networks Threats | Abstract PDF |
Fatemeh Soleimani Roozbahani, Reihaneh Azad | |||
Digital Signal Processing | Vol 12, No 2 (2020) | Security System of Smart ATM Access and Status Analysis Using GSM Technology | Abstract |
C. UdhayaKumar, G. Mohanprasanth, N. Rithinpranesh, V. Rajesh, Nibras Ahamed | |||
Networking and Communication Engineering | Vol 11, No 3 (2019) | Security System using Steganopin | Abstract |
M. Preethirani, K. K. Vaishnavi, D. Monisha rajakumari, L. Gowri, E. Madura | |||
International Journal of Advanced Networking and Applications | Vol 4, No 4 (2013) | Security Threats in Wireless Sensor Networks in Each Layer | Abstract PDF |
Anitha S. Sastry, Shazia Sulthana, S. Vagdevi | |||
AIRCC's International Journal of Computer Science and Information Technology | Vol 5, No 3 (2013) | Security Threats on Cloud Computing Vulnerabilities | Abstract PDF |
Te-Shun Chou | |||
Artificial Intelligent Systems and Machine Learning | Vol 8, No 3 (2016) | Security Using Captcha as a Graphical Password | Abstract |
Sahadeo Bhogil, Aishwarya Kadam, Omkar Warke, Karishma Bhavsar, Rupali Chopade | |||
89351 - 89375 of 110868 Items | First Previous 3570 3571 3572 3573 3574 3575 3576 3577 3578 3579 Next Last |
Browse Title Index
Scroll