Table of Contents
Vol 6, No 2 (2018)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
Cloud Storage Assured Deletion: Considerations and Schemes | ||
Richard Thames, Ayad Barsoum | ||
Vol 6, No 2 (2018), Pagination: 01-04 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 205 | PDF Views: 1 |
Scheduling Sensor Nodes for Enhancing Energy Savings in a Wireless Sensor Network | ||
Shashank Srigiri, Rishabh Ranjan, Itu Snigdh | ||
Vol 6, No 2 (2018), Pagination: 05-09 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 174 | PDF Views: 0 |
Survey on Wireless Sensor Networks-Structure & Routing Protocols | ||
L. Rajesh, H. S. Mohan | ||
Vol 6, No 2 (2018), Pagination: 10-14 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 165 | PDF Views: 0 |
Remote Access to PC Using Android Phone | ||
Himanshu Shekhar, Mahesh Wawre, Mangesh Kakade, Sumit Kadam, S. B. Jadhav | ||
Vol 6, No 2 (2018), Pagination: 15-19 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 166 | PDF Views: 0 |
A Big Data Approach Towards Detection of Insider Attack | ||
Vikar Ansar Shaikh, Tanuja R. Pattanshetti | ||
Vol 6, No 2 (2018), Pagination: 20-23 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 221 | PDF Views: 0 |
Cyber-Physical Systems and Humane Security Engineering | ||
T. V. Gopal | ||
Vol 6, No 2 (2018), Pagination: 24-31 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 169 | PDF Views: 0 |