Vol 2, No 2 (2014)

Table of Contents

Vol 2, No 2 (2014)

Open Access Open Access  Restricted Access Subscription Access

Articles

Remote User Authentication using Optical Character Recognition
C. Sreekanth Reddy, C. Shobha Bindu
 Vol 2, No 2 (2014), Pagination: 1-7
ABSTRACT |  PDF     Abstract Views: 285  |  PDF Views: 1
Extraction of Protein Sequence Motif Information using PSO K-Means
R. Gowri, R. Rathipriya
 Vol 2, No 2 (2014), Pagination: 8-13
ABSTRACT |  PDF     Abstract Views: 281  |  PDF Views: 1
Intelligent Firewall Using Intrusion Detection System Based on Neural Networks
Mandar Dinesh Sawant, Madhura Milind Phatak, Mrugank Ajay Ranavde, Nitya R. Laxamanan
 Vol 2, No 2 (2014), Pagination: 14-17
ABSTRACT |  PDF     Abstract Views: 316  |  PDF Views: 1
Security Architecture for Telemetry Networks
Farzad Moazzami, Richard Dean
 Vol 2, No 2 (2014), Pagination: 18-24
ABSTRACT |  PDF     Abstract Views: 277  |  PDF Views: 1
An Architecture for Host-Based Intrusion Detection Systems using Fuzzy Logic
Maryam Rostamipour, Babak Sadeghiyan
 Vol 2, No 2 (2014), Pagination: 25-32
ABSTRACT |  PDF     Abstract Views: 344  |  PDF Views: 1