Table of Contents
Vol 2, No 2 (2014)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
Remote User Authentication using Optical Character Recognition | ||
C. Sreekanth Reddy, C. Shobha Bindu | ||
Vol 2, No 2 (2014), Pagination: 1-7 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 206 | PDF Views: 1 |
Extraction of Protein Sequence Motif Information using PSO K-Means | ||
R. Gowri, R. Rathipriya | ||
Vol 2, No 2 (2014), Pagination: 8-13 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 218 | PDF Views: 1 |
Intelligent Firewall Using Intrusion Detection System Based on Neural Networks | ||
Mandar Dinesh Sawant, Madhura Milind Phatak, Mrugank Ajay Ranavde, Nitya R. Laxamanan | ||
Vol 2, No 2 (2014), Pagination: 14-17 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 247 | PDF Views: 1 |
Security Architecture for Telemetry Networks | ||
Farzad Moazzami, Richard Dean | ||
Vol 2, No 2 (2014), Pagination: 18-24 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 220 | PDF Views: 1 |
An Architecture for Host-Based Intrusion Detection Systems using Fuzzy Logic | ||
Maryam Rostamipour, Babak Sadeghiyan | ||
Vol 2, No 2 (2014), Pagination: 25-32 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 298 | PDF Views: 1 |