Issue | Title | |
Vol 6, No 2 (2018) | A Big Data Approach Towards Detection of Insider Attack | Abstract |
Vikar Ansar Shaikh, Tanuja R. Pattanshetti | ||
Vol 7, No 1 (2019) | A Combined Reasoning System for Knowledge Based Network Intrusion Detection | Abstract |
Meseret Assefa, Million Meshesha | ||
Vol 6, No 1 (2018) | A Comparative Analysis on Various Noise Reduction Techniques Tested for Medical Images | Abstract |
A. Ramya, D. Murugan, T. I. Manish | ||
Vol 8, No 1&2 (2020) | A Comprehensive View of State-of-Art of 5G Network Slicing | Abstract |
L. Krithika, H. Vishalakshi Prabhu | ||
Vol 7, No 1 (2019) | A Health Care System Using ZigBee Based WSN | Abstract |
Hitesh Anandji Momaya, Sutej Ketan Mota | ||
Vol 2, No 1 (2014) | A Method for Derivating an Algorithm of Power Computation of Cyclic Permutation | Abstract |
Bo Yang | ||
Vol 4, No 2 (2016) | A Novel Memory Forensics Technique for Windows 10 | Abstract |
Azad Singh, Pankaj Sharma, Sakshi Sharma | ||
Vol 9, No 1 (2021) | A Review on Crop Disease Detection using Deep Learning | Abstract PDF |
Dilli Charan Sai | ||
Vol 1, No 2 (2013) | A Study and Modeling for Improving Grid Service Reliability Using Hive | Abstract |
Renita Raymond, Karnavel Kuppusamy | ||
Vol 3, No 1 (2015) | A Study and Modelling for Improving Secure Communication in Wireless Sensor Networks | Abstract |
B. Vidhya, Mary Joseph, D. Rajini Girinath, A. Malathi | ||
Vol 5, No 2 (2017) | A Survey on Cellular Automata with the Application in Pseudo Random Number Generation | Abstract |
I. Gethzi Ahila Poornima, B. Paramasivan, K. Mohaideen Pitchai, M. Bhuvaeswari | ||
Vol 1, No 1 (2013) | A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks | Abstract |
Jaydip Sen | ||
Vol 4, No 1 (2016) | A Zero Knowledge Proof Implementation Using NXP Security Engine | Abstract |
Alexandru Porosanu, Nitesh Lal Narayan | ||
Vol 5, No 1 (2017) | Alzheimer’s Detection at Early Stage Using Modified LGS (M-LGS) on MRI | Abstract |
S. Nayaki K., A. B. Varghese | ||
Vol 2, No 2 (2014) | An Architecture for Host-Based Intrusion Detection Systems using Fuzzy Logic | Abstract |
Maryam Rostamipour, Babak Sadeghiyan | ||
Vol 2, No 1 (2014) | An Enhanced UPC Mod 10 Check Digit Method | Abstract |
Zahraddeen A. Pindar, Sapiee Jamel, Abdulkadir H. Disina | ||
Vol 4, No 1 (2016) | An Experimental Safety Analysis Using FTA for A Ball Position Control System | Abstract |
Kadupukotla Satish Kumar, Panchumarthy Seetha Ramaiah | ||
Vol 10, No 1 (2021) | Analysis and Study of Machine to Machine (Real Time Data Management) | Abstract |
Indrajeet , Harsh Kumar | ||
Vol 6, No 1 (2018) | Analysis of Secure Route Re-Computation Mechanisms on OLSR Based MANET | Abstract |
V. Chithra | ||
Vol 9, No 2 (2021) | Analysis the Performance of MIMO-OFDM for Various Modulation Techniques over AWGN, Rayleigh Fading and Rician Fading Channel | Abstract |
Diponkor Bala, G. M. Waliullah, Md. Hafizur Rahman, Md. Ibrahim Abdullah, Mohammad Alamgir Hossain | ||
Vol 10, No 1 (2021) | Analysis the Performance of OFDM-MIMO Channel with Different Equalizers | Abstract |
Diponkor Bala, Md. Shamim Hossain, Md. Ibrahim Abdullah, Mohammad Alamgir Hossain | ||
Vol 1, No 2 (2013) | Analyzing Threat Perception and Geo-Location of Internet-Facing Systems | Abstract |
Pawandeep Singh | ||
Vol 8, No 1&2 (2020) | Anomalous Insiders Detection System using K-NN in Collaborative Information Systems | Abstract |
G. Thiraviaselvi, G. Dhinese | ||
Vol 3, No 1 (2015) | Anywhere at Anytime Internet: Google Loon Balloons | Abstract |
Sheba Jiju George, K. R. Remesh Babu | ||
Vol 9, No 2 (2021) | Application Layer in Internet of Things: A Review in Protocols and Security Threats | Abstract |
Parvathy K. | ||
1 - 25 of 93 Items | 1 2 3 4 Next Last |
Browse Title Index
Scroll