Issue | Title | |
Vol 1, No 2 (2013) | In-Line Auditing and Real-Time Lineage Summaries to Maintain Ownership of Information Stored in Cloud Servers | Abstract |
Hiroshi Fujinoki | ||
Vol 2, No 2 (2014) | Intelligent Firewall Using Intrusion Detection System Based on Neural Networks | Abstract |
Mandar Dinesh Sawant, Madhura Milind Phatak, Mrugank Ajay Ranavde, Nitya R. Laxamanan | ||
Vol 1, No 2 (2013) | Intrusion Detection Systems: A Review | Abstract |
Kajal Rai, M. Shyamala Devi | ||
Vol 1, No 1 (2013) | Kullback-Leibler Divergence for Masquerade Detection | Abstract |
Geetha Ranjini Viswanathan, Richard M. Low, Mark Stamp | ||
Vol 6, No 1 (2018) | Layered Migrating Overlay for Effectively Sieving Internal DoS/DDoS Attackers-Its Designs and Effectiveness | Abstract |
Hiroshi Fujinoki | ||
Vol 3, No 2 (2015) | Mitigating Virtual Machine Denial of Service Attacks from Mobile APPS | Abstract |
Dennis Guster, Abdul Raqeeb, Erich Rice | ||
Vol 7, No 2 (2019) | Modern Cryptographic Schemes: Applications and Comparative Study | Abstract |
Julius O. Olwenyi, Aby Tino Thomas, Ayad Barsoum | ||
Vol 2, No 1 (2014) | Modified PSOLA-Genetic Algorithm Based Approach for Voice Re-Construction | Abstract |
Partha Sarthy Banerjee, Uttam Kumar Roy | ||
Vol 9, No 1 (2021) | Nearest Keyword Set Search in Multi-Dimensional Dataset using Promishe | Abstract PDF |
Annaluri Lokesh Kumar | ||
Vol 9, No 2 (2021) | Network Management Protocols: Analytical Study and Future Research Directions | Abstract |
Samman Tyata, Ayad Barsoum | ||
Vol 7, No 2 (2019) | Network Security Implemented With Intelligent Agent Through Multi-Agent System | Abstract |
Meena Sachdeva, Avadhesh Kumar | ||
Vol 5, No 1 (2017) | Optimized Outlier Based Web Bot Detection | Abstract |
R. Peter, D. Divya | ||
Vol 1, No 1 (2013) | Penetration Rate in the Virtual World and its Effects on Economy | Abstract |
Narinder Singh Rana, S. N. Panda | ||
Vol 7, No 2 (2019) | Performance Analysis of a QAPF Scheduling Scheme in LTE Network | Abstract |
Zin Mar Myo, Zar Lwin Phyo, Aye Thida Win | ||
Vol 8, No 1&2 (2020) | Performance Analysis of Zero Forcing and MMSE Equalizer on MIMO System in Wireless Channel | Abstract |
G. M. Waliullah, Diponkor Bala, Mst. Ashrafunnahar Hena, Md. Ibrahim Abdullah, Mohammad Alamgir Hossain | ||
Vol 5, No 2 (2017) | Predicting Student Performance Using Data Mining | Abstract |
R. Lakshmi, K. S. Narayanan, R. Swathikrishna, K. M. Sameera | ||
Vol 5, No 1 (2017) | Prevention of Insider Attack against Database Access Control Mechanism | Abstract |
S. Vijayan, S. Madhusudhanan | ||
Vol 9, No 1 (2021) | Providing Website Security by using Pattern Classifiers | Abstract PDF |
Govindhan Nethaji | ||
Vol 5, No 2 (2017) | Real-Time Information Display System for Indian Railways Using RFID | Abstract |
R. Ramesh, G. Divya, N. Thomas, A. Varghese, L. Mahendran | ||
Vol 6, No 2 (2018) | Remote Access to PC Using Android Phone | Abstract |
Himanshu Shekhar, Mahesh Wawre, Mangesh Kakade, Sumit Kadam, S. B. Jadhav | ||
Vol 4, No 1 (2016) | Remote Integrity Verification for Multiple Data Copies in Cloud Environments:A Comparative Analysis and Open Research Issues | Abstract |
Ayad Barsoum | ||
Vol 2, No 2 (2014) | Remote User Authentication using Optical Character Recognition | Abstract |
C. Sreekanth Reddy, C. Shobha Bindu | ||
Vol 3, No 2 (2015) | Restricted Constraints in the Problem of Maximum Attainable Flow in Minimum Cost in a Network | Abstract |
Nazimuddin Ahmed, Shobha Duttadeka | ||
Vol 7, No 2 (2019) | Review of State of Art of Software-Defined Networking for 5G | Abstract |
Akash Hegde, H. Vishalakshi Prabhu | ||
Vol 7, No 1 (2019) | Review on Cryptography of Image Using Computer Generated Holography | Abstract |
Warsha M. Choudhari, Shalini Kharkate | ||
51 - 75 of 93 Items | First Previous 1 2 3 4 Next Last |
Browse Title Index
Scroll