Browse Title Index


 
Issue Title
 
Vol 1, No 2 (2013) In-Line Auditing and Real-Time Lineage Summaries to Maintain Ownership of Information Stored in Cloud Servers Abstract
Hiroshi Fujinoki
 
Vol 2, No 2 (2014) Intelligent Firewall Using Intrusion Detection System Based on Neural Networks Abstract
Mandar Dinesh Sawant, Madhura Milind Phatak, Mrugank Ajay Ranavde, Nitya R. Laxamanan
 
Vol 1, No 2 (2013) Intrusion Detection Systems: A Review Abstract
Kajal Rai, M. Shyamala Devi
 
Vol 1, No 1 (2013) Kullback-Leibler Divergence for Masquerade Detection Abstract
Geetha Ranjini Viswanathan, Richard M. Low, Mark Stamp
 
Vol 6, No 1 (2018) Layered Migrating Overlay for Effectively Sieving Internal DoS/DDoS Attackers-Its Designs and Effectiveness Abstract
Hiroshi Fujinoki
 
Vol 3, No 2 (2015) Mitigating Virtual Machine Denial of Service Attacks from Mobile APPS Abstract
Dennis Guster, Abdul Raqeeb, Erich Rice
 
Vol 7, No 2 (2019) Modern Cryptographic Schemes: Applications and Comparative Study Abstract
Julius O. Olwenyi, Aby Tino Thomas, Ayad Barsoum
 
Vol 2, No 1 (2014) Modified PSOLA-Genetic Algorithm Based Approach for Voice Re-Construction Abstract
Partha Sarthy Banerjee, Uttam Kumar Roy
 
Vol 9, No 1 (2021) Nearest Keyword Set Search in Multi-Dimensional Dataset using Promishe Abstract   PDF
Annaluri Lokesh Kumar
 
Vol 9, No 2 (2021) Network Management Protocols: Analytical Study and Future Research Directions Abstract
Samman Tyata, Ayad Barsoum
 
Vol 7, No 2 (2019) Network Security Implemented With Intelligent Agent Through Multi-Agent System Abstract
Meena Sachdeva, Avadhesh Kumar
 
Vol 5, No 1 (2017) Optimized Outlier Based Web Bot Detection Abstract
R. Peter, D. Divya
 
Vol 1, No 1 (2013) Penetration Rate in the Virtual World and its Effects on Economy Abstract
Narinder Singh Rana, S. N. Panda
 
Vol 7, No 2 (2019) Performance Analysis of a QAPF Scheduling Scheme in LTE Network Abstract
Zin Mar Myo, Zar Lwin Phyo, Aye Thida Win
 
Vol 8, No 1&2 (2020) Performance Analysis of Zero Forcing and MMSE Equalizer on MIMO System in Wireless Channel Abstract
G. M. Waliullah, Diponkor Bala, Mst. Ashrafunnahar Hena, Md. Ibrahim Abdullah, Mohammad Alamgir Hossain
 
Vol 5, No 2 (2017) Predicting Student Performance Using Data Mining Abstract
R. Lakshmi, K. S. Narayanan, R. Swathikrishna, K. M. Sameera
 
Vol 5, No 1 (2017) Prevention of Insider Attack against Database Access Control Mechanism Abstract
S. Vijayan, S. Madhusudhanan
 
Vol 9, No 1 (2021) Providing Website Security by using Pattern Classifiers Abstract   PDF
Govindhan Nethaji
 
Vol 5, No 2 (2017) Real-Time Information Display System for Indian Railways Using RFID Abstract
R. Ramesh, G. Divya, N. Thomas, A. Varghese, L. Mahendran
 
Vol 6, No 2 (2018) Remote Access to PC Using Android Phone Abstract
Himanshu Shekhar, Mahesh Wawre, Mangesh Kakade, Sumit Kadam, S. B. Jadhav
 
Vol 4, No 1 (2016) Remote Integrity Verification for Multiple Data Copies in Cloud Environments:A Comparative Analysis and Open Research Issues Abstract
Ayad Barsoum
 
Vol 2, No 2 (2014) Remote User Authentication using Optical Character Recognition Abstract
C. Sreekanth Reddy, C. Shobha Bindu
 
Vol 3, No 2 (2015) Restricted Constraints in the Problem of Maximum Attainable Flow in Minimum Cost in a Network Abstract
Nazimuddin Ahmed, Shobha Duttadeka
 
Vol 7, No 2 (2019) Review of State of Art of Software-Defined Networking for 5G Abstract
Akash Hegde, H. Vishalakshi Prabhu
 
Vol 7, No 1 (2019) Review on Cryptography of Image Using Computer Generated Holography Abstract
Warsha M. Choudhari, Shalini Kharkate
 
51 - 75 of 93 Items First Previous 1 2 3 4 Next Last