Vol 10, No 9 (2018)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents


Role of a Honeypot in Network Security – Survey PDF
N. Harismita 172-177
Workflow Scheduling in Cloud Computing Environment using Chaotic Whale Optimization PDF
S. Kanagalakshmi, Dr. K. Ramar 178-184
Helping: Homeless Refugee and Protection of Women through Mobile Application PDF
N. Ajith Kumar, R. Anitha 185-188

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616