Open Access
Subscription or Fee Access
Table of Contents
Articles
Role of a Honeypot in Network Security – Survey | |
N. Harismita | 172-177 |
Workflow Scheduling in Cloud Computing Environment using Chaotic Whale Optimization | |
S. Kanagalakshmi, Dr. K. Ramar | 178-184 |
Helping: Homeless Refugee and Protection of Women through Mobile Application | |
N. Ajith Kumar, R. Anitha | 185-188 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616