Table of Contents
Articles
| Role of a Honeypot in Network Security – Survey |
PDF
|
| N. Harismita | 172-177 |
| Workflow Scheduling in Cloud Computing Environment using Chaotic Whale Optimization |
PDF
|
| S. Kanagalakshmi, Dr. K. Ramar | 178-184 |
| Helping: Homeless Refugee and Protection of Women through Mobile Application |
PDF
|
| N. Ajith Kumar, R. Anitha | 185-188 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616