![Open Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Articles
Development of an Improved Anonymity in GPS Traces for Analyzing Traffic and Routes |
PDF
![]() |
V. Karthik, V. Venkatesa Kumar | 694-700 |
A Study on Web Ontologies-Based Reengineering Software for Cloud Computing Using Probabilistic Topic Models |
PDF
![]() |
R. Rathika, M. Ambika | 701-705 |
An Optimal Wake–up Scheduling Algorithm for Minimizing Energy Consumption While Limiting Maximum Delay in Mesh Sensor Network |
PDF
![]() |
P. Karthikeyan | 706-710 |
Analysis of Flow Correlation Attacks in Anonymity Networks against Passive Logging Attacks |
PDF
![]() |
S.G. Shahidha Taj | 711-716 |
A Collective Processing Environment for Mobile Devices Using Grid |
PDF
![]() |
G. Pary, S. Sridhar | 717-725 |
A Hybrid Approach for Feature Selection in Improving the Efficiency of Wireless Intrusion Detection Systems |
PDF
![]() |
Dr. K. Selva Kumar, R. Saminathan, S. Suganthi | 726-730 |
User-Controlled Privacy Preserving Identity Management for Cloud Computing |
PDF
![]() |
Viswanathan Pachaiyappan, R. Chandrasekar | 731-736 |
Novel Approach for Hiding Secret Data in Image Using Cryptic Steganography |
PDF
![]() |
R. Bala | 737-740 |
Review of Routing and Switching |
PDF
![]() |
Shalaka Vijay. Sawant, Shubha M Puthran | 741-746 |
Performance Optimization for Mobile Environments |
PDF
![]() |
D. Vaishnavi, S.G. Santhi, K. Venkatachalapathy | 747-751 |
Secure Multicast Routing Protocol against Insider Attacks in MANET |
PDF
![]() |
V. Jayalakshmi, Dr. R. Rameshkumar | 752-759 |
![Creative Commons License](http://i.creativecommons.org/l/by/3.0/80x15.png)
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616