Issue | Title | |
Vol 3, No 7 (2011) | Congestion Avoidance in WSN with Multiple Mobile Sink Using Energy Based Routing | Abstract |
Litty Koshy | ||
Vol 10, No 3 (2018) | Congestion Aware Load Balancing for Energy Efficient Mobile Ad-hoc Network | Abstract |
Dr. P. Boobalan, M. Ananthi, B. Kiruthika, G. Soundiri | ||
Vol 12, No 3-5 (2020) | Congestion Control in Wireless Sensor Networks Using Fuzzy C Means Algorithm | Abstract |
E Craig | ||
Vol 3, No 13 (2011) | Consistency Management Strategies for Data Replication in MANET | Abstract |
S.K. Hameeda, Y. Chitti Babu, Dr.P. Harini, Syed Azahad | ||
Vol 3, No 5 (2011) | Consolidation of Projects & Applications for Challenged Networks | Abstract |
Hemal Shah, Yogeshwar. P. Kosta, Maitrey Patel | ||
Vol 8, No 4 (2016) | Constrained Cluster Formation Using Cuckoo Search Algorithm for Promt Data Gathering in WSN | Abstract |
S. Dhivya Lakshmi | ||
Vol 3, No 12 (2011) | Contemporary Vulnerability Evaluation of Web Servers | Abstract |
N. Prasanna Balaji, U. Srinivasulu, V. Pavan Kumar | ||
Vol 4, No 12 (2012) | Continuous-Time Sigma-Delta ADC for Mobile WiMAX Receiver | Abstract |
Jihene Mallek, Hassene Mnif, Mourad Loulou | ||
Vol 9, No 7 (2017) | Convergence of IoT and WBSN for Smart Control of Patients Health | Abstract |
Marziyeh Bahrami, Mohammad Esmaeili | ||
Vol 1, No 3 (2009) | Core-Stateless Fair Queuing For Fair Bandwidth Allocations in Internet | Abstract |
M. Azath, K. Murugan | ||
Vol 4, No 2 (2012) | Correlation-Based Traffic Analysis Attacks on Anonymity Networks | Abstract |
R. Gopinath, J. Balakumar, R. Gnanakumaran, M. Manikandaprabu | ||
Vol 3, No 3 (2011) | Coverage and Connectivity Analysis of ADHOC Networks in Presence of Channel Randomness | Abstract |
T. Shankar, Vurandala Kiran Kumar, Dr.S. Shanmugavel | ||
Vol 7, No 8 (2015) | Cross Layer Based Intrusion Detection in MANET Using Intelligent Paradigms | Abstract |
Dr.G. Usha, Dr.K. Mahalakshmi | ||
Vol 4, No 4 (2012) | Crosstalk Due to XPM under the Impact of Higher Order Dispersion Parameters in SCM-WDM Link | Abstract |
Vishal Sharma, Jagvir Kaur, Amarpal Singh | ||
Vol 7, No 5 (2015) | Cryptographic Algorithm Based on Triangular Form | Abstract |
Subhankar Ghosh, Dr. Pranam Paul | ||
Vol 8, No 8 (2016) | Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks | Abstract |
Anupriya K Haridas, Sneha Johnson | ||
Vol 11, No 12 (2019) | Current Research Technologies and Challenges on IoT Networking | Abstract |
V. Azhaharasan, Dr. S. Janarthanam, Dr. P. Prabhusundhar | ||
Vol 13, No 3 (2021) | Cyber Crime and Security | Abstract |
M. Kundalakesi, S. Pradeepa, N. Santhoshkumar, M. Sneka | ||
Vol 13, No 1 (2021) | Cyber-Physical System | Abstract |
S. Indrakshi, S. Kavya | ||
Vol 8, No 10 (2016) | Data Dissemination in Mobile Computing | Abstract |
P. Anbumani, N.M. Abroja | ||
Vol 10, No 5 (2018) | Data Encryption Using XTEA and OTP Generation for E-Payment System | Abstract |
K. C. Chandana, Deepak B Desai, V. Geetha, S. N. Kavitha, N. Sushmitha | ||
Vol 4, No 2 (2012) | Data Leakage Detection | Abstract |
J. Balakumar, R. Gopinath | ||
Vol 10, No 1 (2018) | Data Mining in Network Security using Intrusion Detection System | Abstract |
A. Meena, U. Sinthuja | ||
Vol 2, No 9 (2010) | Data Model Framework for Intruder Information Sharing in Sensor Networks | Abstract |
K. Venkatesh Sharma, K. Hanumantha Rao, Vannoj Ravikumar | ||
Vol 6, No 8 (2014) | Data Rescue Process in Network Medium with Higher End Security Measures | Abstract |
D. Shanmathy | ||
326 - 350 of 963 Items | << < 9 10 11 12 13 14 15 16 17 18 > >> |
ISSN: 0974 – 9616