| Issue | Title | |
| Vol 3, No 7 (2011) | Congestion Avoidance in WSN with Multiple Mobile Sink Using Energy Based Routing | Abstract |
| Litty Koshy | ||
| Vol 10, No 3 (2018) | Congestion Aware Load Balancing for Energy Efficient Mobile Ad-hoc Network | Abstract |
| Dr. P. Boobalan, M. Ananthi, B. Kiruthika, G. Soundiri | ||
| Vol 12, No 3-5 (2020) | Congestion Control in Wireless Sensor Networks Using Fuzzy C Means Algorithm | Abstract |
| E Craig | ||
| Vol 3, No 13 (2011) | Consistency Management Strategies for Data Replication in MANET | Abstract |
| S.K. Hameeda, Y. Chitti Babu, Dr.P. Harini, Syed Azahad | ||
| Vol 3, No 5 (2011) | Consolidation of Projects & Applications for Challenged Networks | Abstract |
| Hemal Shah, Yogeshwar. P. Kosta, Maitrey Patel | ||
| Vol 8, No 4 (2016) | Constrained Cluster Formation Using Cuckoo Search Algorithm for Promt Data Gathering in WSN | Abstract |
| S. Dhivya Lakshmi | ||
| Vol 3, No 12 (2011) | Contemporary Vulnerability Evaluation of Web Servers | Abstract |
| N. Prasanna Balaji, U. Srinivasulu, V. Pavan Kumar | ||
| Vol 4, No 12 (2012) | Continuous-Time Sigma-Delta ADC for Mobile WiMAX Receiver | Abstract |
| Jihene Mallek, Hassene Mnif, Mourad Loulou | ||
| Vol 9, No 7 (2017) | Convergence of IoT and WBSN for Smart Control of Patients Health | Abstract |
| Marziyeh Bahrami, Mohammad Esmaeili | ||
| Vol 1, No 3 (2009) | Core-Stateless Fair Queuing For Fair Bandwidth Allocations in Internet | Abstract |
| M. Azath, K. Murugan | ||
| Vol 4, No 2 (2012) | Correlation-Based Traffic Analysis Attacks on Anonymity Networks | Abstract |
| R. Gopinath, J. Balakumar, R. Gnanakumaran, M. Manikandaprabu | ||
| Vol 3, No 3 (2011) | Coverage and Connectivity Analysis of ADHOC Networks in Presence of Channel Randomness | Abstract |
| T. Shankar, Vurandala Kiran Kumar, Dr.S. Shanmugavel | ||
| Vol 7, No 8 (2015) | Cross Layer Based Intrusion Detection in MANET Using Intelligent Paradigms | Abstract |
| Dr.G. Usha, Dr.K. Mahalakshmi | ||
| Vol 4, No 4 (2012) | Crosstalk Due to XPM under the Impact of Higher Order Dispersion Parameters in SCM-WDM Link | Abstract |
| Vishal Sharma, Jagvir Kaur, Amarpal Singh | ||
| Vol 7, No 5 (2015) | Cryptographic Algorithm Based on Triangular Form | Abstract |
| Subhankar Ghosh, Dr. Pranam Paul | ||
| Vol 8, No 8 (2016) | Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks | Abstract |
| Anupriya K Haridas, Sneha Johnson | ||
| Vol 11, No 12 (2019) | Current Research Technologies and Challenges on IoT Networking | Abstract |
| V. Azhaharasan, Dr. S. Janarthanam, Dr. P. Prabhusundhar | ||
| Vol 13, No 3 (2021) | Cyber Crime and Security | Abstract |
| M. Kundalakesi, S. Pradeepa, N. Santhoshkumar, M. Sneka | ||
| Vol 13, No 1 (2021) | Cyber-Physical System | Abstract |
| S. Indrakshi, S. Kavya | ||
| Vol 8, No 10 (2016) | Data Dissemination in Mobile Computing | Abstract |
| P. Anbumani, N.M. Abroja | ||
| Vol 10, No 5 (2018) | Data Encryption Using XTEA and OTP Generation for E-Payment System | Abstract |
| K. C. Chandana, Deepak B Desai, V. Geetha, S. N. Kavitha, N. Sushmitha | ||
| Vol 4, No 2 (2012) | Data Leakage Detection | Abstract |
| J. Balakumar, R. Gopinath | ||
| Vol 10, No 1 (2018) | Data Mining in Network Security using Intrusion Detection System | Abstract |
| A. Meena, U. Sinthuja | ||
| Vol 2, No 9 (2010) | Data Model Framework for Intruder Information Sharing in Sensor Networks | Abstract |
| K. Venkatesh Sharma, K. Hanumantha Rao, Vannoj Ravikumar | ||
| Vol 6, No 8 (2014) | Data Rescue Process in Network Medium with Higher End Security Measures | Abstract |
| D. Shanmathy | ||
| 326 - 350 of 963 Items | << < 9 10 11 12 13 14 15 16 17 18 > >> | |
ISSN: 0974 – 9616