Issue | Title | |
Vol 4, No 3 (2012) | Exploration of Taxonomical Vulnerabilities in Operating System V | Abstract |
A. Ramachandran, S. Ramachandran, A. Sathiyaraj | ||
Vol 4, No 14 (2012) | Extended B.A.T.M.A.N- A Novel Approach with Node Stability for Reliable Transmission in MANETS | Abstract |
R. Jeeva | ||
Vol 5, No 11 (2013) | Extending AODV to Avoid Black Hole Attack (AOMDV) | Abstract |
K.M. Naseera, Dr.C. Chandrasekar | ||
Vol 5, No 1 (2013) | Extending Social Privacy Protector for Twitter Social Network | Abstract |
S. Thiraviya, R. Rajam, P Joseph C, Dr.S.Britto R.Kumar | ||
Vol 10, No 7 (2018) | Facing Security Problems in Big Data and Hadoop | Abstract |
P. S. Vijayalakshmi, S. Lakshmidevi, T. Arunambika | ||
Vol 5, No 8 (2013) | Fault Forbearance Methods for Randomized Intrusion Tolerance | Abstract |
R. Vikkram, M. Sathya Prasath, R. Vidhyalakshmi | ||
Vol 4, No 5 (2012) | Fault Tolerance by Quartile Method with Outlier Detection in Wireless Sensor and Actor Networks | Abstract |
Dr.P. Ganesh Kumar, S. Kamalesh, B. Muthukarthick, D. Prasaath | ||
Vol 3, No 1 (2011) | Fault Tolerant Dynamic Scheduling in Grid Environment | Abstract |
K. Saravanan, Ponsy R.K. Sathiya Bhama | ||
Vol 3, No 7 (2011) | Fault Tree Analysis for Safety Critical Network Infrastructure | Abstract |
P. Vaishnavi, Rajesh Prasanna | ||
Vol 3, No 2 (2011) | Fault-Tolerant Scheduling Techniques for Computational Grid | Abstract |
S. Uma Maheswari, A. Shamila Ebenezer | ||
Vol 4, No 10 (2012): Regular Issue | Filtering Spam in Cloud using Bayesian Algorithm | Abstract |
S. Metilda Florence, N. Praveen | ||
Vol 8, No 4 (2016) | Fine Grained Distributed Data Access Control with Portable Billing Scheme for Service Oriented Vehicular Network | Abstract |
M. Balashankar, K. Sowmya | ||
Vol 7, No 7 (2015) | Flexible Authentication with User Revocation for DAC in Cloud | Abstract |
G. Keerthi, Golda Selia | ||
Vol 11, No 5 (2019) | Fog Computing: Common Security Issues and Proposed Countermeasure for Intrusion due to Password Theft | Abstract |
Riyaz Ahmad Shah, Danish Ali Khan | ||
Vol 5, No 2 (2013) | FPGA Implementation of Multi Layer Perceptron Neural Network for Signal Processing | Abstract |
A. Thilagavathy, K. Vijaya Kanth | ||
Vol 6, No 8 (2014) | Framework to Monitor Big Data Processing in the Cloud | Abstract |
R.Vijaya Arjunan, Nagapandu Potti | ||
Vol 12, No 1 (2020) | Fraud Find: Cash Related Intimidation Acknowledgment Inevitably Tom’s Investigating Progressing Down Human Direct | Abstract |
M. Divya, P. Suganya | ||
Vol 1, No 4 (2009) | Frequency Domain Equalization for Single Carrier Wireless Systems | Abstract |
M. Lakshmanan, V. Noor Mohammed, S. Nandakumar | ||
Vol 4, No 6 (2012) | Fuzzy-Ant Based Dynamic Routing on Large Road Networks | Abstract |
M. Geetha, Dr.G.M. Kadhar Nawaz | ||
Vol 3, No 6 (2011) | Gaze-based Password Entry Systems | Abstract |
S. Yamini | ||
Vol 4, No 13 (2012) | Generic Framework for IP Based Mobility Analysis and Hostname Tracking based Intrusion Detection | Abstract |
S. Arul, S. Ravi | ||
Vol 3, No 1 (2011) | Generic Modeling of Realistic Movement Pattern of Nodes in MANET | Abstract |
G. Prema, Dr.C. Aravindan, Dr.K. Kannan, Dr.R. Maheswaran | ||
Vol 6, No 4 (2014) | GF (2m) Based Low Complexity Multiplier for Elliptic Curve Cryptography Systems | Abstract |
K. Rajadurga, S. Ram Kumar | ||
Vol 11, No 8 (2019) | Graphical Password Authentication using Data Encryption Technique – A Review Approach | Abstract |
Bryan A. Liang, Khin Su Myat Moe | ||
Vol 3, No 8 (2011) | Grid Services Implementation Using Eclipse Environment | Abstract |
Madhuri Vaghsia, Sahista Machchhar, Priyanka Buch | ||
476 - 500 of 963 Items | << < 15 16 17 18 19 20 21 22 23 24 > >> |
ISSN: 0974 – 9616