| Issue | Title | |
| Vol 4, No 3 (2012) | Exploration of Taxonomical Vulnerabilities in Operating System V | Abstract |
| A. Ramachandran, S. Ramachandran, A. Sathiyaraj | ||
| Vol 4, No 14 (2012) | Extended B.A.T.M.A.N- A Novel Approach with Node Stability for Reliable Transmission in MANETS | Abstract |
| R. Jeeva | ||
| Vol 5, No 11 (2013) | Extending AODV to Avoid Black Hole Attack (AOMDV) | Abstract |
| K.M. Naseera, Dr.C. Chandrasekar | ||
| Vol 5, No 1 (2013) | Extending Social Privacy Protector for Twitter Social Network | Abstract |
| S. Thiraviya, R. Rajam, P Joseph C, Dr.S.Britto R.Kumar | ||
| Vol 10, No 7 (2018) | Facing Security Problems in Big Data and Hadoop | Abstract |
| P. S. Vijayalakshmi, S. Lakshmidevi, T. Arunambika | ||
| Vol 5, No 8 (2013) | Fault Forbearance Methods for Randomized Intrusion Tolerance | Abstract |
| R. Vikkram, M. Sathya Prasath, R. Vidhyalakshmi | ||
| Vol 4, No 5 (2012) | Fault Tolerance by Quartile Method with Outlier Detection in Wireless Sensor and Actor Networks | Abstract |
| Dr.P. Ganesh Kumar, S. Kamalesh, B. Muthukarthick, D. Prasaath | ||
| Vol 3, No 1 (2011) | Fault Tolerant Dynamic Scheduling in Grid Environment | Abstract |
| K. Saravanan, Ponsy R.K. Sathiya Bhama | ||
| Vol 3, No 7 (2011) | Fault Tree Analysis for Safety Critical Network Infrastructure | Abstract |
| P. Vaishnavi, Rajesh Prasanna | ||
| Vol 3, No 2 (2011) | Fault-Tolerant Scheduling Techniques for Computational Grid | Abstract |
| S. Uma Maheswari, A. Shamila Ebenezer | ||
| Vol 4, No 10 (2012): Regular Issue | Filtering Spam in Cloud using Bayesian Algorithm | Abstract |
| S. Metilda Florence, N. Praveen | ||
| Vol 8, No 4 (2016) | Fine Grained Distributed Data Access Control with Portable Billing Scheme for Service Oriented Vehicular Network | Abstract |
| M. Balashankar, K. Sowmya | ||
| Vol 7, No 7 (2015) | Flexible Authentication with User Revocation for DAC in Cloud | Abstract |
| G. Keerthi, Golda Selia | ||
| Vol 11, No 5 (2019) | Fog Computing: Common Security Issues and Proposed Countermeasure for Intrusion due to Password Theft | Abstract |
| Riyaz Ahmad Shah, Danish Ali Khan | ||
| Vol 5, No 2 (2013) | FPGA Implementation of Multi Layer Perceptron Neural Network for Signal Processing | Abstract |
| A. Thilagavathy, K. Vijaya Kanth | ||
| Vol 6, No 8 (2014) | Framework to Monitor Big Data Processing in the Cloud | Abstract |
| R.Vijaya Arjunan, Nagapandu Potti | ||
| Vol 12, No 1 (2020) | Fraud Find: Cash Related Intimidation Acknowledgment Inevitably Tom’s Investigating Progressing Down Human Direct | Abstract |
| M. Divya, P. Suganya | ||
| Vol 1, No 4 (2009) | Frequency Domain Equalization for Single Carrier Wireless Systems | Abstract |
| M. Lakshmanan, V. Noor Mohammed, S. Nandakumar | ||
| Vol 4, No 6 (2012) | Fuzzy-Ant Based Dynamic Routing on Large Road Networks | Abstract |
| M. Geetha, Dr.G.M. Kadhar Nawaz | ||
| Vol 3, No 6 (2011) | Gaze-based Password Entry Systems | Abstract |
| S. Yamini | ||
| Vol 4, No 13 (2012) | Generic Framework for IP Based Mobility Analysis and Hostname Tracking based Intrusion Detection | Abstract |
| S. Arul, S. Ravi | ||
| Vol 3, No 1 (2011) | Generic Modeling of Realistic Movement Pattern of Nodes in MANET | Abstract |
| G. Prema, Dr.C. Aravindan, Dr.K. Kannan, Dr.R. Maheswaran | ||
| Vol 6, No 4 (2014) | GF (2m) Based Low Complexity Multiplier for Elliptic Curve Cryptography Systems | Abstract |
| K. Rajadurga, S. Ram Kumar | ||
| Vol 11, No 8 (2019) | Graphical Password Authentication using Data Encryption Technique – A Review Approach | Abstract |
| Bryan A. Liang, Khin Su Myat Moe | ||
| Vol 3, No 8 (2011) | Grid Services Implementation Using Eclipse Environment | Abstract |
| Madhuri Vaghsia, Sahista Machchhar, Priyanka Buch | ||
| 476 - 500 of 963 Items | << < 15 16 17 18 19 20 21 22 23 24 > >> | |
ISSN: 0974 – 9616