Browse Title Index


 
Issue Title
 
Vol 4, No 3 (2012) Exploration of Taxonomical Vulnerabilities in Operating System V Abstract
A. Ramachandran, S. Ramachandran, A. Sathiyaraj
 
Vol 4, No 14 (2012) Extended B.A.T.M.A.N- A Novel Approach with Node Stability for Reliable Transmission in MANETS Abstract
R. Jeeva
 
Vol 5, No 11 (2013) Extending AODV to Avoid Black Hole Attack (AOMDV) Abstract
K.M. Naseera, Dr.C. Chandrasekar
 
Vol 5, No 1 (2013) Extending Social Privacy Protector for Twitter Social Network Abstract
S. Thiraviya, R. Rajam, P Joseph C, Dr.S.Britto R.Kumar
 
Vol 10, No 7 (2018) Facing Security Problems in Big Data and Hadoop Abstract
P. S. Vijayalakshmi, S. Lakshmidevi, T. Arunambika
 
Vol 5, No 8 (2013) Fault Forbearance Methods for Randomized Intrusion Tolerance Abstract
R. Vikkram, M. Sathya Prasath, R. Vidhyalakshmi
 
Vol 4, No 5 (2012) Fault Tolerance by Quartile Method with Outlier Detection in Wireless Sensor and Actor Networks Abstract
Dr.P. Ganesh Kumar, S. Kamalesh, B. Muthukarthick, D. Prasaath
 
Vol 3, No 1 (2011) Fault Tolerant Dynamic Scheduling in Grid Environment Abstract
K. Saravanan, Ponsy R.K. Sathiya Bhama
 
Vol 3, No 7 (2011) Fault Tree Analysis for Safety Critical Network Infrastructure Abstract
P. Vaishnavi, Rajesh Prasanna
 
Vol 3, No 2 (2011) Fault-Tolerant Scheduling Techniques for Computational Grid Abstract
S. Uma Maheswari, A. Shamila Ebenezer
 
Vol 4, No 10 (2012): Regular Issue Filtering Spam in Cloud using Bayesian Algorithm Abstract
S. Metilda Florence, N. Praveen
 
Vol 8, No 4 (2016) Fine Grained Distributed Data Access Control with Portable Billing Scheme for Service Oriented Vehicular Network Abstract
M. Balashankar, K. Sowmya
 
Vol 7, No 7 (2015) Flexible Authentication with User Revocation for DAC in Cloud Abstract
G. Keerthi, Golda Selia
 
Vol 11, No 5 (2019) Fog Computing: Common Security Issues and Proposed Countermeasure for Intrusion due to Password Theft Abstract
Riyaz Ahmad Shah, Danish Ali Khan
 
Vol 5, No 2 (2013) FPGA Implementation of Multi Layer Perceptron Neural Network for Signal Processing Abstract
A. Thilagavathy, K. Vijaya Kanth
 
Vol 6, No 8 (2014) Framework to Monitor Big Data Processing in the Cloud Abstract
R.Vijaya Arjunan, Nagapandu Potti
 
Vol 12, No 1 (2020) Fraud Find: Cash Related Intimidation Acknowledgment Inevitably Tom’s Investigating Progressing Down Human Direct Abstract
M. Divya, P. Suganya
 
Vol 1, No 4 (2009) Frequency Domain Equalization for Single Carrier Wireless Systems Abstract
M. Lakshmanan, V. Noor Mohammed, S. Nandakumar
 
Vol 4, No 6 (2012) Fuzzy-Ant Based Dynamic Routing on Large Road Networks Abstract
M. Geetha, Dr.G.M. Kadhar Nawaz
 
Vol 3, No 6 (2011) Gaze-based Password Entry Systems Abstract
S. Yamini
 
Vol 4, No 13 (2012) Generic Framework for IP Based Mobility Analysis and Hostname Tracking based Intrusion Detection Abstract
S. Arul, S. Ravi
 
Vol 3, No 1 (2011) Generic Modeling of Realistic Movement Pattern of Nodes in MANET Abstract
G. Prema, Dr.C. Aravindan, Dr.K. Kannan, Dr.R. Maheswaran
 
Vol 6, No 4 (2014) GF (2m) Based Low Complexity Multiplier for Elliptic Curve Cryptography Systems Abstract
K. Rajadurga, S. Ram Kumar
 
Vol 11, No 8 (2019) Graphical Password Authentication using Data Encryption Technique – A Review Approach Abstract
Bryan A. Liang, Khin Su Myat Moe
 
Vol 3, No 8 (2011) Grid Services Implementation Using Eclipse Environment Abstract
Madhuri Vaghsia, Sahista Machchhar, Priyanka Buch
 
476 - 500 of 963 Items << < 15 16 17 18 19 20 21 22 23 24 > >> 


ISSN: 0974 – 9616