Browse Title Index


 
Issue Title
 
Vol 7, No 7 (2015) Group Policy based Self-Destruction Data System Abstract
Poonam Patel, Amar Buchade
 
Vol 3, No 14 (2011) GT Approach for Detecting Application DoS Attacks Abstract
D. Jebakumar Immanuel, C. Sangeetha
 
Vol 7, No 7 (2015) Guidelines for Security in Cloud Computing Abstract
Dr. S. K. Srivatsa, S. Nagasundaram
 
Vol 9, No 1 (2017) Handling of Cloud Computing Audit Logs using Data Mining Techniques Abstract
S. Revathi
 
Vol 2, No 2 (2010) Handover Initiation in 3G/ WLAN Integrated Networks Abstract
K. Ayyappan, R. Surender, Dr R. Kumar
 
Vol 11, No 3 (2019) Hardware Based Braille Pad on Mobile Phone Abstract
Dr. S. Latha Shanmuga Vadivu, S. Deepak, G. Dinesh Kumar, M. Mohammed Sabeek, S. Navaneetha Krishnan
 
Vol 10, No 9 (2018) Helping: Homeless Refugee and Protection of Women through Mobile Application Abstract
N. Ajith Kumar, R. Anitha
 
Vol 3, No 2 (2011) Heuristics Based Survey on Workflow Scheduling in Computational Grids Abstract
E. Saravana Kumar, A. Sumathi
 
Vol 9, No 4 (2017) Hierarchical Cluster Based Efficient Data Acquisition and Detection of Smart Attackers Using IDS Abstract
V. Bharathi, A. Gokila
 
Vol 2, No 4 (2010) High Performance Internet Security Cryptographic Functions through OpenSSL Abstract
T. Vijayalakshmi, K.G. Sathiya
 
Vol 2, No 1 (2010) High Speed Reliable Serial Data Transmission using 8B/10B Abstract
S. Jesme Topple, M. Pavithra
 
Vol 7, No 6 (2015) HONEYPOT: Network Security Abstract
A. Dayana, S. Saranya, B. Geethamani, R. Kashturi
 
Vol 4, No 3 (2012) Hybrid Approach in Information-Hypothetically Furtive Solution Generation for Vanishing Wireless Channels Abstract
J. Nagaraj, Dr.G.M. Kadhar Nawaz
 
Vol 5, No 7 (2013) Hybrid Feedback Suppression Scheme for Satellite Networks Abstract
Thokchom Arvind, Dr. R. Gunasundari
 
Vol 4, No 1 (2012) Hybrid Low Power Encoded Multiplier for Montgomery Modular Multiplication and Efficient ECC Processor Abstract
B. Muthukumar, S. Jeevananthan
 
Vol 5, No 7 (2013) Hysteresis Model for Velocity based Handoff in Hierarchical Cellular System Abstract
K. Sivakumar, M. Tamilarasi
 
Vol 3, No 1 (2011) Identification of P2P Traffic across the Networks: A Survey Abstract
M. Sadish Sendil, M. Kavitha, U. Kaleelurrahaman, Dr S. Karthik, Dr. N. Nagarajan
 
Vol 4, No 10 (2012): Regular Issue Identification of Security Requirements in Cloud Computing Models Abstract
J. Anitha Ruth, A. Meenakshi
 
Vol 10, No 1 (2018) Identity Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking with Perfect Data in Public Cloud Abstract
P. Jayasree, Dr. V. Saravanan
 
Vol 2, No 12 (2010) Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network Abstract
Madhumathi Rajesh, Rama Sugavanam, G.R. Gangadevi
 
Vol 4, No 14 (2012) Impact of Fiber Raman Amplifier (FRA) in DCF based High Speed WDM System Abstract
Vishal Sharma, Sunil Kumar Gautam
 
Vol 3, No 3 (2011) Impact of Varying Node Mobility on Performance of Mobile Ad hoc Networks Abstract
Sanjeev Kumar, Yogesh Chaba
 
Vol 5, No 7 (2013) Impairment-Aware Provisioning Algorithm in Optical Networks with Regeneration Abstract
S. Prabhavathi, V. Saminadan
 
Vol 10, No 7 (2018) Impasse Notifier Abstract
P. Chithiran, G. Dhanabalan, N. Mekala, R. Sumithra, K. Murugan
 
Vol 5, No 8 (2013) Implement to Increase the Safety of Railway Vehicles with Real Time Warning Facility Abstract
Tarun Dhar Diwan, Shikha Mishra, Shubhra Tiwari
 
501 - 525 of 963 Items << < 16 17 18 19 20 21 22 23 24 25 > >> 


ISSN: 0974 – 9616