| Issue | Title | |
| Vol 7, No 7 (2015) | Group Policy based Self-Destruction Data System | Abstract |
| Poonam Patel, Amar Buchade | ||
| Vol 3, No 14 (2011) | GT Approach for Detecting Application DoS Attacks | Abstract |
| D. Jebakumar Immanuel, C. Sangeetha | ||
| Vol 7, No 7 (2015) | Guidelines for Security in Cloud Computing | Abstract |
| Dr. S. K. Srivatsa, S. Nagasundaram | ||
| Vol 9, No 1 (2017) | Handling of Cloud Computing Audit Logs using Data Mining Techniques | Abstract |
| S. Revathi | ||
| Vol 2, No 2 (2010) | Handover Initiation in 3G/ WLAN Integrated Networks | Abstract |
| K. Ayyappan, R. Surender, Dr R. Kumar | ||
| Vol 11, No 3 (2019) | Hardware Based Braille Pad on Mobile Phone | Abstract |
| Dr. S. Latha Shanmuga Vadivu, S. Deepak, G. Dinesh Kumar, M. Mohammed Sabeek, S. Navaneetha Krishnan | ||
| Vol 10, No 9 (2018) | Helping: Homeless Refugee and Protection of Women through Mobile Application | Abstract |
| N. Ajith Kumar, R. Anitha | ||
| Vol 3, No 2 (2011) | Heuristics Based Survey on Workflow Scheduling in Computational Grids | Abstract |
| E. Saravana Kumar, A. Sumathi | ||
| Vol 9, No 4 (2017) | Hierarchical Cluster Based Efficient Data Acquisition and Detection of Smart Attackers Using IDS | Abstract |
| V. Bharathi, A. Gokila | ||
| Vol 2, No 4 (2010) | High Performance Internet Security Cryptographic Functions through OpenSSL | Abstract |
| T. Vijayalakshmi, K.G. Sathiya | ||
| Vol 2, No 1 (2010) | High Speed Reliable Serial Data Transmission using 8B/10B | Abstract |
| S. Jesme Topple, M. Pavithra | ||
| Vol 7, No 6 (2015) | HONEYPOT: Network Security | Abstract |
| A. Dayana, S. Saranya, B. Geethamani, R. Kashturi | ||
| Vol 4, No 3 (2012) | Hybrid Approach in Information-Hypothetically Furtive Solution Generation for Vanishing Wireless Channels | Abstract |
| J. Nagaraj, Dr.G.M. Kadhar Nawaz | ||
| Vol 5, No 7 (2013) | Hybrid Feedback Suppression Scheme for Satellite Networks | Abstract |
| Thokchom Arvind, Dr. R. Gunasundari | ||
| Vol 4, No 1 (2012) | Hybrid Low Power Encoded Multiplier for Montgomery Modular Multiplication and Efficient ECC Processor | Abstract |
| B. Muthukumar, S. Jeevananthan | ||
| Vol 5, No 7 (2013) | Hysteresis Model for Velocity based Handoff in Hierarchical Cellular System | Abstract |
| K. Sivakumar, M. Tamilarasi | ||
| Vol 3, No 1 (2011) | Identification of P2P Traffic across the Networks: A Survey | Abstract |
| M. Sadish Sendil, M. Kavitha, U. Kaleelurrahaman, Dr S. Karthik, Dr. N. Nagarajan | ||
| Vol 4, No 10 (2012): Regular Issue | Identification of Security Requirements in Cloud Computing Models | Abstract |
| J. Anitha Ruth, A. Meenakshi | ||
| Vol 10, No 1 (2018) | Identity Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking with Perfect Data in Public Cloud | Abstract |
| P. Jayasree, Dr. V. Saravanan | ||
| Vol 2, No 12 (2010) | Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network | Abstract |
| Madhumathi Rajesh, Rama Sugavanam, G.R. Gangadevi | ||
| Vol 4, No 14 (2012) | Impact of Fiber Raman Amplifier (FRA) in DCF based High Speed WDM System | Abstract |
| Vishal Sharma, Sunil Kumar Gautam | ||
| Vol 3, No 3 (2011) | Impact of Varying Node Mobility on Performance of Mobile Ad hoc Networks | Abstract |
| Sanjeev Kumar, Yogesh Chaba | ||
| Vol 5, No 7 (2013) | Impairment-Aware Provisioning Algorithm in Optical Networks with Regeneration | Abstract |
| S. Prabhavathi, V. Saminadan | ||
| Vol 10, No 7 (2018) | Impasse Notifier | Abstract |
| P. Chithiran, G. Dhanabalan, N. Mekala, R. Sumithra, K. Murugan | ||
| Vol 5, No 8 (2013) | Implement to Increase the Safety of Railway Vehicles with Real Time Warning Facility | Abstract |
| Tarun Dhar Diwan, Shikha Mishra, Shubhra Tiwari | ||
| 501 - 525 of 963 Items | << < 16 17 18 19 20 21 22 23 24 25 > >> | |
ISSN: 0974 – 9616