Issue | Title | |
Vol 7, No 7 (2015) | Group Policy based Self-Destruction Data System | Abstract |
Poonam Patel, Amar Buchade | ||
Vol 3, No 14 (2011) | GT Approach for Detecting Application DoS Attacks | Abstract |
D. Jebakumar Immanuel, C. Sangeetha | ||
Vol 7, No 7 (2015) | Guidelines for Security in Cloud Computing | Abstract |
Dr. S. K. Srivatsa, S. Nagasundaram | ||
Vol 9, No 1 (2017) | Handling of Cloud Computing Audit Logs using Data Mining Techniques | Abstract |
S. Revathi | ||
Vol 2, No 2 (2010) | Handover Initiation in 3G/ WLAN Integrated Networks | Abstract |
K. Ayyappan, R. Surender, Dr R. Kumar | ||
Vol 11, No 3 (2019) | Hardware Based Braille Pad on Mobile Phone | Abstract |
Dr. S. Latha Shanmuga Vadivu, S. Deepak, G. Dinesh Kumar, M. Mohammed Sabeek, S. Navaneetha Krishnan | ||
Vol 10, No 9 (2018) | Helping: Homeless Refugee and Protection of Women through Mobile Application | Abstract |
N. Ajith Kumar, R. Anitha | ||
Vol 3, No 2 (2011) | Heuristics Based Survey on Workflow Scheduling in Computational Grids | Abstract |
E. Saravana Kumar, A. Sumathi | ||
Vol 9, No 4 (2017) | Hierarchical Cluster Based Efficient Data Acquisition and Detection of Smart Attackers Using IDS | Abstract |
V. Bharathi, A. Gokila | ||
Vol 2, No 4 (2010) | High Performance Internet Security Cryptographic Functions through OpenSSL | Abstract |
T. Vijayalakshmi, K.G. Sathiya | ||
Vol 2, No 1 (2010) | High Speed Reliable Serial Data Transmission using 8B/10B | Abstract |
S. Jesme Topple, M. Pavithra | ||
Vol 7, No 6 (2015) | HONEYPOT: Network Security | Abstract |
A. Dayana, S. Saranya, B. Geethamani, R. Kashturi | ||
Vol 4, No 3 (2012) | Hybrid Approach in Information-Hypothetically Furtive Solution Generation for Vanishing Wireless Channels | Abstract |
J. Nagaraj, Dr.G.M. Kadhar Nawaz | ||
Vol 5, No 7 (2013) | Hybrid Feedback Suppression Scheme for Satellite Networks | Abstract |
Thokchom Arvind, Dr. R. Gunasundari | ||
Vol 4, No 1 (2012) | Hybrid Low Power Encoded Multiplier for Montgomery Modular Multiplication and Efficient ECC Processor | Abstract |
B. Muthukumar, S. Jeevananthan | ||
Vol 5, No 7 (2013) | Hysteresis Model for Velocity based Handoff in Hierarchical Cellular System | Abstract |
K. Sivakumar, M. Tamilarasi | ||
Vol 3, No 1 (2011) | Identification of P2P Traffic across the Networks: A Survey | Abstract |
M. Sadish Sendil, M. Kavitha, U. Kaleelurrahaman, Dr S. Karthik, Dr. N. Nagarajan | ||
Vol 4, No 10 (2012): Regular Issue | Identification of Security Requirements in Cloud Computing Models | Abstract |
J. Anitha Ruth, A. Meenakshi | ||
Vol 10, No 1 (2018) | Identity Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking with Perfect Data in Public Cloud | Abstract |
P. Jayasree, Dr. V. Saravanan | ||
Vol 2, No 12 (2010) | Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network | Abstract |
Madhumathi Rajesh, Rama Sugavanam, G.R. Gangadevi | ||
Vol 4, No 14 (2012) | Impact of Fiber Raman Amplifier (FRA) in DCF based High Speed WDM System | Abstract |
Vishal Sharma, Sunil Kumar Gautam | ||
Vol 3, No 3 (2011) | Impact of Varying Node Mobility on Performance of Mobile Ad hoc Networks | Abstract |
Sanjeev Kumar, Yogesh Chaba | ||
Vol 5, No 7 (2013) | Impairment-Aware Provisioning Algorithm in Optical Networks with Regeneration | Abstract |
S. Prabhavathi, V. Saminadan | ||
Vol 10, No 7 (2018) | Impasse Notifier | Abstract |
P. Chithiran, G. Dhanabalan, N. Mekala, R. Sumithra, K. Murugan | ||
Vol 5, No 8 (2013) | Implement to Increase the Safety of Railway Vehicles with Real Time Warning Facility | Abstract |
Tarun Dhar Diwan, Shikha Mishra, Shubhra Tiwari | ||
501 - 525 of 963 Items | << < 16 17 18 19 20 21 22 23 24 25 > >> |
ISSN: 0974 – 9616