| Issue | Title | |
| Vol 3, No 3 (2011) | Middleware Architectural Framework for Secured Services in MANETs | Abstract |
| T. Abdul Razak, R. Balasubramanian | ||
| Vol 3, No 7 (2011) | Minimum Energy Consumption Channel Allocation Scheme in LR-WPAN | Abstract |
| P. Kaushik, J. Singhai | ||
| Vol 2, No 9 (2010) | Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach | Abstract |
| K. Venkatesh Sharma, K. Hanumantha Rao, K. Ramu | ||
| Vol 5, No 3 (2013) | Mitigation of Flooding attack using Defense Mechanism in Mobile Adhoc Networks | Abstract |
| M. Muthumeenakshi, Dr. P. Subathra | ||
| Vol 6, No 6 (2014) | Mixing Substitution and Transposition Method for Enhancing Security | Abstract |
| Tanvi Tanvi | ||
| Vol 3, No 5 (2011) | Mobile Agent Based Cooperative Intrusion Detection System and Minimization of Malicious Packet Losses | Abstract |
| J. Arokia Renjit, Dr.K.L Shunmuganathan | ||
| Vol 4, No 9 (2012) | Mobile Communication: SMS Security Review (Issues, Attacks and Preventive Measures) | Abstract |
| Gurjeet Kaur, Monika Sachdeva, Dr.K.K. Saluja | ||
| Vol 9, No 1 (2017) | Mobile Computing | Abstract |
| S. Jagadesh Kumar, R. Mahesh Kumar | ||
| Vol 4, No 2 (2012) | MODBUS–An Overview and Applications in Automation Supporting ASCII and RTU Mode Transmission | Abstract |
| Dr.P.M. Patil, Sameer S. Nagtilak | ||
| Vol 4, No 15 (2012) | Modeling and Simulation of EPON based Symmetric FTTH Access Network | Abstract |
| Vishal Sharma, Amrita Tyagi | ||
| Vol 3, No 3 (2011) | Modeling and Study of Shielding Effectiveness of Enclosure | Abstract |
| G. Sindura, P. Salil, K. Ram Prakash | ||
| Vol 3, No 7 (2011) | Modeling RTT Using Box-Jenkins Model | Abstract |
| A. Jeyasekar, S.V. Kasmir Raja | ||
| Vol 4, No 5 (2012) | Modeling, Simulation and Capacity Analysis of Spatially Correlated Channels in MIMO Systems | Abstract |
| Prasad Rayi, D. Madhusudan, Ch. Madhusudhan | ||
| Vol 2, No 1 (2010) | Modelling and Control of a Grid Connected Small Scale Wind Generation System | Abstract |
| J. Divya Navamani, A. Lavanya | ||
| Vol 4, No 1 (2012) | Monitoring and Control System for Precision Farming using WSN | Abstract |
| Shiv Sutar, Swapnita Patil, Jayesh Sarnaik, Priyanka Priyanka, Komal Komal | ||
| Vol 4, No 3 (2012) | Monitoring and Mitigation of Application Layer DDOS Attacks through Heuristic Methods | Abstract |
| C. Nithyanand Niranjan, E. Pooventhan | ||
| Vol 6, No 6 (2014) | Most Wanted Content Management Systems for Website Development | Abstract |
| Bhumika S. Zalavadia | ||
| Vol 3, No 5 (2011) | Motion Capture for Computer 3D Character Animation | Abstract |
| G. Dheepa, Dr.S. Sukumaran, K. Prabha | ||
| Vol 6, No 9 (2014) | MRESS: A Good Epoch-Oriented Course-Plotting Management Airplane for Low-Power along with Lossy Networks | Abstract |
| H. Ambika, S. Suguna, N. Kavitha, A. Daison Raj | ||
| Vol 8, No 10 (2016) | MTM-Multihomed Transition Mechanism Feature for Small and Medium Enterprise Network | Abstract |
| B.I.D. Kumar, G. Vasanth | ||
| Vol 7, No 1 (2015) | Multi Authority Ciphertext Policy Attribute Based Encryption Schemes with Constant Ciphertext Length: A Survey | Abstract |
| Nikita Gorasia, R.R. Srikanth, Nishant Doshi | ||
| Vol 4, No 9 (2012) | Multi Factor Authentication using Steganography and One Time Password | Abstract |
| S. Arun Kumar, S. Vijayakumari, B.Dharani Chander | ||
| Vol 10, No 6 (2018) | Multi Stage Secret Sharing Scheme uses Lattices based Cryptography System | Abstract |
| N. M. Abroja, A. Afila Parveen, E. Ranjith | ||
| Vol 3, No 13 (2011) | Multicast Multi-path Power Efficient Routing in MANET | Abstract |
| M. Raghavendra Rao, K. Eswar, Dr.P. Harini, Syed. Azhad | ||
| Vol 5, No 11 (2013) | Multilayer Data Security Model for Handheld Devices with Simple Encryption Technique and Hardware Software Co-Design | Abstract |
| J.D. Ansilla Bensam, Dr. N. Vasudevan, Dr. S. Ravi | ||
| 626 - 650 of 963 Items | << < 21 22 23 24 25 26 27 28 29 30 > >> | |
ISSN: 0974 – 9616