| Issue | Title | |
| Vol 8, No 4 (2016) | An Algorithm for Dexterous Scanning Neighbour Devices in Opportunistic Mobile Social Networks | Abstract |
| K. Suganthi, K. Saranya | ||
| Vol 12, No 9-10 (2020) | An Analysis of Cloud Networking and Cloud-based Data Center Networks | Abstract |
| Nabil Bitar, Steven Gringeri | ||
| Vol 12, No 6-8 (2020) | An Analysis of Cyber Security and Privacy issues in Big Data Analysis | Abstract |
| M. Arias-Estévez, J Simal-Gándara | ||
| Vol 4, No 13 (2012) | An Analysis of Topological Control Protocols & its Issues in Wireless Sensor Network | Abstract |
| R. Venkatesan, Dr.A. Arul Lawrence Selvakumar | ||
| Vol 11, No 10 (2019) | An Analysis of Wireless Sensor Network Attack Classification | Abstract |
| D. Spirjakin | ||
| Vol 5, No 2 (2013) | An Analysis on Mobile Visualization Connectionist IDS | Abstract |
| K. Poongodi, B. Rosiline Jeetha | ||
| Vol 2, No 3 (2010) | An Analytical Approach to Mitigate DDoS Attacks and Improve Network Performance under Collaborative Software as a Service (SaaS) Cloud Computing Environment | Abstract |
| Palvinder Singh Mann, Dinesh Kumar | ||
| Vol 2, No 5 (2010) | An AODV Based Gateway Discovery Mechanism for Ad-Hoc Network and Internet Integration | Abstract |
| Saba Naaz, Dr.B.V.R. Reddy | ||
| Vol 7, No 8 (2015) | An Approach for Scaling Resources for Applications in Cloud | Abstract |
| Ankita A. Rathor, Amar Buchade | ||
| Vol 2, No 2 (2010) | An Approach for Twofold Defend Secure Mobile Voting | Abstract |
| P. Shanthi Bala | ||
| Vol 7, No 5 (2015) | An Approach to Block Ciphering Using Root of Perfect Square Number | Abstract |
| Shibaranjan Bhattacharyya, Dr. Pranam Paul | ||
| Vol 7, No 9 (2015) | An Approach Towards Failover & Back-Up Recovery Services for Cloud Computing Environment | Abstract |
| A. Thiruneelakandan, Crisping Jones, S. Preethi, M. Mariappan | ||
| Vol 4, No 10 (2012): Regular Issue | An Approach towards Modeling and Detection of Camouflaging Worm using PSD Technique | Abstract |
| H. Rajeshwari, Basavaraj G.Kudamble | ||
| Vol 3, No 10 (2011) | An Architecture for FSM Based Web Service Composition | Abstract |
| Dr.M. Ezhilarasan, G. Kumaraguru, D. Balraj | ||
| Vol 2, No 4 (2010) | An Area Efficient Hard Decision Viterbi Decoder for Software Defined Radio Receiver | Abstract |
| S. Kayalvizhi, R. Chitra | ||
| Vol 12, No 1 (2020) | An Automatic Service Composition using Clustering Techniques | Abstract |
| Dr. K. Meenakshi Sundaram, T. Parimalam | ||
| Vol 3, No 6 (2011) | An E-Epidemic Model for Developing a Defense Mechanism against Computer Worms | Abstract |
| Upendra Kumar, Bimal Kumar Mishra, G. Sahoo | ||
| Vol 6, No 6 (2014) | An Effective and Secure Key Management Scheme in Multiphase Cryptosystem | Abstract |
| Manoj Kumar Pandey, Prateeksha Pandey | ||
| Vol 2, No 9 (2010) | An Effective Anomaly Intrusion Detection Using Statistical Change Point Detection | Abstract |
| M. Thangavel, Dr. P. Thangaraj | ||
| Vol 2, No 8 (2010) | An Effective Cost Optimized Provisioning Algorithm- (ECOPA) for Optical Networks | Abstract |
| R. Deepalakshmi, Dr. S. Rajaram | ||
| Vol 4, No 10 (2012): Regular Issue | An Effective Detection of Flooding Attacks using Decoy Hyperlinks | Abstract |
| K. Munivara Prasad, M. Ganesh Karthik, E.S. Phalguna Krishna | ||
| Vol 2, No 5 (2010) | An Effective Process Schedule by Clustered Servers | Abstract |
| R. Mala, Dr.R. Balasubramaniyan, A. Anandan | ||
| Vol 8, No 8 (2016) | An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics | Abstract |
| K.H. Aparna, M.B. Shyjith | ||
| Vol 7, No 10 (2015) | An Effective Trust Based Access Control Services for Adaptive Monitoring in Cloud Computing | Abstract |
| L.V Sowmya Therese | ||
| Vol 5, No 4 (2013) | An Effectual Integrity Verification with Reliable Mass Data Storage Scheme in Cloud Computing | Abstract |
| S.R. Nayana, G. VenifaMini, J.Jeya A Celin | ||
| 176 - 200 of 963 Items | << < 3 4 5 6 7 8 9 10 11 12 > >> | |
ISSN: 0974 – 9616