Issue | Title | |
Vol 8, No 4 (2016) | An Algorithm for Dexterous Scanning Neighbour Devices in Opportunistic Mobile Social Networks | Abstract |
K. Suganthi, K. Saranya | ||
Vol 12, No 9-10 (2020) | An Analysis of Cloud Networking and Cloud-based Data Center Networks | Abstract |
Nabil Bitar, Steven Gringeri | ||
Vol 12, No 6-8 (2020) | An Analysis of Cyber Security and Privacy issues in Big Data Analysis | Abstract |
M. Arias-Estévez, J Simal-Gándara | ||
Vol 4, No 13 (2012) | An Analysis of Topological Control Protocols & its Issues in Wireless Sensor Network | Abstract |
R. Venkatesan, Dr.A. Arul Lawrence Selvakumar | ||
Vol 11, No 10 (2019) | An Analysis of Wireless Sensor Network Attack Classification | Abstract |
D. Spirjakin | ||
Vol 5, No 2 (2013) | An Analysis on Mobile Visualization Connectionist IDS | Abstract |
K. Poongodi, B. Rosiline Jeetha | ||
Vol 2, No 3 (2010) | An Analytical Approach to Mitigate DDoS Attacks and Improve Network Performance under Collaborative Software as a Service (SaaS) Cloud Computing Environment | Abstract |
Palvinder Singh Mann, Dinesh Kumar | ||
Vol 2, No 5 (2010) | An AODV Based Gateway Discovery Mechanism for Ad-Hoc Network and Internet Integration | Abstract |
Saba Naaz, Dr.B.V.R. Reddy | ||
Vol 7, No 8 (2015) | An Approach for Scaling Resources for Applications in Cloud | Abstract |
Ankita A. Rathor, Amar Buchade | ||
Vol 2, No 2 (2010) | An Approach for Twofold Defend Secure Mobile Voting | Abstract |
P. Shanthi Bala | ||
Vol 7, No 5 (2015) | An Approach to Block Ciphering Using Root of Perfect Square Number | Abstract |
Shibaranjan Bhattacharyya, Dr. Pranam Paul | ||
Vol 7, No 9 (2015) | An Approach Towards Failover & Back-Up Recovery Services for Cloud Computing Environment | Abstract |
A. Thiruneelakandan, Crisping Jones, S. Preethi, M. Mariappan | ||
Vol 4, No 10 (2012): Regular Issue | An Approach towards Modeling and Detection of Camouflaging Worm using PSD Technique | Abstract |
H. Rajeshwari, Basavaraj G.Kudamble | ||
Vol 3, No 10 (2011) | An Architecture for FSM Based Web Service Composition | Abstract |
Dr.M. Ezhilarasan, G. Kumaraguru, D. Balraj | ||
Vol 2, No 4 (2010) | An Area Efficient Hard Decision Viterbi Decoder for Software Defined Radio Receiver | Abstract |
S. Kayalvizhi, R. Chitra | ||
Vol 12, No 1 (2020) | An Automatic Service Composition using Clustering Techniques | Abstract |
Dr. K. Meenakshi Sundaram, T. Parimalam | ||
Vol 3, No 6 (2011) | An E-Epidemic Model for Developing a Defense Mechanism against Computer Worms | Abstract |
Upendra Kumar, Bimal Kumar Mishra, G. Sahoo | ||
Vol 6, No 6 (2014) | An Effective and Secure Key Management Scheme in Multiphase Cryptosystem | Abstract |
Manoj Kumar Pandey, Prateeksha Pandey | ||
Vol 2, No 9 (2010) | An Effective Anomaly Intrusion Detection Using Statistical Change Point Detection | Abstract |
M. Thangavel, Dr. P. Thangaraj | ||
Vol 2, No 8 (2010) | An Effective Cost Optimized Provisioning Algorithm- (ECOPA) for Optical Networks | Abstract |
R. Deepalakshmi, Dr. S. Rajaram | ||
Vol 4, No 10 (2012): Regular Issue | An Effective Detection of Flooding Attacks using Decoy Hyperlinks | Abstract |
K. Munivara Prasad, M. Ganesh Karthik, E.S. Phalguna Krishna | ||
Vol 2, No 5 (2010) | An Effective Process Schedule by Clustered Servers | Abstract |
R. Mala, Dr.R. Balasubramaniyan, A. Anandan | ||
Vol 8, No 8 (2016) | An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics | Abstract |
K.H. Aparna, M.B. Shyjith | ||
Vol 7, No 10 (2015) | An Effective Trust Based Access Control Services for Adaptive Monitoring in Cloud Computing | Abstract |
L.V Sowmya Therese | ||
Vol 5, No 4 (2013) | An Effectual Integrity Verification with Reliable Mass Data Storage Scheme in Cloud Computing | Abstract |
S.R. Nayana, G. VenifaMini, J.Jeya A Celin | ||
176 - 200 of 963 Items | << < 3 4 5 6 7 8 9 10 11 12 > >> |
ISSN: 0974 – 9616