Browse Title Index

Issue Title
Vol 8, No 4 (2016) An Algorithm for Dexterous Scanning Neighbour Devices in Opportunistic Mobile Social Networks Abstract
K. Suganthi, K. Saranya
Vol 12, No 9-10 (2020) An Analysis of Cloud Networking and Cloud-based Data Center Networks Abstract
Nabil Bitar, Steven Gringeri
Vol 12, No 6-8 (2020) An Analysis of Cyber Security and Privacy issues in Big Data Analysis Abstract
M. Arias-Estévez, J Simal-Gándara
Vol 4, No 13 (2012) An Analysis of Topological Control Protocols & its Issues in Wireless Sensor Network Abstract
R. Venkatesan, Dr.A. Arul Lawrence Selvakumar
Vol 11, No 10 (2019) An Analysis of Wireless Sensor Network Attack Classification Abstract
D. Spirjakin
Vol 5, No 2 (2013) An Analysis on Mobile Visualization Connectionist IDS Abstract
K. Poongodi, B. Rosiline Jeetha
Vol 2, No 3 (2010) An Analytical Approach to Mitigate DDoS Attacks and Improve Network Performance under Collaborative Software as a Service (SaaS) Cloud Computing Environment Abstract
Palvinder Singh Mann, Dinesh Kumar
Vol 2, No 5 (2010) An AODV Based Gateway Discovery Mechanism for Ad-Hoc Network and Internet Integration Abstract
Saba Naaz, Dr.B.V.R. Reddy
Vol 7, No 8 (2015) An Approach for Scaling Resources for Applications in Cloud Abstract
Ankita A. Rathor, Amar Buchade
Vol 2, No 2 (2010) An Approach for Twofold Defend Secure Mobile Voting Abstract
P. Shanthi Bala
Vol 7, No 5 (2015) An Approach to Block Ciphering Using Root of Perfect Square Number Abstract
Shibaranjan Bhattacharyya, Dr. Pranam Paul
Vol 7, No 9 (2015) An Approach Towards Failover & Back-Up Recovery Services for Cloud Computing Environment Abstract
A. Thiruneelakandan, Crisping Jones, S. Preethi, M. Mariappan
Vol 4, No 10 (2012): Regular Issue An Approach towards Modeling and Detection of Camouflaging Worm using PSD Technique Abstract
H. Rajeshwari, Basavaraj G.Kudamble
Vol 3, No 10 (2011) An Architecture for FSM Based Web Service Composition Abstract
Dr.M. Ezhilarasan, G. Kumaraguru, D. Balraj
Vol 2, No 4 (2010) An Area Efficient Hard Decision Viterbi Decoder for Software Defined Radio Receiver Abstract
S. Kayalvizhi, R. Chitra
Vol 12, No 1 (2020) An Automatic Service Composition using Clustering Techniques Abstract
Dr. K. Meenakshi Sundaram, T. Parimalam
Vol 3, No 6 (2011) An E-Epidemic Model for Developing a Defense Mechanism against Computer Worms Abstract
Upendra Kumar, Bimal Kumar Mishra, G. Sahoo
Vol 6, No 6 (2014) An Effective and Secure Key Management Scheme in Multiphase Cryptosystem Abstract
Manoj Kumar Pandey, Prateeksha Pandey
Vol 2, No 9 (2010) An Effective Anomaly Intrusion Detection Using Statistical Change Point Detection Abstract
M. Thangavel, Dr. P. Thangaraj
Vol 2, No 8 (2010) An Effective Cost Optimized Provisioning Algorithm- (ECOPA) for Optical Networks Abstract
R. Deepalakshmi, Dr. S. Rajaram
Vol 4, No 10 (2012): Regular Issue An Effective Detection of Flooding Attacks using Decoy Hyperlinks Abstract
K. Munivara Prasad, M. Ganesh Karthik, E.S. Phalguna Krishna
Vol 2, No 5 (2010) An Effective Process Schedule by Clustered Servers Abstract
R. Mala, Dr.R. Balasubramaniyan, A. Anandan
Vol 8, No 8 (2016) An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics Abstract
K.H. Aparna, M.B. Shyjith
Vol 7, No 10 (2015) An Effective Trust Based Access Control Services for Adaptive Monitoring in Cloud Computing Abstract
L.V Sowmya Therese
Vol 5, No 4 (2013) An Effectual Integrity Verification with Reliable Mass Data Storage Scheme in Cloud Computing Abstract
S.R. Nayana, G. VenifaMini, J.Jeya A Celin
176 - 200 of 963 Items << < 3 4 5 6 7 8 9 10 11 12 > >> 

ISSN: 0974 – 9616