Browse Title Index


 
Issue Title
 
Vol 12, No 9-10 (2020) An Analysis of Cloud Networking and Cloud-based Data Center Networks Abstract
Nabil Bitar, Steven Gringeri
 
Vol 12, No 6-8 (2020) An Analysis of Cyber Security and Privacy issues in Big Data Analysis Abstract
M. Arias-Estévez, J Simal-Gándara
 
Vol 4, No 13 (2012) An Analysis of Topological Control Protocols & its Issues in Wireless Sensor Network Abstract
R. Venkatesan, Dr.A. Arul Lawrence Selvakumar
 
Vol 11, No 10 (2019) An Analysis of Wireless Sensor Network Attack Classification Abstract
D. Spirjakin
 
Vol 5, No 2 (2013) An Analysis on Mobile Visualization Connectionist IDS Abstract
K. Poongodi, B. Rosiline Jeetha
 
Vol 2, No 3 (2010) An Analytical Approach to Mitigate DDoS Attacks and Improve Network Performance under Collaborative Software as a Service (SaaS) Cloud Computing Environment Abstract
Palvinder Singh Mann, Dinesh Kumar
 
Vol 2, No 5 (2010) An AODV Based Gateway Discovery Mechanism for Ad-Hoc Network and Internet Integration Abstract
Saba Naaz, Dr.B.V.R. Reddy
 
Vol 7, No 8 (2015) An Approach for Scaling Resources for Applications in Cloud Abstract
Ankita A. Rathor, Amar Buchade
 
Vol 2, No 2 (2010) An Approach for Twofold Defend Secure Mobile Voting Abstract
P. Shanthi Bala
 
Vol 7, No 5 (2015) An Approach to Block Ciphering Using Root of Perfect Square Number Abstract
Shibaranjan Bhattacharyya, Dr. Pranam Paul
 
Vol 7, No 9 (2015) An Approach Towards Failover & Back-Up Recovery Services for Cloud Computing Environment Abstract
A. Thiruneelakandan, Crisping Jones, S. Preethi, M. Mariappan
 
Vol 4, No 10 (2012): Regular Issue An Approach towards Modeling and Detection of Camouflaging Worm using PSD Technique Abstract
H. Rajeshwari, Basavaraj G.Kudamble
 
Vol 3, No 10 (2011) An Architecture for FSM Based Web Service Composition Abstract
Dr.M. Ezhilarasan, G. Kumaraguru, D. Balraj
 
Vol 2, No 4 (2010) An Area Efficient Hard Decision Viterbi Decoder for Software Defined Radio Receiver Abstract
S. Kayalvizhi, R. Chitra
 
Vol 12, No 1 (2020) An Automatic Service Composition using Clustering Techniques Abstract
Dr. K. Meenakshi Sundaram, T. Parimalam
 
Vol 3, No 6 (2011) An E-Epidemic Model for Developing a Defense Mechanism against Computer Worms Abstract
Upendra Kumar, Bimal Kumar Mishra, G. Sahoo
 
Vol 6, No 6 (2014) An Effective and Secure Key Management Scheme in Multiphase Cryptosystem Abstract
Manoj Kumar Pandey, Prateeksha Pandey
 
Vol 2, No 9 (2010) An Effective Anomaly Intrusion Detection Using Statistical Change Point Detection Abstract
M. Thangavel, Dr. P. Thangaraj
 
Vol 2, No 8 (2010) An Effective Cost Optimized Provisioning Algorithm- (ECOPA) for Optical Networks Abstract
R. Deepalakshmi, Dr. S. Rajaram
 
Vol 4, No 10 (2012): Regular Issue An Effective Detection of Flooding Attacks using Decoy Hyperlinks Abstract
K. Munivara Prasad, M. Ganesh Karthik, E.S. Phalguna Krishna
 
Vol 2, No 5 (2010) An Effective Process Schedule by Clustered Servers Abstract
R. Mala, Dr.R. Balasubramaniyan, A. Anandan
 
Vol 8, No 8 (2016) An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics Abstract
K.H. Aparna, M.B. Shyjith
 
Vol 7, No 10 (2015) An Effective Trust Based Access Control Services for Adaptive Monitoring in Cloud Computing Abstract
L.V Sowmya Therese
 
Vol 5, No 4 (2013) An Effectual Integrity Verification with Reliable Mass Data Storage Scheme in Cloud Computing Abstract
S.R. Nayana, G. VenifaMini, J.Jeya A Celin
 
Vol 2, No 7 (2010) An Efficient Minimum-process Checkpointing Scheme for Non-Deterministic Mobile Distributed Systems Abstract
Parveen Kumar, Preeti Gupta, Anil Kumar Solanki
 
176 - 200 of 960 Items << < 3 4 5 6 7 8 9 10 11 12 > >> 


ISSN: 0974 – 9616