Browse Title Index


 
Issue Title
 
Vol 3, No 1, 2, 3 (2017) A Comparative Analysis of Various Cluster Head Selection in Mobile Adhoc Networks Abstract   PDF
S. Rajasekar, A. Subramani
 
Vol 2, No 1, 2, 3 (2016) A Cross Layer Approach to Improve QoS in Mobile Ad hoc Networks Abstract   PDF
S. A. Arunmozhi
 
Vol 1, No 1, 2, 3 (2015) A Novel Approach for Conserving Spring Location Privacy in Wireless Sensor Networks Abstract   PDF
G. Narendran
 
Vol 3, No 1, 2, 3 (2017) A Review on Stable Techniques In Unstructured Network For Routing Queries Abstract   PDF
Kale Vishwajeet D., Tamboli Nilofar S., Jadhav Suvarna H., Khade Sonali S., Prof. S. B. Bandgar
 
Vol 2, No 1, 2, 3 (2016) A Study on Hybrid Cellular Energy Aware Routing for MANETs Abstract   PDF
Benakappa S M, Smitha Ram G
 
Vol 2, No 1, 2, 3 (2016) A Survey on Anti-Theft System for Vehicle Security Abstract   PDF
S. L. Farpat
 
Vol 1, No 1, 2, 3 (2015) An Analysis of Denial-of-Service Attacks Using TCP Reflectors Abstract   PDF
Iyakutti Lakshmi, K Iyakutti, M. Saravanan
 
Vol 2, No 1, 2, 3 (2016) An Analysis of Quantum Factoring using Shors Algorithm Abstract   PDF
K. H. Vani, A. G. Aruna
 
Vol 2, No 1, 2, 3 (2016) Analysis and Simulation of Energy Efficient Optimal Scenarios for Cluster Based Routing Protocol in Wireless Sensor Network Abstract   PDF
Arushi Sharma, Megha Agrawal, Mehak Sondhi, Ajay Kumar Singh
 
Vol 3, No 1, 2, 3 (2017) Challenges of Network Layer Various Attacks for MANET – A Survey Abstract   PDF
K. Thamizmaran, Akshayadevi Arivazhagan, Rajasri Arivazhagan
 
Vol 1, No 1, 2, 3 (2015) Data Security Issues in Cloud Computing Abstract   PDF
Arjun U, Vinay S
 
Vol 2, No 1, 2, 3 (2016) Detecting Traffic Anomalies in Network through Packet Header Data Abstract   PDF
Pallavi Prodyut Dev, Ashvini Sunilkumar Jaiswal
 
Vol 2, No 1, 2, 3 (2016) Energy Efficient and Trust Based Black Hole Attack Identification Model in Wireless Sensor Networks Abstract   PDF
Rajesh Kumar D, Shanmugam A
 
Vol 1, No 1, 2, 3 (2015) Expert System Abstract   PDF
R. Kanchana
 
Vol 3, No 1, 2, 3 (2017) Finding Inference Path in WSN using Bootstrapping Algorithm Abstract   PDF
S. S. Doshi, K. A. Ghadage, M. G. Pansare, D. B. Rupnawar, S. A. Sirdeshpande
 
Vol 3, No 1, 2, 3 (2017) Industrial Control System Cyber Security: Review & Recommendations Abstract   PDF
Vikramsingh R. Parihar, Anagha P. Dhote
 
Vol 3, No 1, 2, 3 (2017) Maintaining Health Care Records By Efficient Privacy Preservation Techniques Abstract   PDF
Theivanathan. G, Shankari. R, Sandhya. S.
 
Vol 3, No 1, 2, 3 (2017) Modified AODV Protocol for Securing Moblie Adhoc Networks Abstract   PDF
S. A Arunmozhi
 
Vol 3, No 1, 2, 3 (2017) Perlustration on Authentication Protocols in 4G (LTE/LTE-A) Using Pro-Verif Abstract   PDF
Abisha D
 
Vol 2, No 1, 2, 3 (2016) Review on Security Issues in Private Cloud Abstract   PDF
Bhagyashri V. Pasarkar, Pooja V. Chavan
 
Vol 2, No 1, 2, 3 (2016) Security Mechanisms in Wireless Network Abstract   PDF
V. K. Pachghare, Samiksha V. Pachghare
 
Vol 2, No 1, 2, 3 (2016) Student Mentality towards Learning Abstract   PDF
Prachi Dusad, Prerana Choukda
 
Vol 1, No 1, 2, 3 (2015) Variants of ACO Comparisons for Network Routing Problem, An Analysis Abstract   PDF
Debabrata Singh, Chandan Kumar Panda, Sneha Patnaik
 
Vol 3, No 1, 2, 3 (2017) Vulnerabilities Revealing Through Web Application Scanner Abstract   PDF
Deven A. Gol, Priyank Bhojak, Hiren Patel
 
1 - 24 of 24 Items