|
Issue |
Title |
|
Vol 5, No 2 (2019) |
Data-Mining Techniques for Routing Attacks in Wireless Sensor Networks |
Abstract
PDF
|
Ms. Asha R N, Mr. Venkatesan S |
|
Vol 4, No 3 (2018) |
Defending Web Applications from SQL Injection Attacks using Reliable and Economic Web Application Firewall |
Abstract
PDF
|
Ms. Sheetal Kondiba Kawale |
|
Vol 5, No 1 (2019) |
Deploying Six Sigma in Distributed Cluster based Routing using 1-Hop Relocation Algorithm |
Abstract
PDF
|
Ms. A. Kayalvizhi |
|
Vol 4, No 1,2 (2018) |
Design and Implementation of Children Safety System Using Internet of Things With Raspberry Pi |
Abstract
PDF
|
Ms. S. Indira, Ms. S. Helan Elizabath |
|
Vol 2, No 1, 2, 3 (2016) |
Detecting Traffic Anomalies in Network through Packet Header Data |
Abstract
PDF
|
Pallavi Prodyut Dev, Ashvini Sunilkumar Jaiswal |
|
Vol 5, No 3 (2019) |
Energy Conservation in IoT–A Survey |
Abstract
PDF
|
Ms. Ambika N |
|
Vol 2, No 1, 2, 3 (2016) |
Energy Efficient and Trust Based Black Hole Attack Identification Model in Wireless Sensor Networks |
Abstract
PDF
|
Rajesh Kumar D, Shanmugam A |
|
Vol 1, No 1, 2, 3 (2015) |
Expert System |
Abstract
PDF
|
R. Kanchana |
|
Vol 3, No 1, 2, 3 (2017) |
Finding Inference Path in WSN using Bootstrapping Algorithm |
Abstract
PDF
|
S. S. Doshi, K. A. Ghadage, M. G. Pansare, D. B. Rupnawar, S. A. Sirdeshpande |
|
Vol 3, No 1, 2, 3 (2017) |
Industrial Control System Cyber Security: Review & Recommendations |
Abstract
PDF
|
Vikramsingh R. Parihar, Anagha P. Dhote |
|
Vol 5, No 3 (2019) |
Investigating the Various Approaches towards Handwritten Digit Recognition |
Abstract
PDF
|
Mr. Prashanth Kambli, Ms. Amruthalakshmi |
|
Vol 3, No 1, 2, 3 (2017) |
Maintaining Health Care Records By Efficient Privacy Preservation Techniques |
Abstract
PDF
|
Theivanathan. G, Shankari. R, Sandhya. S. |
|
Vol 3, No 1, 2, 3 (2017) |
Modified AODV Protocol for Securing Moblie Adhoc Networks |
Abstract
PDF
|
S. A Arunmozhi |
|
Vol 5, No 1 (2019) |
Out of Band Leakage Performance of Generalized Frequency Division Multiplexing |
Abstract
PDF
|
Ms. Chhavi Sharma, Mr. S.K Tomar, Mr. Arvind Kumar |
|
Vol 3, No 1, 2, 3 (2017) |
Perlustration on Authentication Protocols in 4G (LTE/LTE-A) Using Pro-Verif |
Abstract
PDF
|
Abisha D |
|
Vol 2, No 1, 2, 3 (2016) |
Review on Security Issues in Private Cloud |
Abstract
PDF
|
Bhagyashri V. Pasarkar, Pooja V. Chavan |
|
Vol 2, No 1, 2, 3 (2016) |
Security Mechanisms in Wireless Network |
Abstract
PDF
|
V. K. Pachghare, Samiksha V. Pachghare |
|
Vol 5, No 1 (2019) |
Stock Alert System Using IOT |
Abstract
PDF
|
Prof. K.D. Patil, Mr. Hrishikesh Jadhav, Mr. Juned Shaikh, Mr. Rakesh Sakala |
|
Vol 2, No 1, 2, 3 (2016) |
Student Mentality towards Learning |
Abstract
PDF
|
Prachi Dusad, Prerana Choukda |
|
Vol 4, No 3 (2018) |
Using Neural Networks Identification of Word Sense |
Abstract
PDF
|
Ms. S. Savitha, Mr. S. Yuvalath |
|
Vol 1, No 1, 2, 3 (2015) |
Variants of ACO Comparisons for Network Routing Problem, An Analysis |
Abstract
PDF
|
Debabrata Singh, Chandan Kumar Panda, Sneha Patnaik |
|
Vol 4, No 1,2 (2018) |
Visual Cryptography for Security of Images |
Abstract
PDF
|
Shruti Neralkar, Jayashree V. Katti |
|
Vol 3, No 1, 2, 3 (2017) |
Vulnerabilities Revealing Through Web Application Scanner |
Abstract
PDF
|
Deven A. Gol, Priyank Bhojak, Hiren Patel |
|
Vol 5, No 2 (2019) |
Wireless Sensing of Gestures using MEMS Accelerometer |
Abstract
PDF
|
Mr. Rajath Ravi, Mr. Rohan R Koundinya, Mr. T S Srinivas Naidu, Mr. Vaishnav Manoharan, Ms. Anu H |
|
26 - 49 of 49 Items |
<< < 1 2 |