| Issue | Title | |
| Vol 5, No 2 (2019) | Data-Mining Techniques for Routing Attacks in Wireless Sensor Networks | Abstract PDF |
| Ms. Asha R N, Mr. Venkatesan S | ||
| Vol 4, No 3 (2018) | Defending Web Applications from SQL Injection Attacks using Reliable and Economic Web Application Firewall | Abstract PDF |
| Ms. Sheetal Kondiba Kawale | ||
| Vol 5, No 1 (2019) | Deploying Six Sigma in Distributed Cluster based Routing using 1-Hop Relocation Algorithm | Abstract PDF |
| Ms. A. Kayalvizhi | ||
| Vol 4, No 1,2 (2018) | Design and Implementation of Children Safety System Using Internet of Things With Raspberry Pi | Abstract PDF |
| Ms. S. Indira, Ms. S. Helan Elizabath | ||
| Vol 2, No 1, 2, 3 (2016) | Detecting Traffic Anomalies in Network through Packet Header Data | Abstract PDF |
| Pallavi Prodyut Dev, Ashvini Sunilkumar Jaiswal | ||
| Vol 5, No 3 (2019) | Energy Conservation in IoT–A Survey | Abstract PDF |
| Ms. Ambika N | ||
| Vol 2, No 1, 2, 3 (2016) | Energy Efficient and Trust Based Black Hole Attack Identification Model in Wireless Sensor Networks | Abstract PDF |
| Rajesh Kumar D, Shanmugam A | ||
| Vol 1, No 1, 2, 3 (2015) | Expert System | Abstract PDF |
| R. Kanchana | ||
| Vol 3, No 1, 2, 3 (2017) | Finding Inference Path in WSN using Bootstrapping Algorithm | Abstract PDF |
| S. S. Doshi, K. A. Ghadage, M. G. Pansare, D. B. Rupnawar, S. A. Sirdeshpande | ||
| Vol 3, No 1, 2, 3 (2017) | Industrial Control System Cyber Security: Review & Recommendations | Abstract PDF |
| Vikramsingh R. Parihar, Anagha P. Dhote | ||
| Vol 5, No 3 (2019) | Investigating the Various Approaches towards Handwritten Digit Recognition | Abstract PDF |
| Mr. Prashanth Kambli, Ms. Amruthalakshmi | ||
| Vol 3, No 1, 2, 3 (2017) | Maintaining Health Care Records By Efficient Privacy Preservation Techniques | Abstract PDF |
| Theivanathan. G, Shankari. R, Sandhya. S. | ||
| Vol 3, No 1, 2, 3 (2017) | Modified AODV Protocol for Securing Moblie Adhoc Networks | Abstract PDF |
| S. A Arunmozhi | ||
| Vol 5, No 1 (2019) | Out of Band Leakage Performance of Generalized Frequency Division Multiplexing | Abstract PDF |
| Ms. Chhavi Sharma, Mr. S.K Tomar, Mr. Arvind Kumar | ||
| Vol 3, No 1, 2, 3 (2017) | Perlustration on Authentication Protocols in 4G (LTE/LTE-A) Using Pro-Verif | Abstract PDF |
| Abisha D | ||
| Vol 2, No 1, 2, 3 (2016) | Review on Security Issues in Private Cloud | Abstract PDF |
| Bhagyashri V. Pasarkar, Pooja V. Chavan | ||
| Vol 2, No 1, 2, 3 (2016) | Security Mechanisms in Wireless Network | Abstract PDF |
| V. K. Pachghare, Samiksha V. Pachghare | ||
| Vol 5, No 1 (2019) | Stock Alert System Using IOT | Abstract PDF |
| Prof. K.D. Patil, Mr. Hrishikesh Jadhav, Mr. Juned Shaikh, Mr. Rakesh Sakala | ||
| Vol 2, No 1, 2, 3 (2016) | Student Mentality towards Learning | Abstract PDF |
| Prachi Dusad, Prerana Choukda | ||
| Vol 4, No 3 (2018) | Using Neural Networks Identification of Word Sense | Abstract PDF |
| Ms. S. Savitha, Mr. S. Yuvalath | ||
| Vol 1, No 1, 2, 3 (2015) | Variants of ACO Comparisons for Network Routing Problem, An Analysis | Abstract PDF |
| Debabrata Singh, Chandan Kumar Panda, Sneha Patnaik | ||
| Vol 4, No 1,2 (2018) | Visual Cryptography for Security of Images | Abstract PDF |
| Shruti Neralkar, Jayashree V. Katti | ||
| Vol 3, No 1, 2, 3 (2017) | Vulnerabilities Revealing Through Web Application Scanner | Abstract PDF |
| Deven A. Gol, Priyank Bhojak, Hiren Patel | ||
| Vol 5, No 2 (2019) | Wireless Sensing of Gestures using MEMS Accelerometer | Abstract PDF |
| Mr. Rajath Ravi, Mr. Rohan R Koundinya, Mr. T S Srinivas Naidu, Mr. Vaishnav Manoharan, Ms. Anu H | ||
| 26 - 49 of 49 Items | << < 1 2 | |