Browse Title Index


 
Issue Title
 
Vol 1, No 4 (2012) Knowledge Extraction From Trained Neural Networks Abstract   PDF
Koushal Kumar
 
Vol 1, No 4 (2012) Legal, Ethical & Social Issues in the case of an Intrusive Remote Monitoring Software Abstract   PDF
Shaun McBrearty, Nigel McKelvey, Kevin Curran
 
Vol 3, No 3 (2014) Machine Learning based Research for Network Intrusion Detection: A State-of-the-Art Abstract   PDF
Kanubhai K. Patel, Bharat V. Buddhadev
 
Vol 3, No 4 (2014) Mining Reviews in Open Source Code for Developers Trail: A Process Mining Approach Abstract   PDF
Patrick Mukala
 
Vol 1, No 4 (2012) Mitigation of the Excessive Non-ionized Radiation of Base Transceiver in Developing Countries Abstract   PDF
Rakhi Roy, Himadri Subrah Saha
 
Vol 1, No 2 (2012) Mobile Geographic Information System Platform (MGISP): A GPS Information Collection System Abstract   PDF
Abdelilah Azyat, Naoufal Raissouni, Nizar Ben Achhab, Mohamad Lahraoua, Asaad Chahboun
 
Vol 2, No 1 (2013) Modeling and Verification of Access Rights in Take-Grant Protection Model Using Colored Petri Nets Abstract   PDF
Saeid Pashazadeh
 
Vol 2, No 5 (2013) Modeling Kerberos Authentication Protocol Using Colored Petri Net Abstract   PDF
Amir Keshvari Ilkhichi, Saeid Pashazadeh
 
Vol 2, No 2 (2013) Moments and Similarity Measure Feature Based Image Steganalysis Technique (MSM) Abstract   PDF
Souvik Bhattacharyya, Gautam Sanyal
 
Vol 3, No 3 (2014) Multi-Agent Distributed Intrusion Detection System Model Based on BP Neural Network Abstract   PDF
Zhai Shuang-can, Hu Chen-jun, Zhang Wei-ming
 
Vol 2, No 6 (2013) Multicast in Multi Protocol Label Switching: A comparison study between LDP and RSVP-TE Abstract   PDF
Mohamad Chaitou, Hussein Charara
 
Vol 3, No 2 (2014) Multiplicative Learning with Errors and Cryptosystems Abstract   PDF
Gu Chun-sheng
 
Vol 2, No 4 (2013) New GSM, DCS and GSM/DCS Pifa Antennas Designs for Wireless Networks Applications Abstract   PDF
M. Abri, N. Belgacem, W. Belgacem
 
Vol 1, No 4 (2012) Normalized Image Watermarking Scheme Using Chaotic System Abstract   PDF
G.Rosline Nesakumari, S. Maruthuperumal
 
Vol 1, No 4 (2012) Novel Cipher Technique Using Substitution Method Abstract   PDF
Shobha Vatsa, Tanmeya Mohan, A. K. Vatsa
 
Vol 1, No 3 (2012) Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords Abstract   PDF
M. Kameswara Rao, Sushma Yalamanchili
 
Vol 2, No 5 (2013) On Information Overload Subjugation: Proposing an Intelligent Data Warehouse (IDW) Model Abstract   PDF
Patrick Mukala, Prof. Van der Walt
 
Vol 3, No 5 (2014) Optimized Partial Image Encryption Using Pixel Position Manipulation Technique Based on Region of Interest Abstract   PDF
Parameshachari B D, Dr. K M Sunjiv Soyjaudah, Dr. Sumithra Devi K A
 
Vol 2, No 4 (2013) Optimum Dynamic Diffusion of Block Cipher Based on Maximum Distance Separable Matrices Abstract   PDF
Adham M. Elhosary, Nabil Hamdy, Ismail Abdel-Ghafar Farag, Alaa Eldin Rohiem
 
Vol 3, No 6 (2014) Ordered Merkle Tree: A Dynamic Authenticated Data Structure for Security Kernels Abstract   PDF
Somya D. Mohanty, Mahalingam Ramkumar
 
Vol 1, No 3 (2012) Pattern Based Network Security Using Semi-Supervised Learning Abstract   PDF
V K Pachghare, V K Khatavkar, Parag Kulkarni
 
Vol 2, No 5 (2013) Payload Attribution Using Winnowing Multi Hashing Method Abstract   PDF
Irwan Sembiring, Jazi Eko Istiyanto, Edi Winarko, Ahmad Ashari
 
Vol 2, No 2 (2013) PCI Compliance – No excuses, please Abstract   PDF
Martin Harran, Nigel McKelvey
 
Vol 3, No 4 (2014) PDH-Clustering in wireless sensor networks Abstract   PDF
Hamta Sedghani, Mina Zolfy Lighvan
 
Vol 1, No 2 (2012) Peak-Throughput of LTE-Release 10 for Up/Down Link Physical Layer Abstract   PDF
Aws Zuheer Yonis, Mohammad Faiz Liew Abdullah
 
76 - 100 of 131 Items << < 1 2 3 4 5 6 > >>