|
Issue |
Title |
|
Vol 1, No 4 (2012) |
Knowledge Extraction From Trained Neural Networks |
Abstract
PDF
|
Koushal Kumar |
|
Vol 1, No 4 (2012) |
Legal, Ethical & Social Issues in the case of an Intrusive Remote Monitoring Software |
Abstract
PDF
|
Shaun McBrearty, Nigel McKelvey, Kevin Curran |
|
Vol 3, No 3 (2014) |
Machine Learning based Research for Network Intrusion Detection: A State-of-the-Art |
Abstract
PDF
|
Kanubhai K. Patel, Bharat V. Buddhadev |
|
Vol 3, No 4 (2014) |
Mining Reviews in Open Source Code for Developers Trail: A Process Mining Approach |
Abstract
PDF
|
Patrick Mukala |
|
Vol 1, No 4 (2012) |
Mitigation of the Excessive Non-ionized Radiation of Base Transceiver in Developing Countries |
Abstract
PDF
|
Rakhi Roy, Himadri Subrah Saha |
|
Vol 1, No 2 (2012) |
Mobile Geographic Information System Platform (MGISP): A GPS Information Collection System |
Abstract
PDF
|
Abdelilah Azyat, Naoufal Raissouni, Nizar Ben Achhab, Mohamad Lahraoua, Asaad Chahboun |
|
Vol 2, No 1 (2013) |
Modeling and Verification of Access Rights in Take-Grant Protection Model Using Colored Petri Nets |
Abstract
PDF
|
Saeid Pashazadeh |
|
Vol 2, No 5 (2013) |
Modeling Kerberos Authentication Protocol Using Colored Petri Net |
Abstract
PDF
|
Amir Keshvari Ilkhichi, Saeid Pashazadeh |
|
Vol 2, No 2 (2013) |
Moments and Similarity Measure Feature Based Image Steganalysis Technique (MSM) |
Abstract
PDF
|
Souvik Bhattacharyya, Gautam Sanyal |
|
Vol 3, No 3 (2014) |
Multi-Agent Distributed Intrusion Detection System Model Based on BP Neural Network |
Abstract
PDF
|
Zhai Shuang-can, Hu Chen-jun, Zhang Wei-ming |
|
Vol 2, No 6 (2013) |
Multicast in Multi Protocol Label Switching: A comparison study between LDP and RSVP-TE |
Abstract
PDF
|
Mohamad Chaitou, Hussein Charara |
|
Vol 3, No 2 (2014) |
Multiplicative Learning with Errors and Cryptosystems |
Abstract
PDF
|
Gu Chun-sheng |
|
Vol 2, No 4 (2013) |
New GSM, DCS and GSM/DCS Pifa Antennas Designs for Wireless Networks Applications |
Abstract
PDF
|
M. Abri, N. Belgacem, W. Belgacem |
|
Vol 1, No 4 (2012) |
Normalized Image Watermarking Scheme Using Chaotic System |
Abstract
PDF
|
G.Rosline Nesakumari, S. Maruthuperumal |
|
Vol 1, No 4 (2012) |
Novel Cipher Technique Using Substitution Method |
Abstract
PDF
|
Shobha Vatsa, Tanmeya Mohan, A. K. Vatsa |
|
Vol 1, No 3 (2012) |
Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords |
Abstract
PDF
|
M. Kameswara Rao, Sushma Yalamanchili |
|
Vol 2, No 5 (2013) |
On Information Overload Subjugation: Proposing an Intelligent Data Warehouse (IDW) Model |
Abstract
PDF
|
Patrick Mukala, Prof. Van der Walt |
|
Vol 3, No 5 (2014) |
Optimized Partial Image Encryption Using Pixel Position Manipulation Technique Based on Region of Interest |
Abstract
PDF
|
Parameshachari B D, Dr. K M Sunjiv Soyjaudah, Dr. Sumithra Devi K A |
|
Vol 2, No 4 (2013) |
Optimum Dynamic Diffusion of Block Cipher Based on Maximum Distance Separable Matrices |
Abstract
PDF
|
Adham M. Elhosary, Nabil Hamdy, Ismail Abdel-Ghafar Farag, Alaa Eldin Rohiem |
|
Vol 3, No 6 (2014) |
Ordered Merkle Tree: A Dynamic Authenticated Data Structure for Security Kernels |
Abstract
PDF
|
Somya D. Mohanty, Mahalingam Ramkumar |
|
Vol 1, No 3 (2012) |
Pattern Based Network Security Using Semi-Supervised Learning |
Abstract
PDF
|
V K Pachghare, V K Khatavkar, Parag Kulkarni |
|
Vol 2, No 5 (2013) |
Payload Attribution Using Winnowing Multi Hashing Method |
Abstract
PDF
|
Irwan Sembiring, Jazi Eko Istiyanto, Edi Winarko, Ahmad Ashari |
|
Vol 2, No 2 (2013) |
PCI Compliance – No excuses, please |
Abstract
PDF
|
Martin Harran, Nigel McKelvey |
|
Vol 3, No 4 (2014) |
PDH-Clustering in wireless sensor networks |
Abstract
PDF
|
Hamta Sedghani, Mina Zolfy Lighvan |
|
Vol 1, No 2 (2012) |
Peak-Throughput of LTE-Release 10 for Up/Down Link Physical Layer |
Abstract
PDF
|
Aws Zuheer Yonis, Mohammad Faiz Liew Abdullah |
|
76 - 100 of 131 Items |
<< < 1 2 3 4 5 6 > >> |