| Issue | Title | |
| Vol 1, No 4 (2012) | Knowledge Extraction From Trained Neural Networks | Abstract PDF |
| Koushal Kumar | ||
| Vol 1, No 4 (2012) | Legal, Ethical & Social Issues in the case of an Intrusive Remote Monitoring Software | Abstract PDF |
| Shaun McBrearty, Nigel McKelvey, Kevin Curran | ||
| Vol 3, No 3 (2014) | Machine Learning based Research for Network Intrusion Detection: A State-of-the-Art | Abstract PDF |
| Kanubhai K. Patel, Bharat V. Buddhadev | ||
| Vol 3, No 4 (2014) | Mining Reviews in Open Source Code for Developers Trail: A Process Mining Approach | Abstract PDF |
| Patrick Mukala | ||
| Vol 1, No 4 (2012) | Mitigation of the Excessive Non-ionized Radiation of Base Transceiver in Developing Countries | Abstract PDF |
| Rakhi Roy, Himadri Subrah Saha | ||
| Vol 1, No 2 (2012) | Mobile Geographic Information System Platform (MGISP): A GPS Information Collection System | Abstract PDF |
| Abdelilah Azyat, Naoufal Raissouni, Nizar Ben Achhab, Mohamad Lahraoua, Asaad Chahboun | ||
| Vol 2, No 1 (2013) | Modeling and Verification of Access Rights in Take-Grant Protection Model Using Colored Petri Nets | Abstract PDF |
| Saeid Pashazadeh | ||
| Vol 2, No 5 (2013) | Modeling Kerberos Authentication Protocol Using Colored Petri Net | Abstract PDF |
| Amir Keshvari Ilkhichi, Saeid Pashazadeh | ||
| Vol 2, No 2 (2013) | Moments and Similarity Measure Feature Based Image Steganalysis Technique (MSM) | Abstract PDF |
| Souvik Bhattacharyya, Gautam Sanyal | ||
| Vol 3, No 3 (2014) | Multi-Agent Distributed Intrusion Detection System Model Based on BP Neural Network | Abstract PDF |
| Zhai Shuang-can, Hu Chen-jun, Zhang Wei-ming | ||
| Vol 2, No 6 (2013) | Multicast in Multi Protocol Label Switching: A comparison study between LDP and RSVP-TE | Abstract PDF |
| Mohamad Chaitou, Hussein Charara | ||
| Vol 3, No 2 (2014) | Multiplicative Learning with Errors and Cryptosystems | Abstract PDF |
| Gu Chun-sheng | ||
| Vol 2, No 4 (2013) | New GSM, DCS and GSM/DCS Pifa Antennas Designs for Wireless Networks Applications | Abstract PDF |
| M. Abri, N. Belgacem, W. Belgacem | ||
| Vol 1, No 4 (2012) | Normalized Image Watermarking Scheme Using Chaotic System | Abstract PDF |
| G.Rosline Nesakumari, S. Maruthuperumal | ||
| Vol 1, No 4 (2012) | Novel Cipher Technique Using Substitution Method | Abstract PDF |
| Shobha Vatsa, Tanmeya Mohan, A. K. Vatsa | ||
| Vol 1, No 3 (2012) | Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords | Abstract PDF |
| M. Kameswara Rao, Sushma Yalamanchili | ||
| Vol 2, No 5 (2013) | On Information Overload Subjugation: Proposing an Intelligent Data Warehouse (IDW) Model | Abstract PDF |
| Patrick Mukala, Prof. Van der Walt | ||
| Vol 3, No 5 (2014) | Optimized Partial Image Encryption Using Pixel Position Manipulation Technique Based on Region of Interest | Abstract PDF |
| Parameshachari B D, Dr. K M Sunjiv Soyjaudah, Dr. Sumithra Devi K A | ||
| Vol 2, No 4 (2013) | Optimum Dynamic Diffusion of Block Cipher Based on Maximum Distance Separable Matrices | Abstract PDF |
| Adham M. Elhosary, Nabil Hamdy, Ismail Abdel-Ghafar Farag, Alaa Eldin Rohiem | ||
| Vol 3, No 6 (2014) | Ordered Merkle Tree: A Dynamic Authenticated Data Structure for Security Kernels | Abstract PDF |
| Somya D. Mohanty, Mahalingam Ramkumar | ||
| Vol 1, No 3 (2012) | Pattern Based Network Security Using Semi-Supervised Learning | Abstract PDF |
| V K Pachghare, V K Khatavkar, Parag Kulkarni | ||
| Vol 2, No 5 (2013) | Payload Attribution Using Winnowing Multi Hashing Method | Abstract PDF |
| Irwan Sembiring, Jazi Eko Istiyanto, Edi Winarko, Ahmad Ashari | ||
| Vol 2, No 2 (2013) | PCI Compliance – No excuses, please | Abstract PDF |
| Martin Harran, Nigel McKelvey | ||
| Vol 3, No 4 (2014) | PDH-Clustering in wireless sensor networks | Abstract PDF |
| Hamta Sedghani, Mina Zolfy Lighvan | ||
| Vol 1, No 2 (2012) | Peak-Throughput of LTE-Release 10 for Up/Down Link Physical Layer | Abstract PDF |
| Aws Zuheer Yonis, Mohammad Faiz Liew Abdullah | ||
| 76 - 100 of 131 Items | << < 1 2 3 4 5 6 > >> | |
