Browse Title Index

Issue Title
Vol 2, No 6 (2013) Performance Analysis of Ethernet LAN Network Connection under Different Network Devices Abstract   PDF
Sadiq Kolawole A, Abdulrahman Tosho A, Sadiq Bolaji N.
Vol 1, No 3 (2012) Performance Analysis of Load Minimization In AODV and FSR Abstract   PDF
G Vetrichelvi, G Mohankumar
Vol 2, No 6 (2013) Performance Comparison of Space Time Block Coding with Code Rate ½ and ¾ for Turbo Coded Multiple Input Multiple Output System Abstract   PDF
M. M. Kamruzzaman
Vol 3, No 2 (2014) Performance Comparison of Turbo Coded Single Input Multiple Output System Using Selective Combining, Equal Gain Combining and Maximal Ratio Combining Abstract   PDF
M. M. Kamruzzaman
Vol 1, No 4 (2012) Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set Abstract   PDF
A. M. Chandrashekhar, K. Raghuveer
Vol 1, No 3 (2012) Performance Evaluation of UWB Wireless Link Abstract   PDF
Joanne Gomes, Mishra Braj Kishore
Vol 2, No 2 (2013) PKC Scheme Based on DDLP Abstract   PDF
Chandrashekhar Meshram, Suchitra A. Meshram
Vol 1, No 4 (2012) Portable SCADA Security Toolkits Abstract   PDF
Guillermo A Francia III, Nourredine Beckhouche, Terry Marbut, Curtis Neuman
Vol 3, No 2 (2014) Privacy Amplification in Quantum Cryptography BB84 using Combined Univarsal 2 -Truly Random Hashing Abstract   PDF
Ahmed Mahmoud Abbas, Amr Goneid, Sherif El-Kassas
Vol 3, No 6 (2014) Probabilistic Modeling of Information Diffusion in Online Social Networks (OSN): An Empirical Study Abstract   PDF
Andrea da Silva, Patrick Mukala
Vol 2, No 3 (2013) PSO and ACO Algorithms Applied to Optimization Resource Allocation to Support QoS Requirements in NGN Abstract   PDF
Dac- Nhuong Le
Vol 2, No 3 (2013) Quantum password sharing scheme using trusted servers Abstract   PDF
Gabriela Mogos
Vol 4, No 1 (2015) Rabin Cryptosystem and Its Extension Abstract   PDF
Nisheeth Saxena, Dr.Rajeev Pourush
Vol 2, No 4 (2013) Research on node localization algorithm based on CNRD in wireless sensor network Abstract   PDF
Alireza Souri, Monire Norouzi
Vol 1, No 2 (2012) Review on Attack and Defense in Tor Abstract   PDF
Muhammad Aamir
Vol 1, No 2 (2012) SD-AREE: An Advanced Modified Caesar Cipher Method to Exclude Repetition from a Message Abstract   PDF
Somdip Dey
Vol 1, No 2 (2012) Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms Abstract   PDF
T.D.B Weerasinghe
Vol 4, No 1 (2015) Secure hash functions using programmable cellular automata Abstract   PDF
Alaa Eddine Belfedhal, Kamel Mohamed Faraoun
Vol 2, No 3 (2013) Secured data transmission in a V-Blast encoded MIMO MCCDMA wireless communication system Abstract   PDF
Mousumi Haque, Most. Farjana Sharmin, Shaikh Enayet Ullah
Vol 2, No 1 (2013) Securing Wireless Grids: Architecture Designs for Secure WiGLET-to-WiGLET Interfaces Abstract   PDF
Tyson Brooks, Lee McKnight
Vol 2, No 1 (2013) Service-Oriented Management for Internet of Things Abstract   PDF
Hui Xu, Wei Liu, Chunzhi Wang, Hongwei Chen
Vol 2, No 1 (2013) Solving the File Allocation Problem in the Distributed Abstract   PDF
M. H. Abd El-Aziz, A Younes, M. R. Hassan, H Abdo
Vol 2, No 1 (2013) Split-Window LST Algorithms Estimation From AVHRR/NOAA Satellites (7, 9, 11, 12, 14, 15, 16, 17, 18, 19) Using Gaussian Filter Function Abstract   PDF
Mohammed Lahraoua, Naoufal Raissouni, Asaad Chahboun, Abdelilah Azyat, Nizar Ben Achhab
Vol 1, No 1 (2012) Synthetic Feature Transformation with RBF Neural Network to Improve the Intrusion Detection System Accuracy and Decrease Computational Costs Abstract   PDF
Saeid Asgari Taghanaki, Behzad Zamani Dehkordi, Ahmad Hatam, Behzad Bahraminejad
Vol 2, No 6 (2013) The Prospects of Using Spiking Neural P System for Intrusion Detection Abstract   PDF
Rufai Kazeem Idowu, Ravie Chandren Muniyandi, Zulaiha Ali Othman
101 - 125 of 131 Items << < 1 2 3 4 5 6 > >>