| Issue | Title | |
| Vol 2, No 6 (2013) | Performance Analysis of Ethernet LAN Network Connection under Different Network Devices | Abstract PDF |
| Sadiq Kolawole A, Abdulrahman Tosho A, Sadiq Bolaji N. | ||
| Vol 1, No 3 (2012) | Performance Analysis of Load Minimization In AODV and FSR | Abstract PDF |
| G Vetrichelvi, G Mohankumar | ||
| Vol 2, No 6 (2013) | Performance Comparison of Space Time Block Coding with Code Rate ½ and ¾ for Turbo Coded Multiple Input Multiple Output System | Abstract PDF |
| M. M. Kamruzzaman | ||
| Vol 3, No 2 (2014) | Performance Comparison of Turbo Coded Single Input Multiple Output System Using Selective Combining, Equal Gain Combining and Maximal Ratio Combining | Abstract PDF |
| M. M. Kamruzzaman | ||
| Vol 1, No 4 (2012) | Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set | Abstract PDF |
| A. M. Chandrashekhar, K. Raghuveer | ||
| Vol 1, No 3 (2012) | Performance Evaluation of UWB Wireless Link | Abstract PDF |
| Joanne Gomes, Mishra Braj Kishore | ||
| Vol 2, No 2 (2013) | PKC Scheme Based on DDLP | Abstract PDF |
| Chandrashekhar Meshram, Suchitra A. Meshram | ||
| Vol 1, No 4 (2012) | Portable SCADA Security Toolkits | Abstract PDF |
| Guillermo A Francia III, Nourredine Beckhouche, Terry Marbut, Curtis Neuman | ||
| Vol 3, No 2 (2014) | Privacy Amplification in Quantum Cryptography BB84 using Combined Univarsal 2 -Truly Random Hashing | Abstract PDF |
| Ahmed Mahmoud Abbas, Amr Goneid, Sherif El-Kassas | ||
| Vol 3, No 6 (2014) | Probabilistic Modeling of Information Diffusion in Online Social Networks (OSN): An Empirical Study | Abstract PDF |
| Andrea da Silva, Patrick Mukala | ||
| Vol 2, No 3 (2013) | PSO and ACO Algorithms Applied to Optimization Resource Allocation to Support QoS Requirements in NGN | Abstract PDF |
| Dac- Nhuong Le | ||
| Vol 2, No 3 (2013) | Quantum password sharing scheme using trusted servers | Abstract PDF |
| Gabriela Mogos | ||
| Vol 4, No 1 (2015) | Rabin Cryptosystem and Its Extension | Abstract PDF |
| Nisheeth Saxena, Dr.Rajeev Pourush | ||
| Vol 2, No 4 (2013) | Research on node localization algorithm based on CNRD in wireless sensor network | Abstract PDF |
| Alireza Souri, Monire Norouzi | ||
| Vol 1, No 2 (2012) | Review on Attack and Defense in Tor | Abstract PDF |
| Muhammad Aamir | ||
| Vol 1, No 2 (2012) | SD-AREE: An Advanced Modified Caesar Cipher Method to Exclude Repetition from a Message | Abstract PDF |
| Somdip Dey | ||
| Vol 1, No 2 (2012) | Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms | Abstract PDF |
| T.D.B Weerasinghe | ||
| Vol 4, No 1 (2015) | Secure hash functions using programmable cellular automata | Abstract PDF |
| Alaa Eddine Belfedhal, Kamel Mohamed Faraoun | ||
| Vol 2, No 3 (2013) | Secured data transmission in a V-Blast encoded MIMO MCCDMA wireless communication system | Abstract PDF |
| Mousumi Haque, Most. Farjana Sharmin, Shaikh Enayet Ullah | ||
| Vol 2, No 1 (2013) | Securing Wireless Grids: Architecture Designs for Secure WiGLET-to-WiGLET Interfaces | Abstract PDF |
| Tyson Brooks, Lee McKnight | ||
| Vol 2, No 1 (2013) | Service-Oriented Management for Internet of Things | Abstract PDF |
| Hui Xu, Wei Liu, Chunzhi Wang, Hongwei Chen | ||
| Vol 2, No 1 (2013) | Solving the File Allocation Problem in the Distributed | Abstract PDF |
| M. H. Abd El-Aziz, A Younes, M. R. Hassan, H Abdo | ||
| Vol 2, No 1 (2013) | Split-Window LST Algorithms Estimation From AVHRR/NOAA Satellites (7, 9, 11, 12, 14, 15, 16, 17, 18, 19) Using Gaussian Filter Function | Abstract PDF |
| Mohammed Lahraoua, Naoufal Raissouni, Asaad Chahboun, Abdelilah Azyat, Nizar Ben Achhab | ||
| Vol 1, No 1 (2012) | Synthetic Feature Transformation with RBF Neural Network to Improve the Intrusion Detection System Accuracy and Decrease Computational Costs | Abstract PDF |
| Saeid Asgari Taghanaki, Behzad Zamani Dehkordi, Ahmad Hatam, Behzad Bahraminejad | ||
| Vol 2, No 6 (2013) | The Prospects of Using Spiking Neural P System for Intrusion Detection | Abstract PDF |
| Rufai Kazeem Idowu, Ravie Chandren Muniyandi, Zulaiha Ali Othman | ||
| 101 - 125 of 131 Items | << < 1 2 3 4 5 6 > >> | |
