Issue | Title | |
Vol 9, No 2 (2022) | RMBSRA: Routing Manager Based Secure Route Analysis Mechanism for Achieving Secure Routing Protocol in IOT MANET | Abstract PDF |
P. T. Kasthuri Bai | ||
Vol 7, No 5 (2020) | Robust Resource Scheduling With Optimized Load Balancing Using Grasshopper Behavior Empowered Intuitionistic Fuzzy Clustering in Cloud Paradigm | Abstract PDF |
G. Kiruthiga, S. Mary Vennila | ||
Vol 10, No 3 (2023) | Robust Tristate Security Mechanism to Protect Against Selective Forwarding Attack and Black Hole Attack in Intra-Cluster Multi-Hop Communication | Abstract PDF |
A. Anitha, S. Mythili | ||
Vol 9, No 6 (2022) | Scalable and Robust Intrusion Detection System to Secure the IoT Environments using Software Defined Networks (SDN) Enabled Architecture | Abstract PDF |
Tahani M. Alshammari, Faeiz M. Alserhani | ||
Vol 10, No 1 (2023) | Scheduling Framework for Resource Management in IoT Ecosystem Over 5G Network | Abstract PDF |
Gauri S. Rapate, N C Naveen | ||
Vol 5, No 3 (2018) | Secure and Fast Handovers Authentication Methods for Wi-Fi Based Networks:A Review Perspective | Abstract PDF |
Tahadray Jean Tsitaitse, Yongquan Cai, Shaldon Leparan Suntu, Muhammad Nafees Ulfat Khan | ||
Vol 8, No 2 (2021) | Secure Multi-Path Routing Using Splitting and Merging Based Clustering for Reducing Power Usage in MANET | Abstract PDF |
Krishnaveni Sakkarapani, C. Chandra Prabha | ||
Vol 10, No 6 (2023) | Secure Power Aware Hybrid Routing Strategy for Large-Scale Wireless Sensor Networks | Abstract PDF |
Mohammad Sirajuddin, B. Sateesh Kumar | ||
Vol 10, No 1 (2023) | Secure Storage and Data Sharing Scheme Using Private Blockchain-Based HDFS Data Storage for Cloud Computing | Abstract PDF |
Gaurav Shrivastava, Sachin Patel | ||
Vol 11, No 4 (2024) | Securing Data Communication in the Cloud Using Machine Learning-Based Blockchain Approach | Abstract |
Shanmugapriya Velmurugan, Amalraj Irudayasamy, Natesh Mahadev, Rajesh Natarajan, Sujatha Krishna | ||
Vol 8, No 5 (2021) | Securing Service Discovery from Denial of Service Attack in Mobile Ad Hoc Network (MANET) | Abstract PDF |
Smitha Kurian, Loganathan Ramasamy | ||
Vol 2, No 4 (2015) | Security and Fraud Issues of E-Banking | Abstract PDF |
Emad Abu-Shanab, Salam Matalqa | ||
Vol 9, No 1 (2022) | Security Challenges and Related Solutions in Software Defined Networks: A Survey | Abstract PDF |
Konda Srikar Goud, Srinivasa Rao Gidituri | ||
Vol 2, No 2 (2015) | Security Concerns at Various Levels of Cloud Computing Paradigm: A Review | Abstract PDF |
Aarti Singh, Manisha Malhotra | ||
Vol 2, No 2 (2015) | Security Enhancement in Shoulder Surfing Attacks using Passpoints for Random Similar Images (PRSIm) | Abstract PDF |
A. Meiappane, V. Prasanna Venkataesan, V. Premanand | ||
Vol 10, No 1 (2023) | Security Model to Mitigate Black Hole Attack on Internet of Battlefield Things (IoBT) Using Trust and K-Means Clustering Algorithm | Abstract PDF |
P. Rutravigneshwaran, G. Anitha | ||
Vol 3, No 5 (2016) | Self-Correcting Localization Scheme for Vehicle to Vehicle Communication | Abstract PDF |
Salah Abdel Mageid | ||
Vol 11, No 3 (2024) | SOAVMP: Multi-Objective Virtual Machine Placement in Cloud Computing Based on the Seagull Optimization Algorithm | Abstract |
Aristide Ndayikengurukiye, Rim Doukha, Eric Niyukuri, Eric Muheto, Abderrahmane Ez-zahout, Fouzia Omary | ||
Vol 9, No 4 (2022) | Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks | Abstract PDF |
M. Gobi | ||
Vol 8, No 4 (2021) | Source Location Privacy for Geographical Routing in Wireless Sensor Networks: SLPGR | Abstract PDF |
Manjunath D R, Anil Kumar B | ||
Vol 10, No 2 (2023) | Spectrum Management in 6G HetNet Based on Smart Contracts and Harmonized Software-Defined Networking-Enabled Approach | Abstract PDF |
S. Markkandan, P. Santhosh Kumar, Prathipa R, K. Vengatesan, Garikapati Bindu | ||
Vol 11, No 2 (2024) | Strategies for Achieving Energy Efficiency and Data Security Through Data Aggregation in IoT Healthcare Applications: A Comprehensive Study | Abstract PDF |
Ganesh Srinivasa Shetty, Raghu. N | ||
Vol 7, No 4 (2020) | Support Vector Regressive Dragonfly Optimized Shift Invariant Deep Neural Learning Based Handover for Seamless Data Delivery in Heterogeneous Network | Abstract PDF |
D. Somashekhara Reddy, C. Chandrasekhar | ||
Vol 9, No 5 (2022) | Survey and testing of the IoT Cybersecurity Framework Using Intrusion Detection Systems | Abstract PDF |
Carmen Beatriz Espinosa Garrido, Sandra Sendra Compte, Luis Rosales Roldan, Alejandra Aldrette Malacara | ||
Vol 3, No 3 (2016) | TabSecure: An Anti-Phishing Solution with Protection against Tabnabbing | Abstract PDF |
Priyanka Joshi, Madhumita Chatterjee | ||
301 - 325 of 353 Items | First Previous 8 9 10 11 12 13 14 15 Next Last |
Browse Title Index
Scroll