SR |
M-CODE |
CITATION |
|
1 |
|
Al-Hawari, F., Alufeishat, A., Alshawabkeh, M., Barham, H., & Habahbeh, M. (2017). The software engineering of a three-tier web-based student information system (MyGJU). Computer Applications in Engineering Education, 25(2), 242-263. |
|
2 |
|
Al-Hawari, F. H. (2017). MyGJU Student View and its Online and Preventive Registration Flow. International Journal of Applied Engineering Research, 12(1), 119-133. |
|
3 |
|
Thompson, R. C. (2017). Determining critical success factors for implementation of on-line registration systems (Doctoral dissertation). |
|
4 |
|
Agwa-Ejon, J. F., & Pradhan, A. (2017, July). Technology Connectivity: A Tool for the Selection, Recruitment and Enrolment of Potential Students in South African Universities. In Management of Engineering and Technology (PICMET), 2017 Portland International Conference on (pp. 1-8). IEEE. |
|
5 |
|
Wahaba, N. A., Marimuthub, R., Othmana, J., & SaifulNizamWarrisa, C. S. P. (2017). Evaluating the Usability of COREs-an Online Conference Registration System. DEPARTMENT OF COMPUTER AND MATHEMATICAL SCIENCES UNIVERSITI TEKNOLOGI MARA CAWANGAN PULAU PINANG PENANG, MALAYSIA, 38. |
|
6 |
|
Jabbar, M. A., Deekshatulu, B. L., & Chandra, P. (2016). A Novel Algorithm for Utility-Frequent Itemset Mining in Market Basket Analysis. In Innovations in Bio-Inspired Computing and Applications (pp. 337-345). Springer International Publishing. |
|
7 |
|
Renza , D., Ballesteros , D. M., & Rincon, R. (2016 ) . Concealment method for steganography image pixel grayscale on color images . Engineering and Science , 12 ( 23) , 145-162. |
|
8 |
|
Stephanie, F. L., & Sharma, R. S. (2016). Health on a Cloud: Modeling Digital Flows in an E-health Ecosystem. Journal of Advances in Management Sciences & Information Systems, 2, 1-20. |
|
9 |
|
Pillai, J. S., & Padma, T. (2016). The Analysis of PQ Sequences Generated from Continued Fractions for Use as Pseudorandom Sequences in Cryptographic Applications. In Artificial Intelligence and Evolutionary Computations in Engineering Systems (pp. 633-644). Springer India. |
|
10 |
|
Singh, K. (2016). Image Steganography Scheme Using Parent Child Relationship in Wavelet Domain. British Journal of Applied Science & Technology, 14(4), 1. |
|
11 |
|
Barve, S., Desai, S., & Sardinha, R. (2016).Query-Based Extractive Text Summarization for Sanskrit. In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 (pp. 559-568). Springer India. |
|
12 |
|
Shanmuganathan, S. (2016). A Hybrid Artificial Neural Network (ANN) Approach to Spatial and Non-spatial Attribute Data Mining: A Case Study Experience. In Artificial Neural Network Modelling (pp. 443-472). Springer International Publishing. |
|
13 |
|
Dhveya, R., & Amudha, T. (2016). Role of Bio-Inspired Optimization in Disaster Operations Management Research. In Innovations in Bio-Inspired Computing and Applications (pp. 565-575). Springer International Publishing. |
|
14 |
|
Iwasokun, G. B., & Akinyokun, O. C. Singular-minutiae points relationship-based approach to fingerprint matching. |
|
15 |
|
Jamont, J. P. (2016). Démarche, modèles et outils multi-agents pour l'ingénierie des collectifs cyber-physiques (Doctoral dissertation, Université Grenoble Alpes). |
|
16 |
|
Adewumi, A. O., & Arasomwan, M. A. (2016). On the performance of particle swarm optimisation with (out) some control parameters for global optimisation. International Journal of Bio-Inspired Computation, 8(1), 14-32. |
|
17 |
|
Gkartzonikas , A . , & Theoharatos , D . ( 2016 ) . Discovery Framework Information : particle swarm optimization and optimum stop theory. |
|
18 |
|
Viola, A. V., Ese, O. D., & Charles, S. O. A Proposed Hybrid Component Complexity Metrics For Component Based Software Development. |
|
19 |
|
Rathore, M. M., Ahmad, A., & Paul, A. (2016). Real time intrusion detection system for ultra-high-speed big data environments. The Journal of Supercomputing, 1-22. |
|
20 |
|
Ruuhwan, R., Riadi, I., & Prayudi, Y. (2016). Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone. Jurnal Edukasi dan Penelitian Informatika (JEPIN), 2(1). |
|
21 |
|
Al-Fayoumi, A., & Hassan, M. (2016). Interactive Visual Search System Based onMachine Learning Algorithm. International Arab Journal of Information Technology (IAJIT), 13. |
|
22 |
|
Tarek, M., Ouda, O., & Hamza, T. (2016). Robust cancellable biometrics scheme based on neural networks. IET Biometrics. |
|
23 |
|
Al-Dmour, H., & Al-Ani, A. (2016). Quality optimized medical image information hiding algorithm that employs edge detection and data coding. Computer Methods and Programs in Biomedicine, 127, 24-43. |
|
24 |
|
Jahantigh , F Firuzi , due to race , R. , Jahantigh , & M. Firuzi . (2016 ) . Identify , evaluate and rank the risk factors Weight & # 1705 ... Journal of Mazandaran University of Medical Sciences (JMUMS), 25 (133). |
|
25 |
|
Rashid, F., Miri, A., & Woungang, I. (2016). Secure image deduplication through image compression. Journal of Information Security and Applications. |
|
26 |
|
Md Yunus, N. A., Othman, M., Mohd Hanapi, Z., & Lun, K. Y. (2016). Reliability Review of Interconnection Networks. IETE Technical Review, 1-11. |
|
27 |
|
Khanna, N. (2016). Mitigation of Collaborative Blackhole Attack using TRACEROUTE Mechanism with Enhancement in AODV Routing Protocol. |
|
28 |
|
Jung, S., & Kumar, R. (2016). Security of Routing Protocols in MANETs: A Survey. Global Sci-Tech, 8(1), 22-36. |
|
29 |
|
Pop, F., Tutueanu, R. I., Barbieru, C., Vasile, M. A., & Kolodziej, J. (2016). Adaptive Resource Allocation in Cloud Computing Based on Agreement Protocols. In Intelligent Agents in Data-intensive Computing (pp. 193-213). Springer International Publishing. |
|
30 |
|
Anju, P. S., Kuriakose, B., & Paul, V. A Survey On Steganographic Methods Used in Information Hiding. |
|
31 |
|
Mubeen, S., Srinath, N. K., & Subramanya, K. N. (2016). Double Securing from Hackers in B2B E-commerce. |
|
32 |
|
Opoku-Ansah, J., Eghan, M. J., Anderson, B., Boampong, J. N., & Buah-Bassuah, P. K. (2016). Laser-Induced Autofluorescence Technique for Plasmodium falciparum Parasite Density Estimation. Applied Physics Research, 8(2), 43. |
|
33 |
|
Ramesh, M. R., & Reddy, C. S. (2016). a survey on security requirement elicitation methods: classification, merits and demerits. International Journal of Applied Engineering Research, 11(1), 64-70. |
|
34 |
|
Bistouni, F., & Jahanshahi, M. (2015). Pars network: a multistage interconnection network with fault-tolerance capability. Journal of Parallel and Distributed Computing, 75, 168-183. |
|
35 |
|
Li, D., & Wang, Y. (2015). The Image Retrieval Based on the Hybrid Algorithm of the Primary Color and Color Layout Descriptor. |
|
36 |
|
Anchor , & Abdul race. ( 2015). Identify phishing in online banking site using the optimization algorithm inclined plates . Journal of electronic and cyber defense , 3 ( ??1 ). |
|
37 |
|
Uzunov, A. V., Falkner, K., & Fernandez, E. B. (2015). A comprehensive pattern-oriented approach to engineering security methodologies. Information and Software Technology, 57, 217-247. |
|
38 |
|
Veshkurtsev ,JM model management and monitoring of network elements Telecommunication network using theory of fuzzy sets. |
|
39 |
|
Nayebi, F., Abran, A., & Desharnais, J. M. (2015). Automated selection of a software effort estimation model based on accuracy and uncertainty. Artificial Intelligence Research, 4(2), p45. |
|
40 |
|
Tripathy, A., Agrawal, A., & Rath, S. K. (2015). Classi?cation of Sentimental Reviews Using Machine Learning Techniques. Procedia Computer Science, 57, 821-829. |
|
41 |
|
Bhatia, S., & Attri, V. K. Estimation of Software Development Effort with Machine Learning Approaches: A Review. |
|
42 |
|
Tripathya, A., Agrawalb, A., & Rathc, S. K. Classification of Sentimental Reviews Using Machine Learning Techniques. |
|
43 |
|
Chen, N. (2015). Research on Detection of Business Constraints based on AOP. International Journal of u-and e-Service, Science and Technology, 8(2), 243-250. |
|
44 |
|
An, B., Qu, T., & Qi, H. (2015). Chinese MOOC Search Engine. In Intelligent Computation in Big Data Era (pp. 453-458). Springer Berlin Heidelberg. |
|
45 |
|
Kapur, R. K., & Khatri, S. K. (2015, March). Analysis of attacks on routing protocols in MANETs. In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in (pp. 791-798). IEEE. |
|
46 |
|
Al-Saeedan, W., & Menai, M. E. B. (2015). Swarm intelligence for natural language processing. International Journal of Artificial Intelligence and Soft Computing, 5(2), 117-150. |
|
47 |
|
Alguliyev, R. M., Aliguliyev, R. M., & Isazade, N. R. (2015). an unsupervised approach to generating generic summaries of documents. Applied Soft Computing. |
|
48 |
|
Mohamed, K., Pauzi, M. N. M., Ali, F. H. H. M., & Ariffin, S. (2015, August). Linearity Test Framework for S-Box in Block Cipher. In IT Convergence and Security (ICITCS), 2015 5th International Conference on (pp. 1-5). IEEE. |
|
49 |
|
McIntosh, H. (2015). Vevo and the Business of Online Music Video Distribution. Popular Music and Society, (ahead-of-print), 1-14. |
|
50 |
|
Fatima, M., Ahmad, S. F., & Hasan, M. (2015). Fuzzy Based Software Cost Estimation Methods: A Comparative Study. International Journal for Innovative Research in Science and Technology, 1(7), 287-290. |
|
51 |
|
Iraji, M. S. (2015). Fuzzy Agent Oriented Software Effort Estimate with COCOMO. |
|
52 |
|
Mohammadpoor, M., & Mehdizadeh, A. An Efficient ECC-based Authentication and Key Agreement Protocol. |
|
53 |
|
Verma, K., Shukla, D., & Gangele, S. (2015). Approximating the Probability of Traffic Sharing by Numerical Analysis Techniques between Two Operators in a Computer Network. Open Journal of Computer Science and Information Technology, 3(1), 026-039. |
|
54 |
|
Persson, J., & Lundbladh, M. (2015). Våga vara dig själv: Att fo¨rsta° och skapa en illusion av ljus med digitala medier. |
|
55 |
|
Olaniyi, O. M., Arulogun, O. T., Omidiora, O. E., & Okediran, O. O. (2015). Implementing generic security requirements in e–voting using modified stegano–cryptographic approach. International Journal of Information and Computer Security, 7(1), 64-90. |
|
56 |
|
Omotosho, A., Adegbola, O., Mikail, O. O., & Emuoyibofarhe, J. (2015). A Secure Electronic Prescription System Using Steganography with Encryption Key Implementation. arXiv preprint arXiv:1502.01264. |
|
57 |
|
Sathisha, N., Babu, K. S., Raja, K. B., & Venugopal, K. R. (2015). Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT. International Journal of Image Processing (IJIP), 9(2), 41. |
|
58 |
|
Patil, P. (2015). encryption for secure sms transmission. Compusoft, 4(6), 1876. |
|
59 |
|
Jasuja, B., & Pandya, A. (2015). Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding. International Journal of Computer Applications, 116(21). |
|
60 |
|
Kumar, V., & Purusotham, S. (2015). A Lexi-Search Approach of Variant Vehicle Routing Problem. International Journal of Advanced Research in Computer Science, 6(1). |
|
61 |
|
Babu, K. S. international journal of engineering sciences & research technology a data guided lexi-serach approach for time dependent travelling salemsman problem. |
|
62 |
|
Kundaikar, T. C., & Laxminarayana, J. A. (2015). Efficient Recognition of Devanagari Handwritten Text. In Computational Intelligence in Data Mining-Volume 2 (pp. 81-88). Springer India. |
|
63 |
|
Kulkarni, P. P., Patil, S., & Dhanokar, G. (2015). Marathi And Sanskrit Word Identification By Using Genetic Algorithm. |
|
64 |
|
Singh, P., Verma, A., & Chaudhari, N. S. (2015). On the Performance Improvement of Devanagari Handwritten Character Recognition. Applied Computational Intelligence and Soft Computing, 2015. |
|
65 |
|
Jayakumar, A., Babu, G. S., Raman, R., & Nedungadi, P. (2015, October). Integrating Writing Direction and Handwriting Letter Recognition in Touch-Enabled Devices. In Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015 (Vol. 2, p. 393). Springer. |
|
66 |
|
Joshi, D., & Pansare, S. (2015, February). Combination of Multiple Image Features along with KNN Classifier for Classification of Marathi Barakhadi. In Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on (pp. 607-610). IEEE. |
|
67 |
|
Dhaka, V. P., & Sharma, M. K. An efficient segmentation technique for Devanagari offline handwritten scripts using the Feedforward Neural Network. Neural Computing and Applications, 1-13. |
|
68 |
|
Kabir, K. L., Shafin, M. K., Anannya, T. T., Debnath, D., Kabir, M. R., Islam, M. A., & Sarwar, H. Projection-Based Features: A Superior Domain for Handwritten Bangla Basic Characters Recognition. |
|
69 |
|
Ajmire, P. E., Dharaskar, R. V., & Thakare, V. M. Feature Extraction and recognition of Modifiers in Handwritten Marathi (Devanagari) Text. |
|
70 |
|
Shing, L., Astacio, J., Figueroa, A., & Shing, C. C. (2015, August). Vulnerabilities of radio frequencies. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on (pp. 2682-2686). IEEE. |
|
71 |
|
Kannan, D., & Gobi, M. (2015). An extensive research on robust digital image watermarking techniques: a review. International Journal of Signal and Imaging Systems Engineering, 8(1-2), 89-104. |
|
72 |
|
Roy, A. J., & Student, F. Y. U. Emotional Text to Speech Synthesis in Indian Language. |
|
73 |
|
Anil, M. C., & Shirbahadurkar, S. D. Expressive Speech Synthesis using Prosodic Modification for Marathi Language. |
|
74 |
|
Shrivastava, S., Agrawal, C., & Jain, A. (2015). An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET. arXiv preprint arXiv:1502.04801. |
|
75 |
|
Maheswari, R., MCA, M. S. R., & PHIL, M. (2015, March). A Review on Types of Jamming Attack In Mobile Ad-Hoc Network. In Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications. |
|
76 |
|
Pandhare, S. S., & Jawandiya, P. M. (2015, March). Security Goals and Attacks in Mobile Ad Hoc Networks: An exclusive survey. In National Conference “CONVERGENCE (Vol. 2015, p. 28). |
|
77 |
|
Filipek, J., & Hudec, L. (2015, January). Distributed firewall in Mobile Ad Hoc Networks. In Applied Machine Intelligence and Informatics (SAMI), 2015 IEEE 13th International Symposium on (pp. 233-238). IEEE. |
|
78 |
|
Mohammed, A., Sofiane, B. H., & kamel Mohamed, F. (2015). A Cross Layer for Detection and Ignoring Black Hole Attack in MANET. |
|
79 |
|
Mittal, V. (2015). Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach. Prevention, 4(5). |
|
80 |
|
Paliwal, G., Mudgal, A. P., & Taterh, S. (2015, January). A Study on Various Attacks of TCP/IP and Security Challenges in MANET Layer Architecture. In Proceedings of Fourth International Conference on Soft Computing for Problem Solving (pp. 191-203). Springer India. |
|
81 |
|
Dorri, A., Kamel, S. R., & Kheirkhah, E. (2015). Security challenges in mobile ad hoc networks: a survey. arXiv preprint arXiv:1503.03233. |
|
82 |
|
Singh, J., Singh, A., & Shree, M. R. (2015). An Assessment of Frequently Adopted Security Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective. Journal of Wireless Network and Microsystems, 4(1-2). |
|
83 |
|
Suja, K. R., & Raglend, J. (2015). Cuckoo search (CS)-NFC-based UPQC for compensating voltage sag of nonlinear load. Journal of Experimental & Theoretical Artificial Intelligence, (ahead-of-print), 1-18. |
|
84 |
|
Priest, B. W., Vuksani, E., Wagner, N., Tello, B., Carter, K. M., & Streilein, W. W. (2015, April). Agent-based simulation in support of moving target cyber defense technology development and evaluation. In Proceedings of the 18th Symposium on Communications & Networking (pp. 16-23). Society for Computer Simulation International. |
|
85 |
|
Wagner, N., Lippmann, R., Winterrose, M., Riordan, J., Yu, T., & Streilein, W. W. (2015, April).Agent-based simulation for assessing network security risk due to unauthorized hardware. In Proceedings of the Symposium on Agent-Directed Simulation (pp. 18-26). Society for Computer Simulation International. |
|
86 |
|
Singh, Y., & Chugh, U. Clustering, Information Fusion and Event Detection in Wireless Sensor Networks: A Review. |
|
87 |
|
Houngbo, P. J., & Hounsou, J. T. (2015). Measuring Information Security: Understanding And Selecting Appropriate Metrics. International Journal of Computer Science and Security (IJCSS), 9(2), 108. |
|
88 |
|
Rani, C., & Goel, S. CSAAES: An Expert System for Cyber Security Attack Awareness. |
|
89 |
|
Rasheed, Z. A. S. (2015). ’Steganography Technique for Binary Text Image. International Journal of Science and Research (IJSR) ISSN (Online), 2319-7064. |
|
90 |
|
Rubab, S., & Javed, Y. (2015). Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption. International Journal of Computer Network and Information Security (IJCNIS), 7(2), 15. |
|
91 |
|
Sahu, P., & Chourasia, B. (2015). State of the Art in Modern Steganography-A review. International Journal of Advanced Electronics and Communication Systems, 4(1). |
|
92 |
|
Houngbo, P. J., & Hounsou, J. T. (2015). Measuring Information Security: Understanding And Selecting Appropriate Metrics. International Journal of Computer Science and Security (IJCSS), 9(2), 108. |
|
93 |
|
Sen, P., Ahmed, R. A., & Islam, M. R. (2015). A Study on E-Commerce Security Issues and Solutions. |
|
94 |
|
Aigbe, P., & Onibere, A. (2015). An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System. International Journal of Computer Applications, 122(18). |
|
95 |
|
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handling in the cloud. Computers & Security, 49, 45-69. |
|
96 |
|
Amann, P., & James, J. I. (2015). Designing robustness and resilience in digital investigation laboratories. Digital Investigation, 12, S111-S120. |
|
97 |
|
Agarwal, R., & Kothari, S. (2015). Review of Digital Forensic Investigation Frameworks. In Information Science and Applications (pp. 561-571). Springer Berlin Heidelberg. |
|
98 |
|
Jafari, F., & Satti, R. S. (2015). Comparative Analysis of Digital Forensic Models. Journal of Advances in Computer Networks, 3(1). |
|
99 |
|
Satti, R. S., & Jafari, F. (2015). Domain Specific Cyber Forensic Investigation Process Model. Journal of Advances in Computer Networks, 3(1). |
|
100 |
|
Jiang, J. G., Yang, B., Lin, S., Zhang, M. X., & Liu, K. Y. (2015, April). A Practical Approach for Digital Forensic Triage. In Applied Mechanics and Materials (Vol. 742, pp. 437-444). |
|
101 |
|
Prayudi, Y., & Sn, A. (2015). Digital Chain of Custody: State of the Art. International Journal of Computer Applications, 114(5), 1-9. |
|
102 |
|
Satti, R. S., & Jafari, F. (2015). Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes. |
|
103 |
|
Saleem, S. (2015). Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics. |
|
104 |
|
Mushtaque, K., Ahsan, K., & Umer, A. (2015). DIGITAL FORENSIC INVESTIGATION MODELS: AN EVOLUTION STUDY. JISTEM-Journal of Information Systems and Technology Management, 12(2), 233-243. |
|
105 |
|
Mushtaque, K., Ahsan, K., & Umer, A. (2015).Digital Forensic investigation models:an evolution study. JISTEM-Journal of Information Systems and Technology Management, 12(2), 233-243. |
|
106 |
|
Kurniati, F. T., Santoso, A. J., & Suyoto, S. (2015).printer forensik untuk identifikasi dokumen cetak. semnasteknomedia online, 3(1), 5-10. |
|
107 |
|
Prayudi, Y., & Ashari, A. A Study on Secure Communication for Digital Forensics Environment. |
|
108 |
|
KHAWASE, M. D. S.,deshmukh, m., kuche, s., & mahalle, a. international journal of pure and applied research in engineering and technology. |
|
109 |
|
Swamy, V., Sampath, S., Nanjesh, B. R., & Sagar, B. B. (2015). Development of Common Parallel Programming Platform for MPI and PVM. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 95-103). Springer India. |
|
110 |
|
Yadav, M. R., & Gill, N. S. (2015). Improvement in Performance of RSA Algorithm Using SLSB. |
|
111 |
|
Bhanot, R., & Hans, R. (2015). A Review and Comparative Analysis of Various Encryption Algorithms. International Journal of Security & Its Applications, 9(4). |
|
112 |
|
Farajallah, M. (2015). Chaos-based crypto and joint crypto-compression systems for images and videos (Doctoral dissertation, UNIVERSITE DE NANTES). |
|
113 |
|
Ayokunle, T. B., Ogah, U. S., & Binitie, A. P. (2015). Encryption and Decryption of Messages Using Advanced Encryption Standard and System of Nonlinear Equations. International Journal of Pure and Applied Sciences and Technology, 27(1), 1. |
|
114 |
|
Kulkarni, s. international journal of pure and applied research in engineering and technology. |
|
115 |
|
Razzak, I. (2015). Malarial Parasite Classification using Recurrent Neural Network. International Journal of Image Processing (IJIP), 9(2), 69. |
|
116 |
|
DAS, D., Mukherjee, R., & Chakraborty, C. (2015). Computational microscopic imaging for malaria parasite detection: a systematic review. Journal of microscopy. |
|
117 |
|
Razzak, M. I. (2015). Automatic Detection and Classification of Malarial Parasite. International Journal of Biometrics and Bioinformatics (IJBB), 9(1), 1. |
|
118 |
|
Savkare, S. S., & Narote, S. P. (2015, January). Automated system for malaria parasite identification. In Communication, Information & Computing Technology (ICCICT), 2015 International Conference on (pp. 1-4). IEEE. |
|
119 |
|
Chayadevi, M. L., & Raju, G. T. (2015). Automated Colour Segmentation of Malaria Parasite with Fuzzy and Fractal Methods. In Computational Intelligence in Data Mining-Volume 3 (pp. 53-63). Springer India. |
|
120 |
|
Hutagalung, B. T., & Syahputra, A. watermarking citra digital dengan information dispersal algorithm (ida) dan algoritma huffman. |
|
121 |
|
Alabaichi, A. M. (2015). A Dynamic 3D S-Box based on Cylindrical Coordinate System for Blowfish Algorithm. Indian Journal of Science and Technology, 8(30). |
|
122 |
|
Alabaichi, A., & Salih, A. I. (2015, October). Enhance security of advance encryption standard algorithm based on key-dependent S-box. In Digital Information Processing and Communications (ICDIPC), 2015 Fifth International Conference on (pp. 44-53). IEEE. |
|
123 |
|
Pourahmad, S., Azad, M., & Paydar, S. (2015). Diagnosis of Malignancy in Thyroid Tumors by Multi-Layer Perceptron Neural Networks With Different Batch Learning Algorithms. Global Journal of Health Science, 7(6), p46. |
|
124 |
|
Jasim, O. K., Abbas, S., Horbaty, E. S. M., & Salem, A. B. M. (2015). Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm. arXiv preprint arXiv:1503.04796. |
|
125 |
|
Kazlauskas, K., Vaicekauskas, G., & Smaliukas, R. (2015). An Algorithm for Key-Dependent S-Box Generation in Block Cipher System. INFORMATICA, 26(1), 51-65. |
|
126 |
|
Shing, L. P., Shing, L. H., Shing, M. L., & Shing, C. C. (2015). modeling data integrity under stochastic linear constraints. International Journal of Electronic Commerce Studies, 6(2), 233-242. |
|
127 |
|
Kariuki, P. (2015). generic process model for android smartphones live memory forensics (Doctoral dissertation). |
|
128 |
|
Jeon, S., Fujita, H., & Toshiyoshi, H. (2015). A MEMS-based interactive laser scanning display with a collocated laser range finder. IEICE Electronics Express, 12(10), 20150072-20150072. |
|
129 |
|
Fister, I., Ljubic, K., Suganthan, P. N., & Perc, M. (2015). Computational intelligence in sports: Challenges and opportunities within a new research domain. Applied Mathematics and Computation, 262, 178-186. |
|
130 |
|
Korhonen, H. (2015). Improving Transparency in Demand-Supply Chain With Visual Business Intelligence Tools. |
|
131 |
|
Alhirz, H., & Sajeev, A. S. M. (2015). Do cultural dimensions differentiate ERP acceptance? A study in the context of Saudi Arabia. Information Technology & People, 28(1), 163-194. |
|
132 |
|
Almishal, A., & Alsaud, M. A. (2015). Implementing ERP Systems in Government: Case Study of Saudi Organization. Lecture Notes on Software Engineering, 3(2), 120. |
|
133 |
|
Hammad, J. (2015). A Comparative Study between Various Sorting Algorithms. IJCSNS, 15(3), 11. |
|
134 |
|
Bjeljac, P., Zecevic, I., & Perisic, B. (2015, May). Integrating Learning Management System and Faculty Information System-service oriented approach. In Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2015 38th International Convention on (pp. 773-777). IEEE. |
|
135 |
|
Kavila, S. D., & Radhika, Y. (2015).Extractive Text Summarization Using Modified Weighing and Sentence Symmetric Feature Methods. |
|
136 |
|
Loto, m., & durán, e. B. (2015). Diseño de una aplicación móvil personalizada de apoyo al aprendizaje de redes de computadoras. In x congreso sobre tecnología en educación & educación en tecnología (te & et)(corrientes, 2015). |
|
137 |
|
Koondhar, m. Y., rind, m. M., chandio, f. H., & shah, a. (2015). Pervasive learning environment with emerging technologies and learning transformation. In international multi-topic conference. |
|
138 |
|
Mohy, N. N., Mokhtar, H. M., & El-Sharkawi, M. E. (2015, July).Delegation enabled provenance-based access control model. In Science and Information Conference (SAI), 2015 (pp. 1374-1379). IEEE. |
|
139 |
|
Dewi, D. (2015).Identifikasi goresan dasar mandarin dengan metode multilayer perceptron.CSRID Journal, 7(1), 12-23. |
|
140 |
|
Yadav, M., & Dhankhar, A. (2015). A-Review on Image Steganography. International Journal for Innovative Research in Science and Technology, 2(2), 243-248. |
|
141 |
|
Yahlali, M., & Chouarfia, A. (2015). Towards a software component assembly evaluation. Software, IET, 9(1), 1-6. |
|
142 |
|
Aigbe, P., & Onibere, A. (2015).An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System. International Journal of Computer Applications, 122(18). |
|
143 |
|
Alhazmi, O. H. Evaluating Disaster Recovery Plans Using Computer Aided Disaster Recovery Tools. |
|
144 |
|
Das, S., & Ghosh, R. (2015). Study of randomness in AES ciphertexts produced by various types of dynamic S-boxes. International Journal of Information and Communication Technology, 7(6), 537-561. |
|
145 |
|
Kaur, P. J., Kaul, V., Bharadi, V. A., & Narayankhedkar, S. K. Article: Development of Security Enhancement Techniques for 3G/4G Networks}. In IJAIS Proceedings on International Conference and Workshop on Communication, Computing and Virtualization} (pp. 41-46). |
|
146 |
|
Kalaiselvi, K., & Mangalam, H. (2015). Power efficient and high performance VLSI architecture for AES algorithm. Journal of Electrical Systems and Information Technology. |
|
147 |
|
Vaicekauskas, G. BLOKINIŲ ŠIFRŲ ANALIZĖ IR KOKYBĖS PAGERINIMAS. |
|
148 |
|
Ahamed, S. K., Naidu, M. M., & Reddy, C. S. R. (2015). MOST INFLUENTIAL OBSERVATIONS-SUPER EFFICIENCY. International Journal on Computer Science and Engineering, 7(9), 82. |
|
149 |
|
Ibrahim, M. H. AATCT: Anonymously Authenticated Transmission on the Cloud with Traceability. International Journal of Advanced Computer Science & Applications, 1(6), 251-259. |
|
150 |
|
Pan Lan Lan Yuchi school Biao , Huan Lei , institutions, & statistics . (2015 ) . A rapid assessment authoritative DNS DDoS attacks impact on the way services Computer Application Research , 32 ( 11 ) , 3456-3459 |
|
151 |
|
Nagarajan, P., & Perumal, G. (2015). Detection of Denial of Service Attack in Cloud using Fuzzy Time Series Analysis and EM Algorithm. International Journal of Advancements in Computing Technology, 7(5), 25. |
|
152 |
|
KARIMIZADEH, M. M., RAFEAZADEH, E., AMIRI, P., & KHOLGHNIK, D. (2015). Enhancing and Optimization Sorting Algorithms: An Empirical Study. Cumhuriyet Science Journal, 36(6), 254-266. |
|
153 |
|
Faujdar, N., & Ghrera, S. P. (2015, April). Analysis and Testing of Sorting Algorithms on a Standard Dataset. In Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on (pp. 962-967). IEEE. |
|
154 |
|
Biedermann, S. (2015). Transparent Security Services for an Infrastructure-as-a-Service Cloud. |
|
155 |
|
Redundancy, m. (2015). selection of robust feature subsets for phish webpage prediction using maximum relevance and minimum redundancy criterion. journal of theoretical and applied information technology, 81(2). |
|
156 |
|
Yaramasa, T., & Kishore, G. K. (2015, January). Enhanced Privacy and Surveillance for Online Social Networks. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 189-196). Springer International Publishing. |
|
157 |
|
Khalane, V. P., & Bhadade, U. S. A Review on Encryption Techniques in Signal Processing. |
|
158 |
|
Khan, M., Jamil, A., Haleem, F., Zahoor, J., Muhammad, S., & Sung Wook, B. (2015). A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. KSII Transactions on Internet and Information Systems (TIIS), 9(5), 1938-1962. |
|
159 |
|
Muhammad, K., Ahmad, J., Sajjad, M., & Zubair, M. (2015). Secure Image Steganography using Cryptography and Image Transposition. arXiv preprint arXiv:1510.04413. |
|
160 |
|
Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., & Baik, S. W. (2015). A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications, 1-27. |
|
161 |
|
Al-Dmour, H., & Al-Ani, A. (2015, November). A Medical Image Steganography Method Based on Integer Wavelet Transform and Overlapping Edge Detection. In Neural Information Processing (pp. 436-444). Springer International Publishing. |
|
162 |
|
Olaniyi, O. M., Arulogun, O. T., Omidiora, O. E., & Okediran, O. O. (2015). Implementing generic security requirements in e–voting using modified stegano–cryptographic approach. International Journal of Information and Computer Security, 7(1), 64-90. |
|
163 |
|
Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., & Okediran, O. O. (2015). Enhanced Stegano-Cryptographic Model for Secure Electronic Voting. Journal of Information Engineering and Applications, 5(4), 1-15. |
|
164 |
|
Badhan, S., & Juneja, M. (2015). A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks. In Intelligent Computing, Communication and Devices (pp. 183-190). Springer India. |
|
165 |
|
Mehndiratta, A. (2015). Data Hiding System Using Cryptography & Steganography: A Comprehensive Modern Investigation. |
|
166 |
|
Wahab, O. F. A., Badawy, M. B., Elshakankiry, O. A., & El-sayed, H. S. (2015). Utilizations of Reversible Lossless Data Hiding Techniques in Video Sequences. Int. J. Com. Net. Teach, 3(1). |
|
167 |
|
Din, R., Yusof, S. A. M., Amphawan, A., Hussain, H. S., Yaacob, H., Jamaludin, N., & Samsudin, A. (2015). Performance Analysis on Text Steganalysis Method Using A Computational Intelligence Approach. Proceeding of the Electrical Engineering Computer Science and Informatics, 2(1). |
|
168 |
|
Azizifard, A., Qermezkon, M., & Farshidi, R. Information Steganography within 3D Images Using Residue Number System. |
|
169 |
|
Deepa, S., & Umarani, R. (2015). A Prototype for Secure Information using Video Steganography. image, 4(8). |
|
170 |
|
Liu, L., Chang, C. C., & Wang, A. (2015). Reversible data hiding scheme based on histogram shifting of n-bit planes. Multimedia Tools and Applications, 1-16. |
|
171 |
|
Ahmad, M., Jung, L. T., & Bhuiyan, M. A. A. (2015). On Fuzzy Semantic Similarity Measure for DNA Coding. Computers in Biology and Medicine. |
|
172 |
|
Anvary, M. D., Feshki, M. G., & Ahrabi, A. A. A. (2015). Efficient Security Alert Management System. International Journal of Computer Science and Security (IJCSS), 9(4), 218. |
|
173 |
|
Feshki, M. G., Sojoodi, O., & Anvary, M. D. (2015). Managing Intrusion Detection Alerts Using Support Vector Machines. International Journal of Computer Science and Security (IJCSS), 9(5), 266. |
|
174 |
|
Rai, P. K., & Singh, P. (2015). Studies and Analysis of Popular Database Models. |
|
175 |
|
Khadka, I. The accuracy of location services and the potential impact on the admissibility of GPS Based evidence in court cases. |
|
176 |
|
Chuchuen, C., & Chanvarasuth, P. (2015). Relationship between Phishing Techniques and User Personality Model of Bangkok Internet Users. |
|
177 |
|
Jain, A., & Buksh, B. Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques. |
|
178 |
|
Babatunde, I. G. (2015). Fingerprint Matching Using Minutiae-Singular Points Network. International Journal of Signal Processing, Image Processing and Pattern Recognition, 8(2), 375-388. |
|
179 |
|
Narayanan, R. C. Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Recognition Biometric System. |
|
180 |
|
Patel, A. (2015). Risk based prioritization of Asthma Burden Using Artificial Neuro Fuzzy Inference System. |
|
181 |
|
Chowdhury, C. R., & Saha, B. (2015). Efficient Fingerprint Matching Based Upon Minutiae Extraction. International Journal of Advanced Computer Research, 5(21), 347. |
|
182 |
|
Ahmad, F., Darbari, M., & Asthana, R. (2015). Different Approaches of Soft Computing Techniques (Inference System) which are used in Clinical Decision Support System for Risk based Prioritization. Asian Journal of Computer and Information Systems, 3(1). |
|
183 |
|
Iwasokun, G. B., Udoh, S. S., & Akinyokun, O. K. (2015). Multi-Modal Biometrics: Applications, Strategies and Operations. Global Journal of Computer Science and Technology, 15(2). |
|
184 |
|
Owusu, E., Gavua, E. K., & Zhan, Y. Z. (2015). Facial Expression Recognition–A Comprehensive Review. The Fourth Edition of the International Journal of Technology and Management Research, 1(4), 29-46. |
|
185 |
|
Tamimi, A. A., AL-Allaf, O. N., & Alia, M. A. (2015). Real-Time Group Face-Detection for an Intelligent Class-Attendance System. |
|
186 |
|
Anissa, B., Naouar, B., Arsalane, Z., & Jamal, K. (2015, March). Face recognition:Compar ative study between linear and non linear dimensionality reduction methods. In Electrical and Information Technologies (ICEIT), 2015 International Conference on (pp. 224-228). IEEE. |
|
187 |
|
Vijayalakshmi, V., Sharmila, R., & Shalini, R. (2015, March). Hierarchical key management scheme using Hyper Elliptic Curve Cryptography in Wireless Sensor Networks. In Signal Processing, Communication and Networking (ICSCN), 2015 3rd International Conference on (pp. 1-5). IEEE. |
|
188 |
|
Tomar, G. S., Kevre, P., & Shrivastava, L. Energy model based Performance Analysis of cluster based wireless sensor network. |
|
189 |
|
Ye, F., Qian, Y., & Hu, R. Q. (2015). HIBaSS: hierarchical identity-based signature scheme for AMI downlink transmission. Security and Communication Networks. |
|
190 |
|
Aboud, S., & Al-fayoumi, M. (2012). proxy signature scheme for warrant partial delegation. In The International Conference on Computing, Networking and Digital Technologies (ICCNDT2012) (pp. 107-113). The Society of Digital Information and Wireless Communication. |
|
191 |
|
Jain, M., & Tripathi, K. C. Auto Associative Neural Networks for Nonlinear Principal Components Analysis of Sea Surface Temperature Anomalies in Indian Ocean. |
|
192 |
|
Fayed, S., Youssef, S. M., El-Helw, A., Patwary, M., & Moniri, M. (2015). Adaptive compressive sensing for target tracking within wireless visual sensor networks-based surveillance applications. Multimedia Tools and Applications, 1-25. |
|
193 |
|
Kishore, N. (2015). Parllel hashing algorithms for security and Forensic Applicatons. |
|
194 |
|
Fasola, O. S. (2015). Perceptions and acceptance of librarians towards using Facebook and Twitter to promote library services in Oyo State, Nigeria. The Electronic Library, 33(5), 870-882. |
|
195 |
|
Claybaugh, C. C., Haried, P., & Yu, W. B. (2015). Diffusion of a Professional Social Network: Business School Graduates in Focus. International Journal of Human Capital and Information Technology Professionals (IJHCITP), 6(4), 80-96. |
|
196 |
|
Caldwell, J. M. (2015). Going where students are: comparing faculty and student uses and perceptions of social networking in higher education. |
|
197 |
|
Borena, B., Belanger, F., & Egigu, D. (2015, January). Information Privacy Protection Practices in Africa: A Review Through the Lens of Critical Social Theory. In System Sciences (HICSS), 2015 48th Hawaii International Conference on (pp. 3490-3497). IEEE. |
|
198 |
|
Larsen, E. S. H., & Seim, G. G. (2015). Entering a Developing Country with a Solar Cooker: Strategies for Start-ups. |
|
199 |
|
Jhaveri, R. H., & Patel, N. M. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks, 1-18. |
|
200 |
|
Mahajan, N., Bedi, R., & Gupta, S. K. Defending Against Byzantine and Resource Consumption Attacks by Malicious Nodes in MANETs. |
|
201 |
|
Mittal, V. (2015). Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach. Prevention, 4(5). |
|
202 |
|
Yadav, N. A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks. |
|
203 |
|
Sharma, M., & Singla, R. Impact of Jamming Attack in Performance of Mobile Ad hoc Networks. |
|
204 |
|
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1. |
|
205 |
|
Caselli, M., Zambon, E., & Kargl, F. (2015, April). Sequence-aware Intrusion Detection in Industrial Control Systems. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (pp. 13-24). ACM. |
|
206 |
|
Feshki, M. G., Sojoodi, O., & Anvary, M. D. (2015). Managing Intrusion Detection Alerts Using Support Vector Machines. International Journal of Computer Science and Security (IJCSS), 9(5), 266. |
|
207 |
|
Anvary, M. D., Feshki, M. G., & Ahrabi, A. A. A. (2015). Efficient Security Alert Management System. International Journal of Computer Science and Security (IJCSS), 9(4), 218. |
|
208 |
|
Gunduz, S., Arslan, B., & Demirci, M. (2015, December).A Review of Machine Learning Solutions to Denial-of-Services Attacks in Wireless Sensor Networks. In 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA) (pp. 150-155). IEEE. |
|
209 |
|
Chaudhry, M. T., & Sher, M. Secure Group Based Biometric Authentication Approach for Mobile Ad hoc Networks. |
|
210 |
|
Padma, T., Pillai, J. S., & Ambili, P. S. Continued Fraction Based Sequences for Content Based Image Authentication. |
|
211 |
|
Pillai, J. S., & Padma, T. ParQuoSCI: Pseudorandom Partial Quotient Sequences for Content based Image Authentication. |
|
212 |
|
Tazir, M. L., Azouaoui, O., Hazerchi, M., & Brahimi, M. (2015, July). Mobile robot path planning for complex dynamic environments. In Advanced Robotics (ICAR), 2015 International Conference on (pp. 200-206). IEEE. |
|
213 |
|
Mobadersany, P., Khanmohammadi, S., & Ghaemi, S. A fuzzy multi-stage path-planning method for a robot in a dynamic environment with unknown moving obstacles. Robotica, 1-17. |
|
214 |
|
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1. |
|
215 |
|
Anchor, Nafisa, & Abdul race. (2015). Identify phishing websites in internet banking using optimization algorithm inclined pages. Electronic and cyber defense Journal, 3 (1). |
|
216 |
|
Idris, M. I. A., Elsid, A. G., & Alhady, M. N. (2015). Enhancement the Ad-hoc On-demand Distance Vector of Network. |
|
217 |
|
Elizabeth Jim, L., & Gregory, M. A. (2015, November). State analysis of Mobile Ad Hoc Network nodes. In Telecommunication Networks and Applications Conference (ITNAC), 2015 International (pp. 314-319). IEEE. |
|
218 |
|
Yibyeonggwan , and jeongeunhui . (2015) . Efficient wormhole attack detection and removal techniques designed for the safe route on VANET. Security Engineering Research Institute Journal of Security Engineering, 12 (4), 415-426. |
|
219 |
|
Bhatta, J., & Pandey, L. P. (2015, December). Performance analysis of various optimization techniques for elliptic curve cryptosystems on resource-constrained devices. In 2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA) (pp. 1-7). IEEE. |
|
220 |
|
Zellagui, M., Benabid, R., Boudour, M., & Chaghi, A. (2015). Mixed Integer Optimization of IDMT Overcurrent Relays in the Presence of Wind Energy Farms Using PSO Algorithm. Periodica Polytechnica-Electrical Engineering and Computer Science, 59(1), 7-19. |
|
221 |
|
Khurana, M., & Massey, K. (2015). Swarm algorithm with adaptive mutation for airfoil aerodynamic design. Swarm and Evolutionary Computation, 20, 1-13. |
|
222 |
|
Neshat, M., & Sepidname, G. (2015). A new hybrid optimization method inspired from swarm intelligence: Fuzzy adaptive swallow swarm optimization algorithm (FASSO). Egyptian Informatics Journal, 16(3), 339-350. |
|
223 |
|
Adewumi, A. O., & Arasomwan, M. A. (2015). Improved Particle Swarm Optimizer with Dynamically Adjusted Search Space and Velocity Limits for Global Optimization. International Journal on Artificial Intelligence Tools. |
|
224 |
|
Chenshou Wen. (2015) based on the centroid and adaptive inertia weight index improved particle swarm optimization. Computer Engineering and Applications, 51 (5). |
|
225 |
|
Chenshou Wen . ( 2015 ) . Based on the centroid and adaptive inertia weight index improved particle swarm algorithm . Journal of Computer Applications , 35 ( 3 ) , 675-679. |
|
226 |
|
Kessentini, S., & Barchiesi, D. Particle Swarm Optimization with Adaptive Inertia Weight.Chen, R. M., & Huang, S. C. (2015, August). Particle swarm optimization for scheduling problems by curve controlling based global communication topology. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on (pp. 1716-1720). IEEE. |
|
227 |
|
Yang, C. T. (2015). Based on plant location and to adapt to deviate from the value of the governor enhanced particle swarm optimization method . Kung University Thesis Institute of Information Management , 1-60 . |
|
228 |
|
Iwasokun, G. B., Udoh, S. S., & Akinyokun, O. K. (2015). Multi-Modal Biometrics: Applications, Strategies and Operations. Global Journal of Computer Science and Technology, 15(2). |
|
229 |
|
Mijac, M., & Stapic, Z. (2015, January). Reusability Metrics of Software Components: Survey. In Central European Conference on Information and Intelligent Systems (p. 221). Faculty of Organization and Informatics Varazdin. |
|
230 |
|
Mijac, M., & Stapic, Z. (2015, January). Reusability Metrics of Software Components: Survey. In 26th Central European Conference on Information and Intelligent Systems (CECIIS 2015). |
|
231 |
|
Mandala, S., Ngadi, M. A., Sharif, J. M., Zahid, M. S. M., & Mohamed, F. (2015). Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks. International Journal of Embedded Systems, 7(3-4), 296-305. |
|
232 |
|
Hussain, M. A. (2015). Energy Efficient Intrusion Detection Scheme with Clustering for Wireless Sensor Networks. TELKOMNIKA Indonesian Journal of Electrical Engineering, 15(1), 128-141. |
|
233 |
|
masoud Javidi, M., & Aliahmadipour, L. (2015). Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs. Computer Engineering and Applications, 4(1). |
|
234 |
|
Samaras, N. S., Kokkinos, K., Chaikalis, C., & Vlachos, V. (2015). On intrusion detection in opportunistic networks. International Journal of Innovation and Regional Development, 6(3), 222-242. |
|
235 |
|
Meenatchi, I., & Palanivel, K. An Enhanced Cross layer intrusion detection and adaptive response mechanism for MANETs. |
|
236 |
|
EL MOURABIT, Y. O. U. S. E. F., toumanari, a., bouirden, a., & el moussaid, n. a. d. i. a. (2015). a comparative evaluation of intrusion detection techniques in wireless sensor network. journal of theoretical & applied information technology, 76(1). |
|
237 |
|
Jacobs, M., Chang, L. C., Pulkkinen, A., & Romano, M. (2015). Automatic analysis of double coronal mass ejections from coronagraph images. Space Weather, 13(11), 761-777. |
|
238 |
|
RAVI, M., & basavaprasad, b. a comparative study on segmentation methods for medical imaging. |
|
239 |
|
Alimi, I. A., & Aboderin, O. (2015). Enhanced encryption algorithm based on a modified confusion and diffusion scheme. American Journal of Mobile Systems, Applications and Services, 1(1), 20-29. |
|
240 |
|
Saqib, Z., Shahid, M. A., & Ashraf, M. U. Encryption and Decryption Using Automata Theory. |
|
241 |
|
Gandhi, R. A., & Gosai, A. M. (2015). A Study on Current Scenario of Audio Encryption. International Journal of Computer Applications, 116(7), 13-17. |
|
242 |
|
Amounas, f. international journal of engineering sciences & research technology a multi-level approach of elliptic curve cryptosystem for enhanced security of amazigh alphabet using cellular automata. |
|
243 |
|
Prasad, M. R. (2015). Improving RGB Data Security with Advance Cryptography Algorithm. |
|
244 |
|
Gosai, D. A. M. (2015). International Journal of Computer Applications. |
|
245 |
|
Kalidasan, S., & Pandian, P. Available Online through Research Article www. ijptonline. com. |
|
246 |
|
Wong, C. H. H. (2015). A study of mobile learning for Guangzhou’s University students. |
|
247 |
|
Srivastava, S., & Misra, M. (2015). Tracking technology trajectory through regression modelling: a retrospective techno-analysis. Technology Analysis & Strategic Management, 27(4), 420-436. |
|
248 |
|
Sumathi, A., & Sundaram, B. V. (2015). An ANN Approach in Ensuring CIA Triangle using an Energy based Secured Protocol E-AODV for Enhancing the Performance in MANETS. Indian Journal of Science and Technology, 8(34). |
|
249 |
|
Das, J., & Das, P. (2015). An Overview of Wireless Ad hoc Networks. International Journal of Advanced Research in Computer Science, 6(1). |
|
250 |
|
Naheed, M., Mahmood, H., & Murtza, I. (2015, October). Secure multipath routing using link compromise metric in mobile ad hoc networks. In Electrical Engineering (RAEE), 2015 Symposium on Recent Advances in (pp. 1-5). IEEE. |
|
251 |
|
Chauhan, A., Rani, P., & Student, M. T. A Detail Review of Routing Attacks in Mobile Ad Hoc Networks. |
|
252 |
|
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1. |
|
253 |
|
Jin-peng, Q., Jie, Q., Fang, P., & Tao, G. (2015, July). Multi-channel detection for abrupt change based on the Ternary Search Tree and Kolmogorov statistic method. In Control Conference (CCC), 2015 34th Chinese (pp. 4968-4973). IEEE. |
|
254 |
|
Akila, A., & Chandra, E. (2015). Word based tamil speech recognition using temporal feature based segmentation. ictact Journal on Image & Video Processing, 5(4). |
|
255 |
|
Ramli, I. (2015). Regular paper Sentence boundary detection without speech recognition: A case of an under-resourced language. J. Electrical Systems, 11(3), 308-318. |
|
256 |
|
Das, A. P., & Thampi, S. M. (2015, August). Secure communication in mobile underwater wireless sensor networks. In Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on (pp. 2164-2173). IEEE. |
|
257 |
|
Ramezani, H., Fazel, F., Stojanovic, M., & Leus, G. (2015). Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization. |
|
258 |
|
Carneiro, J. H. C. C. (2015). localização de emissores acústicos em ambientes submarinos com redes de sensores móveis (doctoral dissertation, universidade federal do rio de janeiro). |
|
259 |
|
Dell'Erba, R. (2015). Determination of Spatial Configuration of an Underwater Swarm with Minimum Data. Int J Adv Robot Syst, 12, 97. |
|
260 |
|
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1. |
|
261 |
|
Emam, M. M., Aly, A. A., & Omara, F. A. A Modified Image Steganography Method based on LSB. |
|
262 |
|
Thanekar, S. A. (2015). Eight Pixel Pairs Value Differencing Image Steganography. IJETT, 2(1). |
|
263 |
|
Sakthivel, S. M., & Ravi Sankar, A. (2015, February). A VLSI architecture for watermarking of grayscale images using weighted median prediction. In Electronics and Communication Systems (ICECS), 2015 2nd International Conference on (pp. 1128-1131). IEEE. |
|
264 |
|
Amsaveni, A., & Vanathi, P. T. (2015). A comprehensive study on image steganography and steganalysis techniques. International Journal of Information and Communication Technology, 7(4-5), 406-424. |
|
265 |
|
Deshmukh, M. A. P., & Suralkar, S. R. (2015). Literature Survey-Digital Watermarking on Camera Captured Color Images. |
|
266 |
|
Manjula, G. R., & Danti, A. (2015). A novel hash based least significant bit (2-3-3) image steganography in spatial domain. arXiv preprint arXiv:1503.03674. |
|
267 |
|
Swain, G., & Lenka, S. K. (2015). A novel steganography technique by mapping words with LSB array. International Journal of Signal and Imaging Systems Engineering, 8(1-2), 115-122. |
|
268 |
|
Al-Hada, M., Naser, A. M., & Al-Thamary, M. Hide Image in Image Based on LSB Replacement and Arnold Transform. |
|
269 |
|
Tajuddin, T. B., & Manaf, A. A. Forensic Investigation and Analysis on Digital Evidence Discovery through Physical Acquisition on Smartphone. |
|
270 |
|
Martin, K. K. (2015). An Investigation of Digital Forensic Models Applicable in the Public Sector (A case of Kenya National Audit Office) (Doctoral dissertation). |
|
271 |
|
Lin, T. S., Lin, I. L., & Leu, F. Y. (2015, July). Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015 9th International Conference on (pp. 420-425). IEEE. |
|
272 |
|
Rauter, S., Fister, I., & Fister Jr, I. (2015). How to Deal with Sports Activity Datasets for Data Mining and Analysis: Some Tips and Future Challenges. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 7(2), 27-37. |
|
273 |
|
Antonio, T., & Paramita, A. S. (2015). Feature Selection Technique Impact for Internet Traffic Classification Using Naïve Bayesian. Jurnal Teknologi, 72(5). |
|
274 |
|
Paramita, A. S. (2014). Feature Selection Technique Using Principal Component Analysis For Improving Fuzzy C-Mean Internet Traffic Classification. Australian Basic and Applied Sciences (AJBAS): 2014 International on Engineering Conference on Sciences and Technology Innovation–ISSN: 1997-8178–American-Eurasian Network for Scientific Information (AENS |
|
275 |
|
Paramita, A. S. (2016). Principal Feature Selection Impact for Internet Traffic Classification Using Naïve Bayes. In Proceedings of Second International Conference on Electrical Systems, Technology and Information 2015 (ICESTI 2015) (pp. 475-480). Springer Singapore. |
|
276 |
|
Mayilvaganan, M., & Geethamani, G. S. A Preliminary Survey on Genetic Algorithm Techniques. |
|
277 |
|
Persis, D. J., & Robert, T. P. (2015). Ant Based Multi-objective Routing Optimization in Mobile AD-HOC Network. Indian Journal of Science and Technology, 8(9), 875-888. |
|
278 |
|
Joardar, S., Bhattacherjee, V., & Giri, D. (2015). SiCaL: a swarm inspired congestion aware probabilistically load balance routing in MANETs. International Journal of Information and Communication Technology, 7(6), 585-606. |
|
279 |
|
Sensarma, D. (2015). AQTR: The Ant Based Qos Aware Improved Temporally Ordered Routing Algorithm for Manets. Available at SSRN 2556278. |
|
280 |
|
Karthikeyan, P., & Baskar, S. (2015). Genetic algorithm with ensemble of immigrant strategies for multicast routing in Ad hoc networks. Soft Computing, 19(2), 489-498. |
|
281 |
|
Cao, M. S., Pan, L. X., Gao, Y. F., Novák, D., Ding, Z. C., Lehký, D., & Li, X. L. Neural network ensemble-based parameter sensitivity analysis in civil engineering systems. Neural Computing and Applications, 1-8. |
|
282 |
|
Ravi, V., Koparkar, S., Raju, N. P., & Sridher, S. (2015). Improving retail banking loans recovery via data mining techniques: a case study from Indian market. International Journal of Electronic Customer Relationship Management, 9(2-3), 189-201. |
|
283 |
|
Teshnizi, S. H., & Ayatollahi, S. M. T. (2015). A Comparison of Logistic Regression Model and Artificial Neural Networks in Predicting of Student’s Academic Failure. Acta Informatica Medica, 23(5), 296. |
|
284 |
|
Senthilkumar, D., & Paulraj, S. Prediction of Low Birth Weight Infants and Its Risk Factors Using Data Mining Techniques. |
|
285 |
|
Jain, N., Sharma, A., & Sharma, A. Nav view search. |
|
286 |
|
Yunus, N. A. M., & Othman, M. (2015). Reliability Evaluation for Shuffle Exchange Interconnection Network. Procedia Computer Science, 59, 162-170. |
|
287 |
|
Gangele, S., & Dongre, A. (2015). Area Estimation for Web Browsing Performance of Users by Applying Numerical Method. International Journal of Computer Applications, 120(9), 6-11. |
|
288 |
|
Patidar, B., & Shivhare, R. R. (2015). Detection of Wormhole Attack using Round Trip Time and Node Workload. International Journal of Computer Applications, 112(11). |
|
289 |
|
Ramana, V. V., & Reddy, A. R. M. (2015). Secure routing in MANETs: a bio–inspired approach with honey bees. International Journal of Wireless and Mobile Computing, 8(1), 82-89. |
|
290 |
|
Lakshmi, A. A., & Valluvan, K. R. (2015). Support vector machine and fuzzy-based intrusion detection and prevention for attacks in MANETs. International Journal of Mobile Network Design and Innovation, 6(2), 63-72. |
|
291 |
|
Schoofs, M. HIV VULNERABILITY FOUND via STOCK MARKET ANALYSIS. |
|
292 |
|
Singh, N., & Shrivastava, L. (2015). Impact of Antenna model with the variation of speed for Reactive and Hybrid routing protocols in Mobile Ad-Hoc Networks. |
|
293 |
|
Rajkumar, B., & Narsimha, G. (2015). Trust-based light weight authentication routing protocol for MANET. International Journal of Mobile Network Design and Innovation, 6(1), 31-39. |
|
294 |
|
Sardana, A., Saini, A., Bedwal, T., & Tayal, R. (2015, March). Black hole attack's effect mobile ad-hoc networks (MANET). In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in (pp. 966-970). IEEE. |
|
295 |
|
Xiong, X., Feng, J., & Jiang, L. (2015, October). Automatic digital modulation classification for ORS satellite relay communication. In Wireless Communications & Signal Processing (WCSP), 2015 International Conference on (pp. 1-5). IEEE. |
|
296 |
|
Hussain, J., Lalmuanawma, S., & Chhakchhuak, L. (2015). A Novel Network Intrusion Detection System Using Two-Stage Hybrid Classification Technique. IJCCER, 3(2), 16-27. |
|
297 |
|
Mansouri, m., golsefid, m. t., & nematbakhsh, n. (2015). a hybrid intrusion detection system based on multilayer artificial neural network and intelligent feature selection. cumhuriyet science journal, 36(3), 2686-2692. |
|
298 |
|
JAWANJAL, S. D. INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY. |
|
299 |
|
Chaczko, Z., Jacak, W., & Luba, T. (2015). Computational Intelligence and Efficiency in Engineering Systems (Vol. 595). G. Borowik (Ed.). Springer. |
|
300 |
|
Dhankar, M. (2015). Network Security-Authentication Methods and Firewall. IITM Journal of Management and IT, 6(1), 73-79. |
|
301 |
|
Sekulski, R., & Woda, M. (2015). Authorial, Adaptive Method of Users’ Authentication and Authorization. In Computational Intelligence and Efficiency in Engineering Systems (pp. 171-184). Springer International Publishing. |
|
302 |
|
Sekulski, R., & Woda, M. (2015). A Novel Approach to Users Authentication and Authorization. Studia Informatica, 36(2), 5-22. |
|
303 |
|
Aujla, S., & Ummat, A. Task scheduling in Cloud Using Hybrid Cuckoo Algorithm. International Journal of Computer Networks and Applications (IJCNA), 2(3), 144-150. |
|
304 |
|
Mao, Y., Zhong, H., & Li, X. (2015, August). Hierarchical model-based associate tasks scheduling with the deadline constraints in the cloud. In Information and Automation, 2015 IEEE International Conference on (pp. 268-273). IEEE. |
|
305 |
|
Neves, D., Lourenco, N., & Horta, N. (2015, September). Scheduling evaluation tasks for increased efficiency of parallel analog IC synthesis. In Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design (SMACD), 2015 International Conference on (pp. 1-4). IEEE. |
|
306 |
|
Pop, F., Dobre, C., Cristea, V., Bessis, N., Xhafa, F., & Barolli, L. (2015). Reputation-guided evolutionary scheduling algorithm for independent tasks in inter-clouds environments. International Journal of Web and Grid Services, 11(1), 4-20. |
|
307 |
|
Kalra, M., & Singh, S. (2015). A review of metaheuristic scheduling techniques in cloud computing. Egyptian Informatics Journal, 16(3), 275-295. |
|
308 |
|
Hashimi, H., Hafez, A., & Mathkour, H. (2015). Selection criteria for text mining approaches. Computers in Human Behavior, 51, 729-733. |
|
309 |
|
El-Said, A. M., ELDESOKY, A., & Arafat, H. A. (2015). An Efficient Approach to Construct Object Model of Static Textual Structure with Dynamic Behavior Based on Q-learning. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 31(4), 1267-1289. |
|
310 |
|
Priest, B., Vuksani, E., Wagner, N., Tello, B., Carter, K. M., & Streilein, W. W. Agent-Based Decision Support for Moving Target Technology Deployment. |
|
311 |
|
Kaur, R., & Prabha, E. C. a novel technique of image steganography. |
|
312 |
|
Ujianto, e., harjoko, a., wardoyo, r., & moesriami, a. (2015). cascaded image steganography to increase robustness againts attack of the stego image. journal of theoretical & applied information technology, 79(3). |
|
313 |
|
Saputra, D. E., Supangkat, S. H., & Sutikno, S. (2015, November). Review and classification of electronic cash research. In 2015 International Conference on Information Technology Systems and Innovation (ICITSI) (pp. 1-5). IEEE. |
|
314 |
|
ESTEDLAL, M. M. (2015). Introduction and Evaluation of Computer Security Incident Response Team (CSIRT) in Organizations. Cumhuriyet Science Journal, 36(6), 246-253. |
|
315 |
|
Je, Y. M., You, Y. Y., & Na, K. S. Information Security Evaluation Using Multi-Attribute Threat Index. Wireless Personal Communications, 1-13. |
|
316 |
|
AL-Nasrawi, D. A., Almukhtar, A. F., & AL-Baldawi, W. S. (2015). From Arabic Alphabets to Two Dimension Shapes in Kufic Calligraphy Style Using Grid Board Catalog. Communications in Applied Sciences, 3(2). |
|
317 |
|
Montasari, R., Peltola, P., & Evans, D. (2015). Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations. In Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security (pp. 83-95). Springer International Publishing. |
|
318 |
|
History Xin Ling, & Zheng Shuli . ( 2015 ) . Research and development of network forensics of network security technology and applications, ( 2 ) , 110-111. |
|
319 |
|
Wen Min . ( 2015 ) . Design and implementation of information exchange security suite system. Network Security Technology and Application, ( 2 ) , 114-116. |
|
320 |
|
Gaber, A. M., Mazen, S., & Hassanei, E. E. (2015). Framework for Integrating Software Project Tasks and Change Requests. International Journal of Computer Applications, 125(12). |
|
321 |
|
Al-Azawi, R. K. (2015). Agent Oriented Software Engineering (AOSE) Approach to Game Development Methodology. |
|
322 |
|
Faculty of Computer Science And Information Technology - Universiti Putra Malaysia (UPM) |
|
323 |
|
Bistouni, F., & Jahanshahi, M. (2014). Improved extra group network: a new fault-tolerant multistage interconnection network. The Journal of Supercomputing, 69(1), 161-199. |
|
324 |
|
Vimina, E. R., & Jacob, K. P. (2014). An Evaluation of Image Matching Algorithms for Region Based Image Retrieval. International Journal of Advancements in Computing Technology, 6(6), 75. |
|
325 |
|
Sardar, M., Banerjee, S., Majhi, K., & Majumder, K. (2014). Trust Based Network Layer Attacks Prevention in MANET. In Emerging Trends in Computing and Communication (pp. 193-204). Springer India. |
|
326 |
|
Sardar, M., & Majumder, K. (2014). A New Trust Based Secure Routing Scheme in MANET. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 321-328). Springer International Publishing. |
|
327 |
|
Hassan, W. A., & Rahman, T. A. (2014). Coexistence model for compatibility between IMT-advanced and other wireless communication services. Wireless Personal Communications, 79(3), 2025-2039. |
|
328 |
|
Curilem, M., Vergara, J., San Martin, C., Fuentealba, G., Cardona, C., Huenupan, F., Chacón, M., Khan, M. S., Hussein,
W. & Yoma, N. B. (2014). Pattern recognition applied to seismic signals of the Llaima volcano (Chile): An analysis of the
events' features. Journal of Volcanology and Geothermal Research, 282, 134-147. |
|
329 |
|
Curilem, M., Huenupan, F., San Martin, C., Fuentealba, G., Cardona, C., Franco, L., Acuña, G., Chacón, M., (2014). Feature Analysis for the Classification of Volcanic Seismic Events Using Support Vector Machines. In Nature-Inspired Computation and Machine Learning (pp. 160-171). Springer International Publishing. |
|
330 |
|
Chaubey, A., Chelladurai, H., Lamba, S. S., (2014). Condition monitoring of rotating shaft using virtual instrumentation" 5th International & 26th All India Manufacturing Technology, Design and Research Conference (AIMTDR 2014), pp. 557-(1-6). IIT Guwahati, Assam, India. |
|
331 |
|
Adly, F., Yoo, P. D., Muhaidat, S., & Al-Hammadi, Y. (2014, May). Machine-Learning-Based Identification of Defect Patterns in Semiconductor Wafer Maps: An Overview and Proposal. In Parallel & Distributed Processing Symposium Workshops (IPDPSW), 2014 IEEE International (pp. 420-429). IEEE. |
|
332 |
|
Hussien, N. S., Sulaiman, S., & Shamsuddin, S. M. (2014). A Review of Intelligent Methods for Pre-fetching in Cloud Computing Environment. In Recent Advances on Soft Computing and Data Mining (pp. 647-656). Springer International Publishing. |
|
333 |
|
Selvakumar, L., Vivekanandan, K., & Amilan, S. (2014). New Linkage Learning Technique in Genetic Algorithm for Stock Selection Problem. International Journal of Advanced Research in Computer Science, 5(3). |
|
334 |
|
Gautam, G., & Yadav, D. (2014, August). Sentiment analysis of twitter data using machine learning approaches and semantic analysis. In Contemporary Computing (IC3), 2014 Seventh International Conference on (pp. 437-442). IEEE. |
|
335 |
|
Suresh Joseph, K. (2014). Genetic algorithm based hybrid imputation model for software effort estimation. |
|
336 |
|
Khan, R. A. (2014). Machine Learning: Techniques and Application. Artificial Intelligent Systems and Machine Learning, 6(5), 169-175. |
|
337 |
|
Spamers, A. J., & Grobler, H. Real-time Face Detection and Tracking from a Non-static Video Camera. |
|
338 |
|
Chung, S. H., Robertson, S., Minnaar, A., Cook, M., & Sun, L. (2014, January). Developing a Knowledge Management System Using an Ontological Approach in Global Organization. In ICISO (pp. 340-347). |
|
339 |
|
Yuan, Y., Chen, D., Li, Y., Yu, D., Yan, L., & Zhu, Z. (2014). The improved Shark Search Approach for Crawling Large-scale Web Data. International Journal of Multimedia & Ubiquitous Engineering, 9(8). |
|
340 |
|
Khanbary, L. M. O., & Vidyarthi, D. P. (2014). Agent-based energy constrained channel allocation in mobile computing using GA. International Journal of Wireless and Mobile Computing, 7(4), 388-399. |
|
341 |
|
Gaber, S. M. A., & Sumari, P. (2014). Predictive and content-aware load balancing algorithm for peer-service area based IPTV networks. Multimedia tools and applications, 70(3), 1987-2010. |
|
342 |
|
Banafar, H., & Sharma, S. Secure Cloud Environment Using Hidden Markov Model and Rule Based Generation. |
|
343 |
|
Sarhan, A., Elmogy, A. M., & Ali, S. M. (2014, December). New Web cache replacement approaches based on internal requests factor. In Computer Engineering & Systems (ICCES), 2014 9th International Conference on (pp. 383-389). IEEE. |
|
344 |
|
Venketesh, P. (2014). New approaches in web prefetching to improve content access by end users. |
|
345 |
|
Aswini, S., & Sundaram, G. S. (2014). Web cache memory compression for optimizing performance in web browsers. |
|
346 |
|
Bhatnagar, U., & Gahlout, A. A Modern Way of Framework Design for the Client Side Web Caching and Prefetching Technique. |
|
347 |
|
ShanmugaSundaram, G., & Aswini, S. Web cache memory compression for optimizing the performance in web browsers. |
|
348 |
|
Konate, K., & Abdourahime, G. A. Y. E. (2014). Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks. Compusoft, 3(12), 1425. |
|
349 |
|
Praveena, M., Thiribhurabhavan, R. M., Bhavadharini, R. M., & Karthik, D. S. (2014). An Enhanced Adaptive Security Protocol For Replica Attacks In Mobile Adhoc Networks. International Journal of software and hardware Research in Engg, 2(5), 79-83. |
|
350 |
|
Kadu, A. A., & S Nagdive, A. (2014). “Real-Time 3D Game Using Sixth Sense and Haptic Technology”: A Review. IJRCCT, 3(1), 042-047. |
|
351 |
|
Dhule, C., & Nagrare, T. (2014, April). Computer Vision Based Human-Computer Interaction Using Color Detection Techniques. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on (pp. 934-938). IEEE. |
|
352 |
|
Bhatia, S. M., & Sharma, A. K. (2014). Fuzzy Quality Function Deployment and Software Engineering-A Literature Review. Software Engineering and Technology, 6(6), 159-168. |
|
353 |
|
?icleanu, O. A. (2014). Nonlinear analysis on elliptic curves subspaces with cryptographic applications. Annals of the University of Craiova-Mathematics and Computer Science Series, 41(2), 292-299. |
|
354 |
|
Imran, K., Mahfooz, S., Rauf, A., & Khusro, S. (2014). Enhanced Authentication Scheme for Proxy Mobile IPv6. Life Science Journal, 11(3s). |
|
355 |
|
Shukla, D., & Verma, K. (2014). Bounded Area Estimation Using Simpson 3/8 Rule in Traffic Sharing Scenario in Computer Network. |
|
356 |
|
Gangele, S., Verma, K., & Shukla, D. (2014). Bounded Area Estimation of Internet Traffic Share Curve. International Journal of Computer Science and Business Informatics (IJCSBI), 10(1), 54-67. |
|
357 |
|
Tu, M. H. (2014). A method in a meaningful candidate styles mining image library of styles frequently . Sun Yat-sen Institute of Information Engineering Thesis , 1-102. |
|
358 |
|
?icleanu, O. A. (2014). Nonlinear analysis on elliptic curves subspaces with cryptographic applications. Annals of the University of Craiova-Mathematics and Computer Science Series, 41(2), 292-299. |
|
359 |
|
Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14(6), 10081-10106. |
|
360 |
|
Babrahem, A. S., Alharbi, E. T., Alshiky, A. M., Alqurashi, S. S., & Kar, J. (2014). Study of the Security Enhancements in Various E-Mail Systems. Journal of Information Security, 6(01), 1. |
|
361 |
|
Zhu, H., Hao, X., & Sun, Y. Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant. |
|
362 |
|
Babrahem, A. S., Alharbi, E. T., Alshiky, A. M., Alqurashi, S. S., & Kar, J. Scientific Research Publishing. |
|
363 |
|
Varsaki, E. E., Fotopoulos, V., & Skodras, A. N. (2014). A discrete Gould transform data hiding scheme. Mathematical Methods in the Applied Sciences, 37(2), 283-288. |
|
364 |
|
Othman, J. A. (2014). Steganographic scheme to avoid statistical Steganalysis. J. Of College Of Education For Women, 25(1). |
|
365 |
|
Bagade, A. M. (2014). A High Quality Steganographic Method Using Morphing. Journal of information processing systems, 10(2), 256-270. |
|
366 |
|
Azaminezhad, M. S., & Bidgoli, A. M. (2014). A new high capacity steganography based on bit-inverting method in DWT domain. Journal of Advanced Computer Science & Technology, 3(2), 169-178. |
|
367 |
|
Mandal, P. C. (2014). A study of Steganography Techniques using Discrete Wavelet Transform. Journal of Global Research in Computer Science, 5(5), 7-14. |
|
368 |
|
aldeen najim Alzubaidy, D. (2014). Paper of Nagham. pdf. |
|
369 |
|
Usha, B. A., Srinath, N. K., Nanjangud, N. C. A., Deshpande, A. M., & Rebello, A. (2014). A Survey on Secure and High Capacity Image Steganography Techniques. International Journal of Advanced Research in Computer and Communication Engineering, 2(3). |
|
370 |
|
Abdullah, K. A., Al-Jawad, N., & Abdulla, A. A. (2014, May). Effect of using different cover image quality to obtain robust selective embedding in steganography. In SPIE Photonics Europe (pp. 913808-913808). International Society for Optics and Photonics. |
|
371 |
|
Desmukh, P. R., & Rahangdale, B. (2014). Hash Based Least Significant Bit Technique For Video Steganography. International Journal of Engineering Research and Applications (IJERA), 4(1). |
|
372 |
|
Kumar, S., Gupta, A., Chandwani, A., Yadav, G., & Swarnkar, R. (2014, September). RGB image watermarking on video frames using DWT. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 675-680). IEEE. |
|
373 |
|
Alam, I., Khusro, S., Rauf, A., & Zaman, Q. (2014). Conducting surveys and data collection: From traditional to mobile and SMS-based surveys. Pakistan Journal of Statistics and Operation Research, 10(2), 169-187. |
|
374 |
|
Kale, N. A., Natikar, S. B., & Karande, S. M. (2014). Secured Mobile Messaging for Android application. |
|
375 |
|
Aprilianto, M., & Abdurohman, M. (2014, April). Improvement Text Compression Performance Using Combination of Burrows Wheeler Transform, Move to Front, and Huffman Coding Methods. In Journal of Physics: Conference Series (Vol. 495, No. 1, p. 012042). IOP Publishing. |
|
376 |
|
Shaker, S. H., Jeiad, H. A., & Hassan, F. A. Propose a Model for Securing SMS. |
|
377 |
|
Deshmukh, S. P., & Naware, A. M. Mobile Money: M-payment System for India. |
|
378 |
|
LaRusic, J., & Punnen, A. P. (2014). The asymmetric bottleneck traveling salesman problem: Algorithms, complexity and empirical analysis. Computers & Operations Research, 43, 20-35. |
|
379 |
|
Ahmed, Z. H. (2014). A data-guided lexisearch algorithm for the quadratic assignment problem. Indian Journal of Science and Technology, 7(4), 480-490. |
|
380 |
|
Swiercz, A., Burke, E. K., Cichenski, M., Pawlak, G., Petrovic, S., Zurkowski, T., & Blazewicz, J. (2014). Unified encoding for hyper-heuristics with application to bioinformatics. Central European Journal of Operations Research, 22(3), 567-589. |
|
381 |
|
Magare, S. S., Gedam, Y. K., Randhave, D. S., & Deshmukh, R. R. (2014). Character Recognition of Gujarati and Devanagari Script: A Review. |
|
382 |
|
Magare, S. S., & Deshmukh, R. R. (2014). Offline Handwritten Sanskrit Character Recognition Using Hough Transform and Euclidean Distance. International Journal of Innovation and Scientific Research ISSN, 2351-8014. |
|
383 |
|
Mendapara, M. B., & Goswami, M. M. (2014, March). Stroke identification in Gujarati text using directional feature. In Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on (pp. 1-5). IEEE. |
|
384 |
|
El Korbi, I., & Zeadally, S. (2014). Energy-aware sensor node relocation in mobile sensor networks. Ad Hoc Networks, 16, 247-265. |
|
385 |
|
Anil, M. C., & Shirbahadurkar, S. D. (2014, February). Speech modification for prosody conversion in expressive Marathi text-to-speech synthesis. In Signal Processing and Integrated Networks (SPIN), 2014 International Conference on (pp. 56-58). IEEE. |
|
386 |
|
Banerjee, S., Sardar, M., & Majumder, K. (2014, January). Aodv based black-hole attack mitigation in manet. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 345-352). Springer International Publishing. |
|
387 |
|
Gopalakrishnan, S., & Ganeshkumar, P. (2014). Intrusion detection in mobile ad hoc network using secure routing for attacker identification protocol. American Journal of Applied Sciences, 11(8), 1391. |
|
388 |
|
Silwal, S., & Sharma, A. (2014). A new Security approach for integrating wireless adhoc network using octant bit computation and routing test. IJSEAT, 2(6), 154-157. |
|
389 |
|
Banerjee, S., & Majumder, K. (2014). wormhole attack mitigation in manet: a cluster based avoidance technique. International Journal of Computer Networks & Communications, 6(1), 45. |
|
390 |
|
Abomhara, M., & Koien, G. M. (2014, May). Security and privacy in the Internet of Things: Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on (pp. 1-8). IEEE. |
|
391 |
|
Garg, G., Kaushal, S., & Sharma, A. (2014). Behavioural Study of Reactive Protocols with Wormhole Attack in Mobile ADHOC Networks. Journal of Emerging Technologies in Web Intelligence, 6(4), 445-455. |
|
392 |
|
Sivagurunathan, S., & Prathapchandran, K. (2014, January). Trust and cluster based authentication schemes in mobile Ad Hoc networks—A review. In Power Signals Control and Computations (EPSCICON), 2014 International Conference on (pp. 1-5). IEEE. |
|
393 |
|
Tamizarasu, k., kalpana, a., & rajaram, M. (2014). maliciousness in mobile ad hoc networks: a performance evaluation. Journal of Theoretical & Applied Information Technology, 65(3). |
|
394 |
|
Patil, K. T., & Patil, M. E. (2014). Study of Attacks in MANET, Attacks on AES, Cryptographically Generated Addresses (CGAs) Methods and Possible Alleviation in IPV6 over MANET Area. International Journal of Computer Applications, 96(1). |
|
395 |
|
Kirubakaran, N., & Kathirvel, A. (2014). Performance Improvement of Security Attacks in Wireless Mobile Ad Hoc Networks. Asian Journal of Information Technology, 13(2), 68-76. |
|
396 |
|
Dureja, A., & Dahiya, V. (2014). performance evaluation of collaborative attacks in manet. |
|
397 |
|
Jasim, S. I. (2014). pcf investigation to improve the performance of tora-based manet against jamming attacks. International Journal of Computer Science and Engineering Survey, 5(3), 17. |
|
398 |
|
Guo, C., Xu, H., Ju, L., Jia, Z., & Xu, J. (2014, September). A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on (pp. 156-163). IEEE. |
|
399 |
|
Sivagurunathan, S., & Prathapchandran, K. (2014, March). Trust Based Security Schemes in Mobile Ad Hoc Networks-A Review. In Intelligent Computing Applications (ICICA), 2014 International Conference on (pp. 291-295). IEEE. |
|
400 |
|
Sardar, M., Banerjee, S., Majhi, K., & Majumder, K. (2014). Trust Based Network Layer Attacks Prevention in MANET. In Emerging Trends in Computing and Communication (pp. 193-204). Springer India. |
|
401 |
|
Vaibhav, A. (2014). Security in Monitoring Schemes: A Survey. arXiv preprint arXiv:1411.5213. |
|
402 |
|
Samanta, C. K., Hota, M. K., Nayak, S. R., Panigrahi, S. P., & Panigrahi, B. K. (2014). Energy management in hybrid electric vehicles using optimized radial basis function neural network. International Journal of Sustainable Engineering, 7(4), 352-359. |
|
403 |
|
Kodali, R. K., & Boppana, L. (2014, September). FPGA implementation of energy efficient multiplication over GF (2 m) for ECC. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 1815-1821). IEEE. |
|
404 |
|
Anagreh, M., Samsudin, A., & Omar, M. A. (2014). Parallel Method for Computing Elliptic Curve Scalar Multiplication Based on MOF. International Arab Journal of Information Technology (IAJIT), 11(6). |
|
405 |
|
Abdulrazeg, A. A., Norwawi, N. M., & Basir, N. (2014, October). Extending V-model practices to support SRE to build secure web application. In Advanced Computer Science and Information Systems (ICACSIS), 2014 International Conference on (pp. 213-218). IEEE. |
|
406 |
|
Chawla, D., & Kaur, M. (2014). System & Web based Modeling for Secure Software Development. International Journal of Computer Technology and Applications, 5(1), 257. |
|
407 |
|
Moedjiono, s., rifai, a., & mantoro, t. (2014). a robust steganography approach with high embedding capacity using unique value embedding and codebook. Journal of Theoretical & Applied Information Technology, 66(1). |
|
408 |
|
Doshi, J. C., Christian, M., & Trivedi, B. H. (2014). SQL FILTER–SQL Injection prevention and logging using dynamic network filter. In Security in Computing and Communications (pp. 400-406). Springer Berlin Heidelberg. |
|
409 |
|
Manimegalai, R. (2014). Efficient joint compression and encryption techniques for video data. |
|
410 |
|
Kansal, A., & Singh, Y. Survey on Machine Learning Techniques for Event Detection in Wireless Sensor Networks. |
|
411 |
|
Medany, I., Shazly, M., & El-Sherbiny, M. G. (2014). Expert-Based-Computer Aided Design and Component Selection for Dust Collection Systems. International Journal of Scientific Research in Environmental Sciences, 2(1), 14. |
|
412 |
|
Mehrasa, M., Zaker, S. R., Larki, B., Mehmandoust, M., Baghshahi, H., Sekhavati, M. H., & Gavanji, S. (2014). Computational Prediction and Analysis of Interaction of Silver Nitrate with Peptidoglycan-Associated lipoprotein (Pal). International Journal of Scientific Research in Environmental Sciences, 2(1), 8. |
|
413 |
|
Kotenko, I., & Chechulin, A. Fast Network Attack Modeling and Security Evaluation based on Attack Graphs. Journal of Cyber Security, 3(1), 27-46. |
|
414 |
|
Parul, M., & Rohil, H. (2014). Optimized Image Steganography using Discrete Wavelet Transform (DWT). International Journal of Recent Development in Engineering and Technology (IJRDET), 2(2), 75-81. |
|
415 |
|
Nag, A., Singh, J. P., Biswas, S., Sarkar, D., & Sarkar, P. P. (2014). A Huffman Code Based Image Steganography Technique. In Applied Algorithms (pp. 257-265). Springer International Publishing. |
|
416 |
|
Zan, M. M., & Aye, N. (2014). Implementation of Secure Steganography System Based on DWT in RGB Color Channel. IJCCER, 2(3), 114-118. |
|
417 |
|
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication. |
|
418 |
|
Azaminezhad, M. S., & Bidgoli, A. M. (2014). A new high capacity steganography based on bit-inverting method in DWT domain. Journal of Advanced Computer Science & Technology, 3(2), 169-178. |
|
419 |
|
Mandal, P. C. (2014). A study of Steganography Techniques using Discrete Wavelet Transform. Journal of Global Research in Computer Science, 5(5), 7-14. |
|
420 |
|
Kalami, A. (2014). A modified robust and effective algorithm with mathematical calculation for minutiae detection. Physical Sciences Research International, 2(1), 1-5. |
|
421 |
|
Jana, B., Mondal, S. K., Jana, S., & Giri, D. (2014, February). Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach. In Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on (pp. 319-324). IEEE. |
|
422 |
|
Garg, S., & Mathur, M. (2014, February). Chaotic map based steganography of gray scale images in wavelet domain. In Signal Processing and Integrated Networks (SPIN), 2014 International Conference on (pp. 689-694). IEEE. |
|
423 |
|
REZA, W. (2014). Implementasi Slantlet Transform (SLT) dan Huffman Coding pada Steganografi Citra Grayscale. Skripsi, Fakultas Ilmu Komputer. |
|
424 |
|
Thanikaiselvan, V., Arulmozhivarman, P., Chakrabarty, S., Agarwal, A., Subashanthini, S., & Amirtharajan, R. (2014). Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13(16), 2534. |
|
425 |
|
Nag, A., Singh, J. P., Biswas, S., Sarkar, D., & Sarkar, P. P. (2014, January). A Huffman Code Based Image Steganography. In Applied Algorithms: First International Conference, ICAA 2014, Kolkata, India, January 13-15, 2014. Proceedings (Vol. 8321, p. 257). Springer.. |
|
426 |
|
Goel, S., Kumar, P., & Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator. |
|
427 |
|
Nuri, S. A Modified Robust and Effective Algorithm with Mathematical Calculation for Minutiae Detection. |
|
428 |
|
Madiavale, B. A. (2014). Information security management practices and organizational goals: a study of microfinanace organizations in Nairobi (Doctoral dissertation, University of Nairobi). |
|
429 |
|
Peng, B., & Li, L. (2014). Combination of Genetic Algorithm and Ant Colony Optimization for QoS Multicast Routing. In Soft Computing in Artificial Intelligence (pp. 49-56). Springer International Publishing. |
|
430 |
|
Prayudi, Y., Ashari, A., & Priyambodo, T. K. (2014). Digital Evidence Cabinets: A Proposed Frameworks for Handling Digital Chain of Custody. Int. J. Comput. Appl, 109(9), 30-36. |
|
431 |
|
Saleem, S., Popov, O., & Bagilli, I. (2014). Extended abstract digital forensics model with preservation and protection as umbrella principles. Procedia Computer Science, 35, 812-821. |
|
432 |
|
Rahman, A. F. A., Ahmad, R., & Mohamad, M. Z. (2014). Developing Forensic Readiness Secure Network Architecture for Wireless Body Area Network (WBAN). International Journal of Security and Its Applications, 8(5), 403-420. |
|
433 |
|
Bera, A., Bhattacharjee, D., & Nasipuri, M. (2014). Hand Biometrics in Digital Forensics. In Computational Intelligence in Digital Forensics: Forensic Investigation and Applications (pp. 145-163). Springer International Publishing. |
|
434 |
|
Malik, N. M. N. A., Yahya, S., & Abdullah, M. T. (2014). Critical Phases in Network Forensics-A Review. In The International Conference on Digital Security and Forensics (DigitalSec2014) (pp. 68-75). The Society of Digital Information and Wireless Communication. |
|
435 |
|
Tonellotto, M. (2014). Evidenza informatica, computer forensics e best practices. Rivista di Criminologia, Vittimologia e Sicurezza, 8(2), 68-103. |
|
436 |
|
Akosu, N., & Selamat, A. (2014). Incorporating Language Identification in Digital Forensics Investigation Framework. In Computational Intelligence in Digital Forensics: Forensic Investigation and Applications (pp. 63-78). Springer International Publishing. |
|
437 |
|
Solinas, F. (2014). Technical and legal perspectives on forensics scenario. |
|
438 |
|
Dlamini, M., Venter, H., Eloff, J., & Eloff, M. (2014, March). Requirements for Preparing the Cloud to Become Ready for Digital Forensic Investigation. In 13th European Conference on Cyber Warfare and Security ECCWS-2014 The University of Piraeus Piraeus, Greece (p. 242). |
|
439 |
|
Bai, J., & Pu, T. C. (2014, May). Online Data Compression Technique for Real Time Data of Energy Management System in the Industrial Production. In Applied Mechanics and Materials (Vol. 519, pp. 70-73). |
|
440 |
|
Pu, T., & Bai, J. (2014, May). An auto regression compression method for industrial real time data. In Control and Decision Conference (2014 CCDC), The 26th Chinese (pp. 5129-5132). IEEE. |
|
441 |
|
Garba, A. M., & Zirra, P. B. Analysing Forward Difference Scheme on Huffman to Encode and Decode Data Losslessly. |
|
442 |
|
Bharathi, K., & Vijaylakshmi, C. Optimization for Flexible Job Shop Scheduling by Evolutionary Representation. |
|
443 |
|
Vignesh, B. (2014). Pipelined Quadratic Equation Based Novel Multiplication Method for Cryptographic Applications. Indian Journal of Science and Technology, 7(4), 34-39. |
|
444 |
|
Chickerur, S., Rayudu, D. M. K., Hiriyannaiah, S., & Shabalina, O. (2014). Performance Analysis of Alternative Open Source Parallel Computing Approach to OpenMP on Multicore Processors. In Knowledge-Based Software Engineering (pp. 466-476). Springer International Publishing. |
|
445 |
|
Lee, J. D., Im, H. J., Kang, W. M., & Park, J. H. (2014). Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices. Mathematical Problems in Engineering, 2014. |
|
446 |
|
Mobhani, A. B., & Mishra, S. K. (2014). Diffusion of Cipher Blocks at Bit Level in Parallel AES to Improve Bit–Ratio Test thus Increasing Cryptanalysis Complexity. |
|
447 |
|
Kumar, C., Dutta, S., & Chakborty, S. (2014, March). Musical cryptography using genetic algorithm. In Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference on (pp. 1742-1747). IEEE. |
|
448 |
|
Sharma, R. S., Hiranwal, S., & Goyal, D. Analysis & Design Of Hybrid Cryptography Using Moving Image. |
|
449 |
|
Sharma, R. S., Hiranwal, S., & Goyal, D. Analysis & Design Of Hybrid Cryptography Using Moving Image. |
|
450 |
|
Jiji, G. W., Lakshmi, V. S., Lakshmi, K. V., & Priya, S. S. (2014). Diagnosis and Prognosis of the Arbovirus-Dengue using Intelligent Algorithm. Journal of The Institution of Engineers (India): Series B, 1-6. |
|
451 |
|
Kang, Y. J., Ha, Y. R., & Lee, S. J. (2014). Microfluidic-based measurement of erythrocyte sedimentation rate for biophysical assessment of blood in an in vivo malaria-infected mouse. Biomicrofluidics, 8(4), 044114. |
|
452 |
|
Opoku-Ansah, J., Eghan, M. J., Anderson, B., & Boampong, J. N. (2014). Wavelength Markers for Malaria (Plasmodium Falciparum) Infected and Uninfected Red Blood Cells for Ring and Trophozoite Stages. Applied Physics Research, 6(2), p47. |
|
453 |
|
Kirongo, N. N. (2014). A Video Conferencing Security Framework For Synchronous Elearning (Doctoral dissertation). |
|
454 |
|
El Mekawy, M., AlSabbagh, B., & Kowalski, S. (2014). The Impact of Business-IT Alignment on Information Security Process. In HCI in Business (pp. 25-36). Springer International Publishing. |
|
455 |
|
Banerjee, C., & Banerjee, A. it security practices in an organization: balancing technology and management perspective. editorial board chief bebefactor, 495, 506. |
|
456 |
|
Radouane, M., Messoussi, R., Touahni, R., & Boujiha, T. (2014, April). Robust method of digital image watermarking using SVD transform on DWT coefficients with optimal block. In Multimedia Computing and Systems (ICMCS), 2014 International Conference on (pp. 255-260). IEEE. |
|
457 |
|
Wahaballa, A., Wahballa, O., Li, F., Ramadan, M., & Qin, Z. (2014). Multiple-Layered Securities Using Steganography and Cryptography. International Journal of Computers and Applications, 36(3), 93-100. |
|
458 |
|
Thiruvengatanadhan, R., & Dhanalakshmi, P. (2014). A Fuzzy C-Means based GMM for Classifying Speech and Music Signals. International Journal of Computer Applications, 102(5). |
|
459 |
|
Ramalingam, T., & Dhanalakshmi, P. (2014). Speech/music classification using wavelet based feature extraction techniques. Journal of Computer Science, 10(1), 34-44. |
|
460 |
|
Pol, K. (2014). Image steganography based on DWT using Huffman LWZ Encoding. Int J Eng Tech Res, 2(3), 100-103. |
|
461 |
|
Rajput, P., Arya, S., Kumari, S., & Lehana, P. (2014). Qualitative and quantitative analysis of non-uniform dark images. Advances in Image and Video Processing, 2(1), 23-34. |
|
462 |
|
Thanikaiselvan, V., Arulmozhivarman, P., Chakrabarty, S., Agarwal, A., Subashanthini, S., & Amirtharajan, R. (2014). Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13(16), 2534. |
|
463 |
|
Kaur, H., & Goyal, E. D. (2014). Performance Enhancement of a Transform Domain Based Steganographic Technique Using Segmentation. |
|
464 |
|
Basatini, F. M., & Chinipardaz, R. (2014). Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting. Journal of Data Science, 12, 563-574. |
|
465 |
|
Shibata, S. I., Sato, F., Kimura, H., & Oyabu, T. (2014). Evaluating Abnormal Condition in Physiological Disorder Using a Fluctuation Characteristic of Plant Bioelectric Potential. Sensors and Materials, 26(7), 483-493. |
|
466 |
|
George, R., & Manimekalai, M. A. P. (2014, February). A novel approach for image compression using zero tree coding. In Electronics and Communication Systems (ICECS), 2014 International Conference on (pp. 1-5). IEEE. |
|
467 |
|
Ortega-Corral, C., Palafox, L. E., García-Macías, J. A., Sánchez-García, J., & Aguilar, L. (2014). End-to-end message exchange in a deployable marine environment hierarchical wireless sensor network. International Journal of Distributed Sensor Networks, 2014. |
|
468 |
|
Mafra, P. M., Fraga, J. S., & Santin, A. O. (2014). Algorithms for a distributed IDS in MANETs. Journal of Computer and System Sciences, 80(3), 554-570. |
|
469 |
|
Azzawi, A. L. H. M. (2014). Enhancing The Encryption Process Of Advanced Encryption Standard (AES) By Using Proposed Algorithm To Generate S-Box. Journal of Engineering and Development, 18(2). |
|
470 |
|
Kaul, V., Choudhari, P., & Narayankhedkar, S. K. (2014, September). Security enhancement for data transmission in 4G networks. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 373-378). IEEE. |
|
471 |
|
Das, S., Zaman, J. S. U., & Ghosh, R. (2014). Study of Randomness in AES Ciphertexts Produced by Randomly Generated S-Boxes and S-Boxes with Various Modulus and Additive Constant Polynomials. Journal of The Institution of Engineers (India): Series B, 1-16. |
|
472 |
|
Dara, M., & Manochehri, K. (2014). Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES. Information Security Journal: A Global Perspective, 23(1-2), 1-9. |
|
473 |
|
Choudhari, P., Kaul, V., & Narayankhedkar, S. K. Security Enhancement Algorithms for Data Transmission in 4G Networks. |
|
474 |
|
Kaur, N., & Behal, S. Audio Steganography Using LSB Edge Detection Algorithm. |
|
475 |
|
Akhtar, M., Khusru, A., Usmani, A., & Sahoo, G. (2014). Nontransitive Ranking to Enhance Routing Decision in MANETS. arXiv preprint arXiv:1407.5385. |
|
476 |
|
Patil, S., & Borade, D. (2014). Dynamic Cluster Based Intrusion Detection Architecture to Detect Routing Protocol Attacks in MANET. Sensor Netw Data Commun, 3(116), 2. |
|
477 |
|
Rueda, J. S. R., & Bautista, D. R. (2014). análisis forense digital en dispositivos móviles. Revista de Semilleros de Investigación, 1(1). |
|
478 |
|
Kasiaras, D., Zafeiropoulos, T., Clarke, N., & Kambourakis, G. (2014, December). Android forensics: Correlation analysis. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for (pp. 157-162). IEEE. |
|
479 |
|
Cusack, B., & Lutui, R. (2014). Up-dating investigation models for smart phone procedures. |
|
480 |
|
Mumba, E. R., & Venter, H. S. (2014, August). Mobile forensics using the harmonised digital forensic investigation process. In Information Security for South Africa (ISSA), 2014 (pp. 1-10). IEEE. |
|
481 |
|
NK, P. J. K. (2014). an overview of mobile phone forensics. global journal of multidisciplinary studies, 4(1). |
|
482 |
|
Shrivastava, G., & Gupta, B. B. (2014, October). An Encapsulated Approach of Forensic Model for digital investigation. In Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on (pp. 280-284). IEEE. |
|
483 |
|
Morrell, C., Ransbottom, J. S., Marchany, R., & Tront, J. G. (2014, December). Scaling IPv6 address bindings in support of a moving target defense. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for (pp. 440-445). IEEE. |
|
484 |
|
Victor, A. (2014). Splice Zerocopy System optimization using dual pipe schemes (Doctoral dissertation, TELKOM UNIVERSITY). |
|
485 |
|
Wei, J., Zhihong, T., Chao, C., & Bei, G. (2014). Bottleneck analysis for data acquisition in high-speed network traffic monitoring. Communications, China, 11(1), 110-118. |
|
486 |
|
Eisfeld, A. (2014). Entwurf und Analyse von Konzepten zur effizienten Datenübertragung von Grafikrendering-Befehlen auf eingebetteten Systemen. |
|
487 |
|
Ali Tandra, S., & Rizvi, S. M. (2014). Security for Cloud Based Services. |
|
488 |
|
Latif, R., Abbas, H., & Assar, S. (2014). Distributed denial of service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review. Journal of medical systems, 38(11), 1-10. |
|
489 |
|
Kumar Shridhar, N. G. (2014). A Prevention of DDos Attacks in Cloud Using Honeypot. International Journal of Science and Research, 3(11), 2378-2383. |
|
490 |
|
Aishwarya, R., & Malliga, S. (2014, April). Intrusion detection system-An efficient way to thwart against Dos/DDos attack in the cloud environment. In Recent Trends in Information Technology (ICRTIT), 2014 International Conference on (pp. 1-6). IEEE. |
|
491 |
|
Dupin-Bryant, P. A., & Olsen, D. H. (2014). Business Intelligence, Analytics And Data Visualization: A Heat Map Project Tutorial. International Journal of Management & Information Systems (IJMIS), 18(3), 185-200. |
|
492 |
|
Tarek, M., Ouda, O., & Hamza, T. (2014). Tokenless Cancelable Biometric Templates Based on Hetroassociation Neural Network. International Journal of Biometrics and Bioinformatics (IJBB), 8(2), 8. |
|
493 |
|
Shiri, S., Anvari, A., & Soltani, H. An Assessment of Readiness Factors for Implementing ERP Based on Agility (Extension of Mckinsey 7s Model). |
|
494 |
|
Ghafoor, I., Jattalai, I., Durranit, S., & Ch, M. T. Analysis of OpenSSL Heartbleed Vulnerability for Embedded Systems. |
|
495 |
|
Sharvani, C. S. (2014). Development of Swarm Intelligent Systems for MANET: ACO based routing in MANETs for effective communication. |
|
496 |
|
Sheta, A. F., Kassaymeh, S., & Rine, D. Estimating the Number of Test Workers Necessary for a Software Testing Process Using Artificial Neural Networks. |
|
497 |
|
Rao, P. S., Rao, K. V., Varma, P. S., & Kim, T. H. (2014). Programming Evaluation Process Using Hybrid Cost Estimation Model. International Journal of Software Engineering and Its Applications, 8(10), 55-64. |
|
498 |
|
KUMAR, M. S., & RAJAN, B. C. (2014).Experimental evaluation of fuzzy-based function point analysis for software effort estimation. Journal of Theoretical & Applied Information Technology, 67(2). |
|
499 |
|
Kumar, G., & Bhatia, P. K. (2014).Automation of software cost estimation using neural network technique. International Journal of Computer Applications, 98(20). |
|
500 |
|
Kalinic, z., arsovski, s., arsovski, z., & rankovic, v. The effectiveness and students’ perception of an adaptive mobile learning system based on personalized content and mobile web. Stanislaw juszczyk, 43. |
|
501 |
|
Karadimce, a., & davcev, d. (2014, october). Collaborative cloud service model for delivering multimedia content in mcloud. In collaborative computing: networking, applications and worksharing (collaboratecom), 2014 international conference on (pp. 469-474). Ieee. |
|
502 |
|
Hashim, Y. E., Osman, A., & El-Gelany, A. (2014). Mobile Technology and Education: Theoretical Study. |
|
503 |
|
Chouarfia, M. Y. A. (2014). SCAE: Software Component Assembly Evaluation. |
|
504 |
|
Thapar, S. S., Singh, P., & Rani, S. (2014). Reusability-based quality framework for software components. ACM SIGSOFT Software Engineering Notes, 39(2), 1-5. |
|
505 |
|
Sampath, S., Nanjesh, B. R., Sagar, B. B., & Subbaraya, C. K. (2014, February). Performance optimization of PVM based parallel applications using optimal number of slaves. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on (pp. 388-392). IEEE. |
|
506 |
|
Abebe, H. (2014). Predicting Infant Immunization Status in Ethiopian (Doctoral dissertation, AAU). |
|
507 |
|
Ibrahim, M. H. (2014). Realizing Sender’s Deniability in Public Key Encryption via Random Coins Isolation. European Journal of Scientific Research, 119(2), 177-187. |
|
508 |
|
Biedermann, S., Ruppenthal, T., & Katzenbeisser, S. (2014, July). Data-centric phishing detection based on transparent virtualization technologies. In Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on (pp. 215-223). IEEE. |
|
509 |
|
Emilin, S. C. (2014). Detecting And Preventing Phishing Websites Dppws. |
|
510 |
|
Chawla, M., & Chouhan, S. S. (2014). A Survey of Phishing Attack Techniques. International Journal of Computer Applications, 93(3). |
|
511 |
|
Zeydan, h. z., & selamat, m. s. (2014).current state of anti-phishing approaches and revealing competencies. journal of theoretical and applied information technology, 70(3). |
|
512 |
|
Philip, C., Paulus, R., & Ashok, A. (2014). Comparative Analysis of Adhoc Routing Protocols in Wi-Fi & Wi Max Networks using QualNet 6.1. International Journal of Current Engineering and Technology, 4(1). |
|
513 |
|
Sadek, M. M., Khalifa, A. S., & Mostafa, M. G. (2014). Video steganography: a comprehensive review. Multimedia Tools and Applications, 1-32. |
|
514 |
|
Kelash, H. M., Wahab, O. F. A., Elshakankiry, O. A., & El-sayed, H. S. (2014). Utilization of Steganographic Techniques in Video Sequences. International Journal of Computing and Network Technology, Sys, 2, 17-24. |
|
515 |
|
Othman, J. A. (2014). Steganographic scheme to avoid statistical Steganalysis. J. Of College Of Education For Women, 25(1). |
|
516 |
|
Al-Dmour, H., Al-Ani, A., & Nguyen, H. (2014, August). An efficient steganography method for hiding patient confidential information. In Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE (pp. 222-225). IEEE. |
|
517 |
|
Agrawal, A., & Borikar, D. A. (2014). An approach to video steganography using novel substitution technique. |
|
518 |
|
Kaur, S., Kaur, A., & Singh, K. (2014). A Survey of Image Steganography. IJRECE, 2(3), 102-105. |
|
519 |
|
Priyanka, B. G., & Sathyanarayana, S. V. (2014, November). A steganographic system for embedding image and encrypted text. In Contemporary Computing and Informatics (IC3I), 2014 International Conference on (pp. 1351-1355). IEEE. |
|
520 |
|
Praneeta, G., & Pradeep, B. (2014, January). Security Analysis of Digital Stegno Images Using Genetic Algorithm. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 277-283). Springer International Publishing. |
|
521 |
|
Juneja, M. (2014). High Capacity and Statistical Attacks Resistant Reversible Image Data Hiding Scheme using LSB Substitution. International Journal of Computer Applications, 92(12). |
|
522 |
|
Juneja, M. (2014). High Capacity Information Hiding System for Encrypted Text Message Using Pixel Intensity Based LSB Substitution Technique. International Journal of Computer Science Issues (IJCSI), 11(2), 159. |
|
523 |
|
aldeen najim Alzubaidy, D. (2014). Paper of Nagham. pdf. |
|
524 |
|
Bhalchandra, B. D., Bhatnagar, V., Tomer, R., Singh, R., Saran, S. S., Asadullah, M., ... & Khan, S. Safety and Concealing Information Utilizing Combinatorial Data Hiding Proficiencies. |
|
525 |
|
Zahedinia, M. S., & Ahmadi, H. (2014). Color Image Steganography Method based on Difference between Pixel Values in Tri-direction. Majlesi Journal of Multimedia Processing, 3(3). |
|
526 |
|
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication. |
|
527 |
|
Nashier, N., & Singhrova, A. An Steganography Implementation Based Upon Improved LSB Technique. |
|
528 |
|
Agrawal, A., & Borikar, D. A. A Novel Approach to Video Steganography using Secured Multi-Channel Substitution. |
|
529 |
|
Shinde, P., Palmal, A., & Singh, R. Digital Image Steganography-Then, Now & Analysis of its Techniques. |
|
530 |
|
Ahmed, Z. H. (2014). Comparison of data hiding using LSB and DCT for image (Doctoral dissertation, Universiti Tun Hussein Onn Malaysia). |
|
531 |
|
Mehndiratta, A. Publication Procedure Topics. |
|
532 |
|
Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., & Okediran, O. O. Performance Assessment of an Enhanced Crystographic Model for Secure E-Voting. |
|
533 |
|
Khosla, S., & Kaur, P. Secure Data Hiding Technique Using Video Steganography and Watermarking-A Review. |
|
534 |
|
Mostaghim, M., & Boostani, R. (2014, September). CVC: Chaotic visual cryptography to enhance steganography. In Information Security and Cryptology (ISCISC), 2014 11th International ISC Conference on (pp. 44-48). IEEE. |
|
535 |
|
Sahu, M. (2014). Review of Image Steganography Techniques in Cloud Security. |
|
536 |
|
Ramalingam, M., & Isa, N. A. M. (2014, October). A steganography approach for sequential data encoding and decoding in video images. In Computer, Control, Informatics and Its Applications (IC3INA), 2014 International Conference on (pp. 120-125). IEEE. |
|
537 |
|
Senaratne, H., Gunatilaka, P., Gamage, S., Gunarathna, U., & Vithana, Y. Information Hiding with Steganography. |
|
538 |
|
Ali, A. A., Abdellateef, B. A., & Seddik, A. H. (2014). Enhancing the Security of SMMWB Image Steganography Technique by using the Linked List structure (Cover Package Method). International Journal of Computer Applications, 90(7). |
|
539 |
|
Molaei Kermani, and., Amir Masoud, honest, & Abrahymnzhad. (2014). Blind steganography based on Reed-Solomon codes and the substitution optimized embedded with improved payload and resistance. Journal of Electrical Engineering, University of Tabriz, 43 (2), 43-59. |
|
540 |
|
Dhondge, K., Choi, B. Y., Song, S., & Park, H. (2014, August). Optical Wireless authentication for smart devices using an onboard ambient light sensor. In Computer Communication and Networks (ICCCN), 2014 23rd International Conference on (pp. 1-8). IEEE. |
|
541 |
|
Xiong, J., Xiong, J., & Claramunt, C. (2014, November). A spatial entropy-based approach to improve mobile risk-based authentication. In Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis (p. 3). ACM. |
|
542 |
|
vongsingthong, s., & boonkrong, s. (2014). a survey on smartphone authentication. walailak journal of science and technology (wjst), 12(1), 1-19. |
|
543 |
|
Young stars, & Peng Xinguang. (2014) A lightweight one-time password authentication scheme. Small Computer Systems, 35 (008), 1808-1811. |
|
544 |
|
Koneru, A. (2014). Knowledge Extraction from Work Instructions through Text Processing and Analysis. |
|
545 |
|
Montero, C. (2014). Cost aware real time big data processing in Cloud Environments (Doctoral dissertation, The University of Melbourne). |
|
546 |
|
Parsania, V. S., Jani, N. N., & Bhalodiya, N. H. Applying Naïve bayes, BayesNet, PART, JRip and OneR Algorithms on Hypothyroid Database for Comparative Analysis. |
|
547 |
|
Babatunde, I. G. Review and Evaluation of Fingerprint Singular Point Detection Algorithms. |
|
548 |
|
Iwasokun, G. B., & Akinyokun, O. C. False Minutiae’Impact on Fingerprint Matching. |
|
549 |
|
Babatunde, I. G., Lange, M. J., Charles, A. O., & Olumuyiwa, D. J. (2014, August). Experimental study of thumbprint-based authentication framework for ATM machines. In Science and Information Conference (SAI), 2014 (pp. 505-514). IEEE. |
|
550 |
|
Bifari, E. N., & Elrefaei, L. (2014, September). Automated Fingerprint Identification System based on weighted feature points matching algorithm. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 2212-2217). IEEE. |
|
551 |
|
Akinyokun Oluwole, C., Alese Boniface, K., & Iwasokun Gabriel, B. (2014). Fingerprint Matching Using Spatial Characteristics. In Proceedings of the World Congress on Engineering (Vol. 1). |
|
552 |
|
Iwasokun, G. B., Akinyokun, O. C., & Dehinbo, O. J. (2014). Fingerprint Matching Using Features Mapping. In Proceedings of the World Congress on Engineering and Computer Science (Vol. 1). |
|
553 |
|
Iwasokun, G. B., & Ojo, S. O. (2014). Review and Evaluation of Fingerprint Singular Point Detection Algorithms. British Journal of Applied Science & Technology, 4(35), 4918. |
|
554 |
|
Babatunde, I. G., Charles, A. O., & Olusegun, O. S. (2014). An Investigation into the Impact of False Minutiae Points on Fingerprint Matching. International Journal of Database Theory and Application, 7(3), 159-178. |
|
555 |
|
Iwasokun, G. B., Akinyokun, O. C., & Angaye, C. O. (2014). Spatial Relation Approach to Fingerprint Matching. In Intelligent Systems for Science and Information (pp. 87-110). Springer International Publishing. |
|
556 |
|
Yadav, V., & Aggarwaal, P. (2014). A Survey on Security in Cloud Computing. |
|
557 |
|
Owusu, E., Zhan, Y., & Mao, Q. R. (2014). A neural-AdaBoost based facial expression recognition system. Expert Systems with Applications, 41(7), 3383-3390. |
|
558 |
|
Sun, W., Halevy, A., Benedetto, J. J., Czaja, W., Li, W., Liu, C., ... & Wang, R. (2014). Nonlinear dimensionality reduction via the ENH-LTSA method for hyperspectral image classification. Selected Topics in Applied Earth Observations and Remote Sensing, IEEE Journal of, 7(2), 375-388. |
|
559 |
|
Sun, W., Halevy, A., Benedetto, J. J., Czaja, W., Liu, C., Wu, H., ... & Li, W. (2014). UL-Isomap based nonlinear dimensionality reduction for hyperspectral imagery classification. ISPRS Journal of Photogrammetry and Remote Sensing, 89, 25-36. |
|
560 |
|
Owusu, E., Zhan, Y. Z., & Mao, Q. R. (2014). An SVM–AdaBoost-based face detection system. Journal of Experimental & Theoretical Artificial Intelligence, 26(4), 477-491. |
|
561 |
|
Kishore, B., Rana, V. L., Manikantan, K., & Ramachandran, S. (2014, December). Face recognition using Gabor-Feature-based DFT shifting. In Industrial and Information Systems (ICIIS), 2014 9th International Conference on (pp. 1-8). IEEE. |
|
562 |
|
Biswas, A., Ghose, M. K., & Pandit, M. (2014). Comparison of Different Neural Network Architectures for Classification of Feature Transformed Data for Face Recognition. International Journal of Computer Applications, 96(12). |
|
563 |
|
Makinde, A. S., Nkansah-Gyekye, Y., & Laizer, L. S. (2014). Enhancing the Accuracy of Biometric Feature Extraction Fusion Using Gabor Filter and Mahalanobis Distance Algorithm. arXiv preprint arXiv:1407.6748. |
|
564 |
|
Biswal, M. S. (2014). Feature Extraction of Face Using Various Techniques (Doctoral dissertation, National Institute of Technology Rourkela). |
|
565 |
|
Gupta, B. Performance Comparison of Various Face Detection Techniques. |
|
566 |
|
Awati, J. S. (2014). Application of wireless sensor networks for agricultural parameter control. |
|
567 |
|
Sahu, R. A., & Saraswat, V. (2014). Secure and Efficient Scheme for Delegation of Signing Rights. In Information and Communications Security (pp. 258-273). Springer International Publishing. |
|
568 |
|
Demarinis, F., Accettura, A., Garzia, F., & Cusani, R. (2014, October). Automatic security system for recognizing unexpected motions through video surveillance. In Security Technology (ICCST), 2014 International Carnahan Conference on (pp. 1-5). IEEE. |
|
569 |
|
Nayak, C., & Pradhan, S. Adaptive Filtering for Linear System Identification by Different Variants of LMS. |
|
570 |
|
Eke, H. N., & Odoh, N. J. (2014). The Use of Social Networking Sites among the Undergraduate Students of University of Nigeria, Nsukka. Library Philosophy and Practice, 0_1. |
|
571 |
|
Zhang, Y., & Rau, P. L. P. (2014). User Adoption and Loyalty of Location Based Social Network Service in China. In Cross-Cultural Design (pp. 392-402). Springer International Publishing. |
|
572 |
|
Eke Miss, H. N., Obiora, C., & Odoh Miss, J. N. (2014). The Use of Social Networking Sites among the Undergraduate Students of University of Nigeria, Nsukka. |
|
573 |
|
TIJJANI, H. (2014). adoption of improved pearl millet production practices by farmers in borno state, nigeria (Doctoral dissertation, USMANU DANFODIYO UNIVERSITY, SOKOTO). |
|
574 |
|
yatigammana, m., johar, d. m. g. m., & gunawardhana, c. Impact of Innovations Attributes on e-learning Acceptance among Sri Lankan Postgraduate Students. |
|
575 |
|
Yatigammana, K., Johar, M. G. M., & Gunawardhana, C. (2014). comparison of e-learning acceptance among postgraduate students in sri lanka and malaysia. Journal of South Asian Studies, 2(2), 165-176. |
|
576 |
|
Madahi, A., & Sukati, I. (2014). Examining online and brick and mortar store channels switching behaviour among Malaysian consumers. International Journal of Electronic Marketing and Retailing, 6(2), 128-163. |
|
577 |
|
Abdelrehim, S. H. M. O. (2014). The diffusion of edublogs among educators in Egypt. |
|
578 |
|
Aligol, M., & Mohammadbeigi, A. (2014). Doctors tend to investigate the private sector to contribute to the family physician. Journal of Qom, 8 (1). |
|
579 |
|
Mahajan, N., Bedi, R., & Gupta, S. K. A Survey on Detection of Byzantine and Resource Consumption Attacks. |
|
580 |
|
Khan, A., Shrivastava, S., & Richariya, V. (2014, January). Normalized Worm-hole Local Intrusion Detection Algorithm (NWLIDA). In Computer Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-6). IEEE. |
|
581 |
|
Bayeva, Z. Detection and Containment the Attack that Leads to a Denial of Service Attack. |
|
582 |
|
Masdari, M., & Bakhtiari, F. C. (2014). Alert Management System using K-means Based Genetic for IDS. International Journal of Security and Its Applications, 8(5), 109-118. |
|
583 |
|
Kumar, R., Verma, P., & Singh, Y. (2014). Review of MANET Protocols and Introduction of a New Optimized Routing Scheme using Evolutionary Algorithms and Analytical Hierarchy Process. Wireless Communication, 6(4), 161-171. |
|
584 |
|
Sodagudi, S., & Rao, D. K. R. (2014). Behavior based Anomaly detection technique to identify Multilayer attacks. International Journal, 2(5). |
|
585 |
|
Padma, T., & Pillai, J. S. (2014). Image Watermarking using PQ Sequences. |
|
586 |
|
Gholami, S., & Bashirzadeh, R. (2014). A new effective algorithm for on-line robot motion planning. Decision Science Letters, 3(1), 121-130. |
|
587 |
|
Padma, T., & Pillai, J. S. (2014). Image Watermarking using PQ Sequences. |
|
588 |
|
Belaidi, H., Bentarzi, H., Belaidi, A., & Hentout, A. (2014). Terrain Traversability and Optimal Path Planning in 3D Uneven Environment for an Autonomous Mobile Robot. Arabian Journal for Science and Engineering, 39(11), 8371-8381. |
|
589 |
|
Jothi, M. S., & Chandrasekaran, M. Fuzzy Based Optimal Clustering Protocol for Maximizing Lifetime in WSN. |
|
590 |
|
Zhaoliu Rong, Shu Mei E, & Zhong Weijun. (2014). Virtual private networks, and intrusion detection systems analyze the optimal allocation of Game Strategies Management Engineering, (4), 187-192. |
|
591 |
|
Behdad, M. (2014). Application of Learning Classifier Systems to Fraud Detection Problem (Doctoral dissertation, University of Western Australia). |
|
592 |
|
Emilin, S. C. (2014). Detecting And Preventing Phishing Websites Dppws. |
|
593 |
|
Varughese, N. M. (2014). collaborative network security management system based on association mining rule. ictact journal on soft computing, 4(4). |
|
594 |
|
Singh, G., Kumar, N., & Verma, A. K. (2014). Antalg: An innovative aco based routing algorithm for manets. Journal of Network and Computer Applications, 45, 151-167. |
|
595 |
|
Musau, F., Wang, G., & Abdullahi, M. B. (2014). Group formation with neighbor similarity trust in P2P E-commerce. Peer-to-Peer Networking and Applications, 7(4), 295-310. |
|
596 |
|
Fouchal, H., Hunel, P., & Ramassamy, C. (2014). Towards efficient deployment of wireless sensor networks. Security and Communication Networks. |
|
597 |
|
Mohsin, R., & Woods, J. (2014, September). Performance evaluation of MANET routing protocols in a maritime environment. In Computer Science and Electronic Engineering Conference (CEEC), 2014 6th (pp. 1-5). IEEE. |
|
598 |
|
Shegokar, M. S., & Tuteja, M. R. Performance Evaluation of AODV and DSR Routing Protocols for Random Speed Mobility and Intensity Model in MANET Using NS2. |
|
599 |
|
Natarajan, E., & Devi, L. (2014). Cross Layer Based Energy Aware Routing and Congestion Control Algorithm in MANET. |
|
600 |
|
Ratnaparkhi, V., Patidar, P., & Rawat, M. K. (2014). Implementation of Hybrid Algorithm for Mobility and Routing Issues in MANET. International Journal of Computer Applications, 98(4). |
|
601 |
|
Harpal, S. K., & Singh, G. Comparative Performance of MANET Routing Protocols at varying Speed in Different Traffic Patterns. |
|
602 |
|
Kaur, A. K. A., & Kaur, A. Improving Node Stability Using Hotspot Algorithm in Mobile Ad-hoc Network. |
|
603 |
|
Dhaliwal, B. S., & Malhotra, R. Comparative Appraise and Future Perspectives of Reactive and Proactive Routing Protocols in Manets. |
|
604 |
|
Borade, J. L., Mishra, B. K., & Bansode, R. Performance Analysis of LLECLAIR versus AODV in wireless networks. |
|
605 |
|
Malathy, E. M., & Muthuswamy, V. (2014, December). Vertical handover performance investigation with discrete event system simulation in next generation wireless network. In Advanced Computing (ICoAC), 2014 Sixth International Conference on (pp. 220-223). IEEE. |
|
606 |
|
Arasomwan, A. M., & Adewumi, A. O. (2014). An investigation into the performance of particle swarm optimization with various chaotic maps. Mathematical Problems in Engineering, 2014. |
|
607 |
|
Arya, M., Deep, K., & Bansal, J. C. (2014). A nature inspired adaptive inertia weight in particle swarm optimisation. International Journal of Artificial Intelligence and Soft Computing 13, 4(2-3), 228-248. |
|
608 |
|
Alrabady, L. A. Y. (2014). An online-integrated condition monitoring and prognostics framework for rotating equipment. |
|
609 |
|
Adewumi, A. O., & Arasomwan, A. M. (2014). An improved particle swarm optimiser based on swarm success rate for global optimisation problems. Journal of Experimental & Theoretical Artificial Intelligence, (ahead-of-print), 1-43. |
|
610 |
|
Gu, J., & Shi, X. (2014, July). An adaptive PSO based on motivation mechanism and acceleration restraint operator. In Evolutionary Computation (CEC), 2014 IEEE Congress on (pp. 1328-1336). IEEE. |
|
611 |
|
Mandil, P., & Mishra, A. MINIMIZATION OF THD IN CASCADE MULTILEVEL INVERTER USING WEIGHT IMPROVED PARTICLE SWARM OPTIMIZATION ALGORITHM. |
|
612 |
|
Chen, R. M., & Huang, H. T. (2014, August). Particle Swarm Optimization Enhancement by Applying Global Ratio Based Communication Topology. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on (pp. 443-446). IEEE. |
|
613 |
|
Lopez , C. E. M. ( 2014 ) . Search parameters particle swarm optimization solver for constraint satisfaction problems. |
|
614 |
|
Babu, K. R., & Sunitha, K. V. N. (2014). An effective hybrid technique for image enhancement through Genetic Algorithm-morphological operations. International Journal of Signal and Imaging Systems Engineering, 7(2), 83-91. |
|
615 |
|
Raut, S. D., & Humbe, V. T. (2014). An Approach to Boundary Extraction of Palm Lines and Vein Pattern. International Journal of Image, Graphics and Signal Processing (IJIGSP), 6(12), 47. |
|
616 |
|
Babatunde, I. G., Charles, A. O., & Olusegun, O. S. (2014). An Investigation into the Impact of False Minutiae Points on Fingerprint Matching. International Journal of Database Theory and Application, 7(3), 159-178. |
|
617 |
|
Babatunde, I. G. Review and Evaluation of Fingerprint Singular Point Detection Algorithms. |
|
618 |
|
Karthikeyini, C., Rajamani, V., & Bommanna Raja, K. (2014). Exploring fingerprints using composite minutiae descriptors to determine hereditary relation across multiple generations. International Journal of Biomedical Engineering and Technology, 15(3), 224-242. |
|
619 |
|
Chin, R. K. Y., & Lim, J. F. (2014). Fingerprint Recognition Using a Hybrid of Minutiae-and Image-Based Matching Techniques. International Journal of Simulation--Systems, Science & Technology, 15(2). |
|
620 |
|
Iwasokun, G. B., & Akinyokun, O. C. False Minutiae’Impact on Fingerprint Matching. |
|
621 |
|
Iwasokun, G. B., & Ojo, S. O. (2014). Review and Evaluation of Fingerprint Singular Point Detection Algorithms. British Journal of Applied Science & Technology, 4(35), 4918. |
|
622 |
|
Saleh, A. M. A. M. (2014). Enhanced Secure Algorithm for Fingerprint Recognition. arXiv preprint arXiv:1402.4936. |
|
623 |
|
Kalia, A., & Sood, S. characterization of reusable software components for better reuse. |
|
624 |
|
Al-Khazraji, S. H. A. A. Effect of Creating Dll Libraries in Software Reusable Components. |
|
625 |
|
Al-tarawneh, f. h. a framework for cots software evaluation and selection for cots mismatches handling and non-functional requirements. |
|
626 |
|
Reddy, J. M., & Prasad, S. V. A. V. Quality Focus of Software Layered Technology using Analytic Hierarchy Process: A Case Study. |
|
627 |
|
Kalia, A., & Sood, S. Component Based Software Reusability and Framing Standards for Components to be Reused. |
|
628 |
|
Elkamchouchi, H. M., & Hassan, M. (2014). Array pattern synthesis approach using a genetic algorithm. Microwaves, Antennas & Propagation, IET, 8(14), 1236-1240. |
|
629 |
|
Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4). |
|
630 |
|
Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4). |
|
631 |
|
Rocabado, S. (2014). Caso de estudio de comunicaciones seguras sobre redes móviles ad hoc (Doctoral dissertation, Facultad de Informática). |
|
632 |
|
Pattnaik, O., & Pattanayak, B. K. (2014). Security in vehicular ad hoc network based on intrusion detection system. American Journal of Applied Sciences, 11(2), 337. |
|
633 |
|
Ponsam, J. G., & Srinivasan, R. (2014). Multilayer intrusion detection in MANET. International Journal of Computer Applications, 98(20). |
|
634 |
|
Vimal, S. (2014). An energy efficient intrusion detection system in MANET for secure routing and clustering (Doctoral dissertation). |
|
635 |
|
Saraireh, S., Al-Sbou, Y., & Alsmadi, O. (2014). Image Encryption Scheme Based on Filter Bank and Lifting. Int'l J. of Communications, Network and System Sciences, 2014. |
|
636 |
|
Gowraj, N., Avireddy, S., & Prabhu, S. SDI-ON: Secure Digital Images over the Network. |
|
637 |
|
Osho, O., Zubair, Y. O., Ojeniyi, J. A., & Osho, L. O. a simple encryption and decryption system. |
|
638 |
|
Singh, V., Dhiman, H., & Khatkar, M. (2014). a comprehensive study of time complexity of various encryption algorithms. international journal of advances in engineering & technology, 7(2), 495. |
|
639 |
|
Ashik, M. H. M., & Vydehi, M. S. Secure Symmetric Key Algorithm [SSKA] For Information Exchange Using Modulo. |
|
640 |
|
Mushtaque, M. A., & Singh, M. K. Feasibility Evaluation of Symmetric Key Encryption Techniques for Wireless Channel and Disk Storage. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2. |
|
641 |
|
Singh, S., Kumar, A., Shaw, D. K., & Ghosh, D. (2014, February). Script separation in machine printed bilingual (Devnagari and Gurumukhi) documents using morphological approach. In Communications (NCC), 2014 Twentieth National Conference on (pp. 1-5). IEEE. |
|
642 |
|
Aparna, R. R., & Radha, R. (2014). Script Identification In Trilingual Indian Documents. International Journal of Image Processing (IJIP), 8(4), 178. |
|
643 |
|
ISA, N. A. N. B. M. (2014). language use on twitter among malaysian l2 speakers (doctoral dissertation, university of malaya kuala lumpur). |
|
644 |
|
Butt, A. J., Butt, N. A., Butt, R. G., & Ikram, M. T. (2014, January). Predicting Mobile Subscriber’s Behaviour from Contextual Information Extraction: SMS Data. In Neural Information Processing (pp. 661-672). Springer International Publishing. |
|
645 |
|
Sasitharan, D. (2014). An empirical investigation of smartphone technology acceptance among Universiti Utara Malaysia students (Doctoral dissertation, Universiti Utara Malaysia). |
|
646 |
|
Nicol, E., Dunlop, M., Komninos, A., McGee-Lennon, M., Baillie, L., Edwards, A., ... & Mulder, I. (2014, September). Re-imagining commonly used mobile interfaces for older adults. In Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services (pp. 585-588). ACM. |
|
647 |
|
Gilad Gressel, H. P., Surendran, K., Thara, S., & Aravind, A. Ensemble Learning Approach for Author Profiling. |
|
648 |
|
Arunkumar, R., & Annalakshmi, A. (2014). A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET. International Journal of Computer Applications, 85(8). |
|
649 |
|
VinothKumar, K., & Rajaram, A. (2014). An Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks. IJCSNS, 14(12), 66. |
|
650 |
|
Cangea, O. (2014). Cryptographic Protocol for Wireless Networks Security. Petroleum-Gas University of Ploiesti Bulletin, Technical Series, 66(2). |
|
651 |
|
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for Manets. Middle-East Journal of Scientific Research, 22(1), 91-98. |
|
652 |
|
Deka, S., & Khaturia, M. Performance Analysis of DYMO Routing Protocol under Wormhole Attack in MANET. |
|
653 |
|
Pandian, A., & Sadiq, M. A. K. (2014). Authorship categorization in email investigations using fisher's linear discriminant method with radial basis function. Journal of Computer Science, 10(6), 1003. |
|
654 |
|
Qi, J. P., Zhang, Q., Zhu, Y., & Qi, J. (2014). A Novel Method for Fast Change-Point Detection on Simulated Time Series and Electrocardiogram Data. PloS one, 9(4), e93365. |
|
655 |
|
Jamil, N., Ramli, M. I., Abu Bakar, Z., & Seman, N. (2014, January). Prosody-based sentence boundary detection of spontaneous speech. In Intelligent Systems, Modelling and Simulation (ISMS), 2014 5th International Conference on (pp. 311-317). IEEE. |
|
656 |
|
Qi, J. P., Zhang, Q., Qi, J., & Zhu, Y. (2014). A Fast Method for Abrupt Change Detection from Large-Scale Electrocardiogram (ECG) Time Series. In Service Science and Knowledge Innovation (pp. 420-429). Springer Berlin Heidelberg. |
|
657 |
|
Jin-peng, Q., Qing, Z., Fang, P., & Jie, Q. (2014, July). A fast method for change point detection from large-scale time series based on Haar Wavelet and Binary Search Tree (HWBST). In Control Conference (CCC), 2014 33rd Chinese (pp. 506-511). IEEE. |
|
658 |
|
Han, G., Qian, A., Zhang, C., Wang, Y., & Rodrigues, J. J. (2014). Localization algorithms in large-scale underwater acoustic sensor networks: a quantitative comparison. International Journal of Distributed Sensor Networks, 2014. |
|
659 |
|
Ramezani, H., Fazel, F., Stojanovic, M., & Leus, G. (2014). Collision Tolerant Packet Scheduling for Underwater Acoustic Localization. arXiv preprint arXiv:1404.3881. |
|
660 |
|
Kulhandjian, H., & Melodia, T. (2014, September). A low-cost distributed networked localization and time synchronization framework for underwater acoustic testbeds. In Underwater Communications and Networking (UComms), 2014 (pp. 1-5). IEEE. |
|
661 |
|
Rao, P. M., & Raju, G. S. N. (2014). International Journal of Advanced Research in Computer Science and Software Engineering. International Journal, 4(12). |
|
662 |
|
Swain, G. (2014). Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science and Technology, 7(9), 1444-1450. |
|
663 |
|
Kachare, H., & Deshmukh, M. Metamorphic Cryptography: A Fusion of Cryptography and Steganography. International Journal of Engineering and Technical Research (IJETR), 2. |
|
664 |
|
Venkatesh, K., Shah, S. S. M., Narasimhan, D., Krishnan, R. B., & Raajan, N. R. (2014). A Crypto-Stego Based Approach for Secured Key Transfer. International Journal of Applied Engineering Research, 9(19), 5679-5687. |
|
665 |
|
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication. |
|
666 |
|
Wai, Z., & Than, S. Data Hiding Technique Depended on Pseudorandom Sequences. |
|
667 |
|
Leng, H. S. (2014) information hidden research - using perfect square , mixing with minimal distortion and edge detection function modulus of Information Management Thesis Chaoyang University of Technology , 1-64. |
|
668 |
|
Aldasouqi, I., & Salameh, W. A. (2014). Using GIS in Designing and Deploying Wireless Network in City Plans. |
|
669 |
|
Bikov, D., Bouyuklieva, S., & Stojanova, A. (2014). Wireless network security and cracking security key. |
|
670 |
|
Farjamfar, A., Abdullah, M. T., Mahmod, R., & Udzir, N. I. (2014). A review on mobile device's digital forensic process models. Res. J. Applied Sci. Eng. Technol, 8, 358-366. |
|
671 |
|
Agbele, K. K. (2014). Context-awareness for adaptive information retrieval systems (Doctoral dissertation, University of the Western Cape). |
|
672 |
|
Molaei Kermani , a. , Amir Masoud , mahr , & Abrahymnzhad . (2014 ) . Blind steganography based on Reed-Solomon codes and tables substituted with improved payload optimized embedded and resistance. Journal of Electrical Engineering , University of Tabriz , 43 ( 2 ) , 43-59. |
|
673 |
|
Finsterbusch, M., Richter, C., Rocha, E., Muller, J. A., & Hanssgen, K. (2014). A survey of payload-based traffic classification approaches. Communications Surveys & Tutorials, IEEE, 16(2), 1135-1156. |
|
674 |
|
Ghaffari, M., & Ghadiri, N. (2014). Ambiguity-Driven Fuzzy C-Means Clustering: How to Detect Uncertain Clustered Records. arXiv preprint arXiv:1409.2821. |
|
675 |
|
Suryaputra, A., Samopa, F., & Hindayanto, B. C. (2014). klasterisasi dan analisis trafik internet menggunakan fuzzy c mean dengan ekstraksi fitur data. jurnal informatika, 12(1), 33-39. |
|
676 |
|
Paramita, A. S., Samopa, F., & Hindayanto, B. C. (2014). Klasterisasi dan Analisis Trafik Internet Menggunakan Fuzzy C Mean Dengan Ekstraksi Fitur Data. |
|
677 |
|
Babu, K. R., & Sunitha, K. V. N. (2014). An effective hybrid technique for image enhancement through Genetic Algorithm-morphological operations. International Journal of Signal and Imaging Systems Engineering, 7(2), 83-91. |
|
678 |
|
Barai, A. K. Performance Based Association Rule-Mining Technique Using Genetic Algorithm. algorithms, 1, 2. |
|
679 |
|
Asha, T., Natarajan, S., & Murthy, K. N. B. (2014). optimization of association rules for tuberculosis using genetic algorithm. international journal of computing, 12(2), 151-159. |
|
680 |
|
Abubacker, N. F., Azman, A., Doraisamy, S., Murad, M. A. A., Elmanna, M. E. M., & Saravanan, R. (2014). Correlation-Based Feature Selection for Association Rule Mining in Semantic Annotation of Mammographic Medical Images. In Information Retrieval Technology (pp. 482-493). Springer International Publishing. |
|
681 |
|
Zhao, D. (2014). International Journal of" Computing" Research Institute of Intelligent Computer Systems Ternopil National Economic University. Computing, 13(2). |
|
682 |
|
Soundararajan, S. (2014). Multipath congestion control schemes for mobile ad hoc networks. |
|
683 |
|
Joardar, S., Giri, D., & Bhattacherjee, V. (2014). Probabilistic Approach-Based Congestion-Aware Swarm-Inspired Load-Balancing Multipath Data Routing in MANETs. In Intelligent Computing, Networking, and Informatics (pp. 409-421). Springer India. |
|
684 |
|
Knappstein-Hamelink, S. (2014). Network Discovery in a Recursive Internet Network Architecture (Doctoral dissertation, TU Delft, Delft University of Technology). |
|
685 |
|
Singh, G. (2014). Design and Development of ACO Routing Protocol for MANETs (Doctoral dissertation, THAPAR UNIVERSITY, PATIALA). |
|
686 |
|
Archana, S., & Saravanan, N. P. (2014, April). Biologically inspired QoS aware routing protocol to optimize lifetime in Sensor Networks. In Recent Trends in Information Technology (ICRTIT), 2014 International Conference on (pp. 1-6). IEEE. |
|
687 |
|
Singh, G., Kumar, N., & Verma, A. K. (2014). ANTALG: An Innovative ACO based Routing Algorithm for MANETs. Journal of Network and Computer Applications, 45, 151-167. |
|
688 |
|
Shial, R. K., Reddy, K. H. K., & Gouda, B. S. (2014, January). Finding a Trusted and Shortest Path Mechanism of Routing Protocol for Mobile Ad Hoc Network. In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol I (pp. 311-320). Springer International Publishing. |
|
689 |
|
Tan, S., Sok, P., & Kim, K. (2014). Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET. International Journal of Networked and Distributed Computing, 2(2), 100-107. |
|
690 |
|
Gupta, A., & Gupta, A. K. (2014). A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks. Global Journal of Computer Science and Technology, 14(1-E), 23. |
|
691 |
|
Hatzivasilis, G., Papaefstathiou, I., & Manifavas, C. (2014, November). ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks. In Computer Systems and Applications (AICCSA), 2014 IEEE/ACS 11th International Conference on (pp. 56-63). IEEE. |
|
692 |
|
Pradeep, P. V., & Harika, C. (2014). Detecting Adversary Location in Mobile Sensor Networks. International Journal of Research, 1(11), 1011-1022. |
|
693 |
|
Sharma, R., & Singla, B. An Introduction to MANETS. |
|
694 |
|
Sharma, R., & Singla, B. Comparison of AOMDV With and Without Black Hole Attack. |
|
695 |
|
BAKILER, H. IMPROVEMENT OF PERFORMANCE AND CAPACITIES OF WIRELESS AD HOC NETWORKS. |
|
696 |
|
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for MANETs. Journal of Convergence Information Technology, 9(6), 210. |
|
697 |
|
Enshaei, M., Hanapi, Z. M., & Othman, M. (2014). A review: Mobile Ad Hoc Networks challenges, attacks, security, vulnerability and routing protocols. International Journal on Communications Antenna and Propagation (IRECAP), 4(5), 168-179. |
|
698 |
|
Hassan, A., Ahsan, S., Alshomrani, S., & Alshamrani, A. (2014). Packet Travel Time based Mechanism for Detection and Mitigation against Wormhole Attack in AODV for MANETs. Life Science Journal, 11(10s). |
|
699 |
|
Hassan, A., & Radenkovic, M. (2014, August). Simulation of security attacks and preventions on AODV protocol in ns-3. In Innovative Computing Technology (INTECH), 2014 Fourth International Conference on (pp. 158-163). IEEE. |
|
700 |
|
Barkouzos, T. (2014). Security in Ad Hoc networks. |
|
701 |
|
Enshaei, M., Hanapi, Z. M., & Othman, M. (2014). Vulnerability and Routing Protocols. |
|
702 |
|
Aggarwal, A., Gandhi, S., Chaubey, N., Tada, N., & Trivedi, S. (2014). NDTAODV: Neighbor Defense Technique for Ad Hoc On-Demand Distance Vector (AODV) to mitigate flood attack in MANETS. arXiv preprint arXiv:1405.6216. |
|
703 |
|
Aligol, M., & Mohammadbeigi, A. (2014). Studying the tendency of the private sector to participate in family medicine doctors . Journal of Qom University of Medical Sciences , 8 ( 1 ). |
|
704 |
|
Abuadlla, Y., Kvascev, G., Gajin, S., & Jovanovic, Z. (2014). Flow-based anomaly intrusion detection system using two neural network stages. Computer Science and Information Systems, 11(2), 601-622. |
|
705 |
|
Choi, Y. B., Sershon, C., Briggs, J., & Clukey, C. Survey of Layered Defense, Defense in Depth and Testing of Network Security. |
|
706 |
|
ONUwA, O. B. (2014). Improving Network Attack Alarm System: A Proposed Hybrid Intrusion Detection System Model. |
|
707 |
|
Hameed, S. M., & Rashid, O. F. Intrusion Detection Approach Based on DNA Signature. |
|
708 |
|
Mgabile, T. (2014). Network intrusion detection system using neural networks approach in networked biometrics system (Doctoral dissertation). |
|
709 |
|
Chan, G. Y., Lee, C. S., & Heng, S. H. (2014). Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules. Applied Soft Computing, 24, 142-157. |
|
710 |
|
Kachurka, P., & Golovko, V. (2014). fusion of recirculation neural networks for real-time network intrusion detection and recognition. international Journal of Computing, 11(4), 383-390. |
|
711 |
|
Sethuramalingam, S., & Naganathan, E. R. A Fuzzy Model for Network Intrusion Detection. |
|
712 |
|
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for MANETs. Journal of Convergence Information Technology, 9(6), 210. |
|
713 |
|
Sekulski, R., & Woda, M. (2014). Adaptive method of users authentication and authorisation. In Proceedings of the 2nd Asia-Pacific Conference on Computer-Aided System Engineering, APCASE (pp. 10-12). |
|
714 |
|
van Eekelen, W., van den Elst, J., & Khan, V. J. (2014). Dynamic layering graphical elements for graphical password schemes. Creating the Difference, 65. |
|
715 |
|
Shrivastava, A., & Rizvi, M. A. (2014). Network Security Analysis Based on Authentication Techniques. |
|
716 |
|
Vasile, M. A., Pop, F., Tutueanu, R. I., Cristea, V., & Kolodziej, J. (2014). Resource-aware hybrid scheduling algorithm in heterogeneous distributed computing. Future Generation Computer Systems. |
|
717 |
|
Singh, S., & Kalra, M. (2014, November). Scheduling of Independent Tasks in Cloud Computing Using Modified Genetic Algorithm. In Computational Intelligence and Communication Networks (CICN), 2014 International Conference on (pp. 565-569). IEEE. |
|
718 |
|
Sharma, A., Singh, N., Hans, A., & Kumar, K. (2014, November). Review of task scheduling algorithms using genetic approach. In Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of (pp. 169-172). IEEE. |
|
719 |
|
Kara, N., Soualhia, M., Belqasmi, F., Azar, C., & Glitho, R. (2014). Genetic-based algorithms for resource management in virtualized IVR applications. Journal of Cloud Computing, 3(1), 1-18. |
|
720 |
|
YUSUF, A. B. (2014). application of genetic algorithm in modeling university admission decision support system (doctoral dissertation). |
|
721 |
|
Patel, P. S. (2014). Multi-Objective Job Scheduler using Genetic Algorithm in Grid Computing. International Journal of Computer Applications, 92(14). |
|
722 |
|
Kang, Y., Zhang, Y., Lin, Y., & Lu, H. (2014). An Improved Ant Colony System for Task Scheduling Problem in Heterogeneous Distributed System. In Computer Engineering and Networking (pp. 83-90). Springer International Publishing. |
|
723 |
|
Pan Yang, Qiu Jianlin, Yang Na, Biancai Feng, & Lu Pengcheng. (2014). Multiprocessor task scheduling algorithm based on tabu search. Computer Engineering and Design, 35 (12), 4186-4190. |
|
724 |
|
Kadhim, A. I., Cheah, Y. N., & Ahamed, N. H. (2014, December). Text Document Preprocessing and Dimension Reduction Techniques for Text Document Clustering. In Artificial Intelligence with Applications in Engineering and Technology (ICAIET), 2014 4th International Conference on (pp. 69-73). IEEE. |
|
725 |
|
Goel, S., Kumar, P., & Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator. |
|
726 |
|
Angaitkar, A. V., Shekokar, N., & Maurya, M. The Countering the XDoS Attack for Securing the Web Services. |
|
727 |
|
Wu Xindong, Li Yadong, & Hu Donghui. (2014). Evidence of the social network. Journal of Software, 25 (12). |
|
728 |
|
Rahman, A. F. A., Mohamad, M. Z., Ahmad, R., & Malaysia, C. (2014). Preventive and Detective Mechanism for Forensic Readiness Secure Network Architecture for WBAN. |
|
729 |
|
Rahim, N., Wahab, W. A., Idris, Y. I., & Kiah, L. M. Digital Forensics: An Overview of the Current Trends. |
|
730 |
|
Liu, Y., Li, C., & Liu, W. (2014). Integrated solution for timely delivery of customer change requests: A case study of using devops approach. International Journal of U-and E-Service Science and Technology, 7(2), 41-50. |
|
731 |
|
Kamalzaman, S. N. A., Mohamad, S. M. S., & Sulaiman, S. (2014). Managing Modification Requests in Web Applications: A Systematic Literature Review. International Journal of Software Engineering and Technology, 1(1). |
|
732 |
|
Mellado, D., Mouratidis, H., & Fernández-Medina, E. (2014). Secure Tropos framework for software product lines requirements engineering. Computer Standards & Interfaces, 36(4), 711-722. |
|
733 |
|
Keerthi, T. (2014). Distilling Mobile Privacy Requirements from Qualitative Data (Doctoral dissertation, The Open University). |
|
734 |
|
Tamrakar, S., & Aloney, M. R. (2013). Role of Artificial Neural Networks in Digital Image Processing: A review. Journal of Environmental Science, 2(3), 908-913. |
|
735 |
|
Sardar, M., & Majumder, K. (2013). A Comparative Study on Different Trust Based Routing Schemes in MANET. International Journal of Wireless & Mobile Networks, 5(5), 145. |
|
736 |
|
Abel, K. (2013).benefits of shifting freight delivery to night time, considering routing and environmental effects for addis ababa city (Doctoral dissertation, aau). |
|
737 |
|
Fasola, J., & Mataric, M. (2013). A socially assistive robot exercise coach for the elderly. Journal of Human-Robot Interaction, 2(2), 3-32. |
|
738 |
|
Kalaivani, R., & Thangaraj, P. (2013). An effective technique to identify a river’s stage through satellite images by means of RBFNN. The Imaging Science Journal, 61(3), 279-291. |
|
739 |
|
Sun, D., Deng, H., Wang, F., Ji, K., Dai, W., Liang, B., & Wei, S. (2013, November). The Feature Related Techniques in Content-Based Image Retrieval and Their Application in Solar Image Data. In Intelligent Networks and Intelligent Systems (ICINIS), 2013 6th International Conference on (pp. 336-339). IEEE. |
|
740 |
|
Khandelwal, V., & Goyal, D. (2013). BlackHole Attack and Detection Method for AODV Routing Protocol in MANETs. IJARCET, 2(4), 1555-9. |
|
741 |
|
Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of Impact of Wormhole Attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652. |
|
742 |
|
Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of Impact of Wormhole Attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652. |
|
743 |
|
Karthikeyan, P., Baskar, S., & Alphones, A. (2013). Improved genetic algorithm using different genetic operator combinations (GOCs) for multicast routing in ad hoc networks. Soft Computing, 17(9), 1563-1572. |
|
744 |
|
Saehana, S., Iskandar, F., & Abdullah, M. (2013). Optimization of electrospinning parameter by employing genetic algorithm in order to produce desired nanofiber diameter. World Academy of Science, Engineering and Technology, International Journal of Chemical, Molecular, Nuclear, Materials and Metallurgical Engineering, 7(1), 78-83. |
|
745 |
|
Singh, M., Sharma, S., & Kaur, A. (2013). Performance Analysis of Decision Trees. International Journal of Computer Applications, 71(19), 10-14. |
|
746 |
|
Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques. |
|
747 |
|
Li Nan , & Zhang Xuefu . ( 2013 ) found that knowledge-based Application System related data . Library and Information Service , ( 6 ) , 127-133. |
|
748 |
|
Rong, C., Quan, Z., & Chakravorty, A. (2013, December). On Access Control Schemes for Hadoop Data Storage. In Cloud Computing and Big Data (CloudCom-Asia), 2013 International Conference on (pp. 641-645). IEEE. |
|
749 |
|
Pandian, A., & Sadiq, A. K. (2013). Authorship Attribution in Tamil Language Email For Forensic Analysis. International Review on Computers and Software (IRECOS), 8(12), 3002-3008. |
|
750 |
|
Murtaza, M., Shah, J. H., Azeem, A., Nisar, W., & Masood, M. (2013). Structured Language Requirement Elicitation Using Case Base Reasoning. Research Journal of Applied Sciences, Engineering and Technology, 6, 23. |
|
751 |
|
Aziz, A. S., Azar, A. T., Salama, M., Hassanien, A. E., & Hanafy, S. E. O. (2013, September). Genetic algorithm with different feature selection techniques for anomaly detectors generation. In Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on (pp. 769-774). IEEE. |
|
752 |
|
Alanazi, H. O., Abdullah, A., & Al Jumah, M. (2013). A critical review for an accurate and dynamic prediction for the outcomes of traumatic brain injury based on Glasgow Outcome Scale. Journal of Medical Sciences, 13(4), 244. |
|
753 |
|
Priedniece, K., Nikitenko, A., Liekna, A., & Kulikovskis, G. (2013). Use of Learning Methods to Improve Kinematic Models. Applied Computer Systems, 14(1), 73-79. |
|
754 |
|
Günüç, S. (2013). Internet Bagimliligini Yordayan Bazi Degiskenlerin Cart ve Chaid Analizleri ile Incelenmesi. Turk Psikoloji Dergisi, 28(71). |
|
755 |
|
Günüç, S. (2013). Internet Bagimliligini Yordayan Bazi Degiskenlerin Cart ve Chaid Analizleri ile Incelenmesi. Türk Psikoloji Dergisi, 28(71), 88. |
|
756 |
|
Madhura, G. K., & Shivamurthy, R. C. twitter sentiment analysis for product reviews to gather information using mach ine learning. |
|
757 |
|
Anand, R., Khanna, R., Student, N. C., & Israna, P. (2013). International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net. CYBERNETICS: SYSTEMS, 43(4). |
|
758 |
|
Zhang, Q. (2013). Aspect-Oriented Product Family Modeling. |
|
759 |
|
Mguni, K., & Ayalew, Y. (2013). An Assessment of Maintainability of an Aspect-Oriented System. ISRN Software Engineering, 2013. |
|
760 |
|
Ramos de Oliveira, R., Sanchez, V., Vinicius, R., Estrella, J. C., Pontin de Mattos Fortes, R., & Brusamolin, V. (2013, September). Comparative evaluation of the maintainability of RESTful and SOAP-WSDL web services. In Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA), 2013 IEEE 7th International Symposium on the (pp. 40-49 |
|
761 |
|
Tiwari, G., & Sharma, A. Maintainability Prediction-An Artificial Neural Network Based Approach. |
|
762 |
|
Ahmed, S., & Nirkhi, S. M. (2013). Fuzzy Forensic Analysis System for DDoS Attack in MANET Response Analysis. simulation, 639(156), 343. |
|
763 |
|
Sulaiman, S., Shamsuddin, S. M., & Abraham, A. (2013). A Survey of Web Caching Architectures or Deployment Schemes. International Journal of Innovative Computing, 3(1). |
|
764 |
|
Sirour, H. A. N., Hamad, Y. A. M., & Eisa, A. (2013, August). An agent-based proxy cache cleanup model using fuzzy logic. In Computing, Electrical and Electronics Engineering (ICCEEE), 2013 International Conference on (pp. 486-491). IEEE. |
|
765 |
|
ShanmugaSundaram, G., & Aswini, S. Optimizing the Performance in Web Browsers through Data Compression. |
|
766 |
|
Alguliev, R. M., Aliguliyev, R. M., & Isazade, N. R. (2013). Mr&Mr-Sum: Maximum Relevance And Minimum Redundancy Document Summarization Model. International Journal of Information Technology & Decision Making, 12(03), 361-393. |
|
767 |
|
Black, J. (2013). On the derivation of value from geospatial linked data (Doctoral dissertation, University of Southampton). |
|
768 |
|
Tan, M., & Morales-Arroyo, M. (2013). Understanding distributional disruptions in the Interactive Digital Media eco-system. International Journal of Electronic Business, 11(1), 42-62. |
|
769 |
|
Wong, R. K. (2013). Feasibility and a case study on content optimization services on cloud. Information Systems Frontiers, 15(4), 525-532. |
|
770 |
|
Al-Azawi, R., Ayesh, A., Kenny, I., & Al-Masruri, K. A. (2013). Towards an AOSE: Game development methodology. In Distributed Computing and Artificial Intelligence (pp. 493-501). Springer International Publishing. |
|
771 |
|
Pauline, M., Aruna, P., & Shadaksharappa, B. (2013). Layered model to Estimate Effort, Performance and cost of the Software projects. International Journal of Computer Applications, 63(13), 17-23. |
|
772 |
|
Rai, D., & Tyagi, K. (2013, July). Estimating the regression test case selection probability using fuzzy rules. In Recent Trends in Information Technology (ICRTIT), 2013 International Conference on (pp. 603-611). IEEE. |
|
773 |
|
Elgamel, M. S., Korani, E. A., & El Helow, K. R. Developing a Software Certification for Quality Assurance. |
|
774 |
|
Dhule, C. A., & Nagrare, T. H. (2013). Design Of Virtual Sense Technology For System Interface. IJRCCT, 2(12), 1454-1459. |
|
775 |
|
Eun, H., Lee, H., & Oh, H. (2013). Conditional privacy preserving security protocol for NFC applications. Consumer Electronics, IEEE Transactions on, 59(1), 153-160. |
|
776 |
|
Lin, Y., Hou, M., & Xu, Q. (2013, December). Strongly Password-Based Three-Party Authenticated Key Exchange Protocol. In Computational Intelligence and Security (CIS), 2013 9th International Conference on (pp. 555-558). IEEE. |
|
777 |
|
Banu, S. S., & Dhanasekaran, R. (2013). EMRCS: Efficient Multipath Routing based Cryptography Scheme in Wireless Sensor Networks. Wireless Communication, 5(1), 24-31. |
|
778 |
|
Singh, P., & Chadha, R. S. (2013). A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology (IJEIT), 2(9), 165-175. |
|
779 |
|
Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques. |
|
780 |
|
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42. |
|
781 |
|
Sahu, M., Pradhan, S. R., & Das, M. (2013). Unicode and Colours Mapping for Cryptography and Steganography using Discrete Wavelet Transform. International Journal of Computer Applications, 70(5), 36-41. |
|
782 |
|
Tayel, M., Hafez, A., & Shawky, H. (2013, December). A new hybrid fuzzy-decomposed full capacity Stego-system. In High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 2013 10th International Conference on (pp. 16-20). IEEE. |
|
783 |
|
ShivaKumar, K. B., Jayaramu, H. S., & Srinidhi, G. A. (2013, September). A novel data hiding technique. In Research & Technology in the Coming Decades (CRT 2013), National Conference on Challenges in (pp. 1-5). IET. |
|
784 |
|
Yajurvedi, A. H., & Kulkarni, S. (2013, January). An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 203-212). Springer India. |
|
785 |
|
Saejung, S., Boondee, A., Preechasuk, J., & Chantrapornchai, C. (2013, September). On the comparison of digital image steganography algorithm based on DCT and wavelet. In Computer Science and Engineering Conference (ICSEC), 2013 International (pp. 328-333). IEEE. |
|
786 |
|
Fayyaz, N., Imranuddin, R., Anwar, S. U., & Rukh, L. (2013). Steganography Based Authentication to Prevent IP Spoofing. Life Science Journal, 10(12s). |
|
787 |
|
Nagaty, K. A. (2013). Secret Sharing using Image Hashing. International Journal of Computer Applications, 73(20), 14-22. |
|
788 |
|
Sagheer, A. M., Abdulhameed, A. A., & AbdulJabbar, M. A. (2013, December). SMS Security for Smartphone. In Developments in eSystems Engineering (DeSE), 2013 Sixth International Conference on (pp. 281-285). IEEE. |
|
789 |
|
Begum, M. B., & Venkataramani, Y. (2013). A new compression scheme for secure transmission. International Journal of Automation and Computing, 10(6), 578-586. |
|
790 |
|
Patil, M., & Sahu, V. (2013). A Survey of Compression and Encryption Techniques for SMS. |
|
791 |
|
Ahmed, Z. H. (2013). An exact algorithm for the clustered travelling salesman problem. Opsearch, 50(2), 215-228. |
|
792 |
|
Ahmed, Z. H. (2013). A hybrid genetic algorithm for the bottleneck traveling salesman problem. ACM Transactions on Embedded Computing Systems (TECS), 12(1), 9. |
|
793 |
|
Ahmed, Z. H. (2013). A new reformulation and an exact algorithm for the quadratic assignment problem. Indian Journal of Science and Technology, 6(4), 4368-4377. |
|
794 |
|
Kale, K. V., Deshmukh, P. D., Chavan, S. V., Kazi, M. M., & Rode, Y. S. (2013, October). Zernike moment feature extraction for handwritten Devanagari compound character recognition. In Science and Information Conference (SAI), 2013 (pp. 459-466). IEEE. |
|
795 |
|
Dineshkumar, R., & Suganthi, J. (2013). A research survey on sanskrit offline handwritten character recognition. International Journal of Scientific and Research Publications (IJSRP), 3, 13-16. |
|
796 |
|
Kazi, M. M., & Rode, Y. S. (2013). Handwritten and Printed Devanagari Compound using Multiclass SVM Classifier with Orthogonal moment Feature. |
|
797 |
|
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013, March). Handwritten devnagari consonants recognition using mlpnn with five fold cross validation. In Circuits, Power and Computing Technologies (ICCPCT), 2013 International Conference on (pp. 1222-1226). IEEE. |
|
798 |
|
Garg, N. K., Kaur, L., & Jindal, M. (2013). Recognition of Offline Handwritten Hindi Text Using SVM. International Journal of Image Processing (IJIP), 7(4), 395. |
|
799 |
|
Thaker, H. R., & Kumbharana, C. K. (2013). Study of Different Off-line Handwritten Character Recognition Algorithms for Various Indian Scripts. International Journal of Computer Applications, 65(16). |
|
800 |
|
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013, August). Design and analysis of LRTB feature based classifier applied to handwritten Devnagari characters: A neural network approach. In Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on (pp. 96-101). IEEE. |
|
801 |
|
Goyal, M., & Garg, N. K. (2013). Techniques for Recognition of Handwritten Devanagari Numeral. International Journal of Advanced Research in Computer Science, 4(9). |
|
802 |
|
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013). Classification of Devnagari Handwritten Characters using Single Hidden Layer Neural Network with Mixed Activation Function. |
|
803 |
|
Choudhury, A. (2013). Recognition of Handwritten Bangla Numerals using Template Matching (Doctoral dissertation, jadavpur university kolkata). |
|
804 |
|
Arora, S. Studies on some Soft Computing Techniques: A Case Study for Constrained Handwritten Devnagari Characters and Numerals. |
|
805 |
|
Shinde, S., & Mane, M. V. LBG Vector Quantization for Recognition of Handwritten Marathi Barakhadi. |
|
806 |
|
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. Offline Recognition of Devanagari Handwritten Consonants Using Projection features and mlpnn. |
|
807 |
|
Ikram, A., Anjum, A., Hill, R., Antonopoulos, N., Liu, L., & Sotiriadis, S. (2013). Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience. |
|
808 |
|
Skracic, K., Pale, P., & Jeren, B. (2013, May). Knowledge based authentication requirements. In Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention on (pp. 1116-1120). IEEE. |
|
809 |
|
Kumar, S. B. on-chip address and test pattern generation for image watermarking sram. |
|
810 |
|
Uma, M., & Padmavathi, G. (2013). A Survey on Various Cyber Attacks and their Classification. IJ Network Security, 15(5), 390-396. |
|
811 |
|
Tanwar, S., & Prema, K. V. (2013). Threats & Security Issues in Ad hoc network: A Survey Report. International Journal of Soft Computing and Engineering, 2(6). |
|
812 |
|
Kumar, B. A., Kavuri, K., & Batchanaboyina, M. (2013). A Novel Approach for Preventing Hackers in Data Communication. International Journal of Advanced Studies in Computers, Science and Engineering, 2(2), 1. |
|
813 |
|
Grochocki, D. (2013). Deployment considerations for intrusion detection systems in advanced metering infrastructure. |
|
814 |
|
Khubalkar, A. S., & Ragha, L. R. (2013, July). Security enabled DSR for establishing symmetric key and security in MANETS. In Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on (pp. 1-5). IEEE. |
|
815 |
|
Mandala, S., Abdullah, A. H., Ismail, A. S., Haron, H., Ngadi, M. A., & Coulibaly, Y. (2013, November). A review of blackhole attack in mobile adhoc network. In Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), 2013 3rd International Conference on (pp. 339-344). IEEE. |
|
816 |
|
Gupta, N. K., & Garg, A. (2013). Trust and Shortest Path Selection based Routing Protocol for MANET. International Journal of Computer Applications, 76(12). |
|
817 |
|
Saxena, N., Kumar, S., & Saxena, V. (2013). Performance Analysis of AODV Routing Protocol under the Different Attacks Through The Use Of OPNET Simulator. International Journal of Innovative Research and Development, 2(12). |
|
818 |
|
Shrivastava, S., & Jain, S. (2013). A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network. International Journal of Computer Science & Engineering Technology (IJCSET), 4(3). |
|
819 |
|
Singhal, P., & Kumar, R. (2013). Analyzing Misbehavior of Selfish Nodes in Mobile Adhoc Network. International Journal of Computer Applications (0975–8887) Volume. |
|
820 |
|
Ahmed, M. N., Abdullah, A. H., & El-Sayed, A. (2013). A survey of MANET survivability routing techniques. |
|
821 |
|
Singh, J. P., & Gupta, A. K. (2013). Protocol Stack based Security Vulnerabilities in MANETs. International Journal of Computer Applications (0975–8887), 69(21). |
|
822 |
|
Singh, D. (2013). Intrusion Detection System based on Fuzzy C Means Clustering and Probabilistic Neural Network. |
|
823 |
|
Singh, A., Khanna, O. S., Singh, S. P., & Singh, J. (2013). Multipath Algorithm For Prevention Of Wormhole Attack In Manet. |
|
824 |
|
Shrivastava, A., & Ahirwal, R. R. (2013). A SVM and K-means Clustering based Fast and Efficient Intrusion Detection System. International Journal of Computer Applications, 72(6), 25-29. |
|
825 |
|
Callegari, C., Giordano, S., Mannella, S., & Pagano, M. (2013). Design and Implementation of a Testbed for the Security Assessment of MANETs. In Cyberspace Safety and Security (pp. 228-242). Springer International Publishing. |
|
826 |
|
Nirmala, G., Thudupathi, E., & Nadu, T. (2013). Risk-Aware Response Mechanism with Extended DS theory. Risk, 2(1), 6-15. |
|
827 |
|
Gupta, N. K., & Pandey, K. (2013, August). Trust based Ad-hoc on Demand Routing protocol for MANET. In Contemporary Computing (IC3), 2013 Sixth International Conference on (pp. 225-231). IEEE. |
|
828 |
|
ON, S. O. B. H. A. (2013). A STUDY OF DIFFERENT ATTACKS IN MANET AND DISCUSSION ABOUT SOLUTIONS OF BLACK HOLE ATTACK ON AODV PROTOCOL. |
|
829 |
|
Chen, P. Y., & Lin, F. Y. S. (2013). Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques. Journal of Applied Mathematics, 2013. |
|
830 |
|
Dhiman, D., & Nayyar, A. (2013). Complete Scenario of Routing Protocols, Security Leaks and Attacks in MANETs. International Journal, 3(10). |
|
831 |
|
Shukla, R., & Bhandari, R. (2013). A Novel Minimized Computational Time Based Encryption and Authentication Using ECDSA. International Journal of Modern Education and Computer Science (IJMECS), 5(9), 19. |
|
832 |
|
Yadav, N. A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks. |
|
833 |
|
Elamathi, N. a study of routing attacks in wireless mobile adhoc networks. |
|
834 |
|
Barcena-Humanes, J. L., Mata-Moya, D., Jarabo-Amores, M. P., del Rey-Maestre, N., & Martin de Nicolas-Presa, J. (2013, June). Analysis of NNs Detectors for Targets with Unknown Correlation in Gaussian Interference. In Computational Intelligence, Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on (pp. 48-53). IEEE. |
|
835 |
|
Zamani, A., Sorbi, M. R., & Safavi, A. A. (2013). Application of neural network and ANFIS model for earthquake occurrence in Iran. Earth Science Informatics, 6(2), 71-85. |
|
836 |
|
Kodali, R. K., Patel, K. H., & Sarma, N. N. (2013). Implementation of Energy Efficient Scalar Point Multiplication Techniques for ECC. International Journal on Recent Trends in Engineering & Technology, 9(1), 14. |
|
837 |
|
Kodali, R. K., Patel, K. H., & Sarma, N. (2013, February). Energy efficient elliptic curve point multiplication for WSN applications. In Communications (NCC), 2013 National Conference on (pp. 1-5). IEEE. |
|
838 |
|
Zele, A. P., & Wadhe, A. P. Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography. |
|
839 |
|
Kulkarni, V. (2013). Speaker identification using orthogonal transforms and vector quantization. |
|
840 |
|
Kekre, H. B., & Kulkarni, V. (2013, January). Closed set and open set Speaker Identification using amplitude distribution of different Transforms. In Advances in Technology and Engineering (ICATE), 2013 International Conference on (pp. 1-8). IEEE. |
|
841 |
|
Siddiqui, S. T., Hamatta, H. S., & Bokhari, M. U. (2013). Multilevel Security Spiral (MSS) Model: NOVEL Approach. International Journal of Computer Applications, 65(20). |
|
842 |
|
Pirnau, M. (2013, June). The analysis of the. NET architecture security system. In Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on (pp. 1-6). IEEE. |
|
843 |
|
Athawale, A. (2013). Information Hiding in image and audio files. |
|
844 |
|
Xu, L., Yeh, Y. R., Lee, Y. J., & Li, J. (2013). A Hierarchical Framework Using Approximated Local Outlier Factor for Efficient Anomaly Detection. Procedia Computer Science, 19, 1174-1181. |
|
845 |
|
Sladic, G., Vidakovic, M., & Konjovic, Z. (2013). Network Monitoring Using Intelligent Mobile Agents. In Intelligent Systems: Models and Applications (pp. 301-318). Springer Berlin Heidelberg. |
|
846 |
|
Chaoyu, Y. A. N. G., Yerong, H. E., & Minli, S. O. N. G. (2013). Wireless Sensor Network Topology Control Based on Agent. Sensors & Transducers (1726-5479), 160(12). |
|
847 |
|
Kotenko, I., & Chechulin, A. (2013, June). A cyber attack modeling and impact assessment framework. In Cyber Conflict (CyCon), 2013 5th International Conference on (pp. 1-24). IEEE. |
|
848 |
|
Mazumder, J. A., & Hemachandran, K. (2013). A high capacity and secured color image steganographic technique using discrete wavelet transformation. International Journal of Computer Science and Information Technologies, 4(4), 583-589. |
|
849 |
|
Mann, V. K., & Dhaliwal, H. S. (2013). 32* 32 Colour Image Steganography. International Journal of Engineering Trends and Technology (IJETT) Vol, 4. |
|
850 |
|
Mazumder, J. A., & Hemachandran, K. (2013). Study of Image steganography using LSB, DFT and DWT. International Journal of Computers & Technology, 11(5), 2618-2627. |
|
851 |
|
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42. |
|
852 |
|
Atawneh, S., & Sumari, P. (2013). Hybrid and Blind Steganographic Method for Digital Images Based on DWT and Chaotic Map. Journal of Communications, 8(11). |
|
853 |
|
Zhou, Y., & Ng, W. W. (2013, July). A study of influence between digital watermarking and steganography. In Wavelet Analysis and Pattern Recognition (ICWAPR), 2013 International Conference on (pp. 49-55). IEEE. |
|
854 |
|
Lin, Q., Wang, R., Ye, N., & Wang, Z. (2013). Energy efficient distributed steganography for secure communication in wireless multimedia sensor networks. Journal of Electronics (China), 30(1), 9-16. |
|
855 |
|
Kanzariya, N., Nimavat, A., & Patel, H. (2013). Security of Digital Images using Steganography Techniques based on LSB, DCT and Huffman Encoding. |
|
856 |
|
Yajurvedi, A. H., & Kulkarni, S. (2013, January). An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 203-212). Springer India. |
|
857 |
|
Mondal, A., Sahana, S., & Mahata, S. K. (2013, April). A Pictorial Block Steganography based Secure Algorithm for Data Transfer. In IJCA Special Issue on International Conference on Computing, Communication and Sensor Network (No. 4, pp. 12-15). Foundation of Computer Science (FCS). |
|
858 |
|
Dagar, S. (2013). RGB Based Dual Key Image Steganography. |
|
859 |
|
Sahana, S., Sen, J., & Mondal, C. Secure Adaptive N-cryption (SAN). |
|
860 |
|
Shahana, T. A Secure DCT Image Steganography based on Public-Key Cryptography. |
|
861 |
|
Kamble, S. V., & Warvante, B. G. A Review on Novel Image Steganography Techniques. |
|
862 |
|
Mann, V. K., Dhaliwal, H. S., & Dhaliwal, H. S. Nav view search. |
|
863 |
|
Maan, V. K., & Dhaliwal, H. S. 32× 32 Vector Quantization Based Colour Image Steganography. |
|
864 |
|
Chaturvedi, P., & Bairwa, R. K. Image Steganography Method for Hiding Secret Message in Colored Images by Using IWT. |
|
865 |
|
Wang, D., Chen, D., & Guo, R. (2013). DDoS mitigation in content distribution networks. International Journal of Wireless and Mobile Computing, 6(5), 508-514. |
|
866 |
|
Cartier, G., Cartier, J. F., & Fernandez, J. M. (2013). Next-generation dos at the higher layers: A study of smtp flooding. In Network and System Security (pp. 149-163). Springer Berlin Heidelberg. |
|
867 |
|
Bou-Harb, E., Pourzandi, M., Debbabi, M., & Assi, C. (2013). A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. Security and Communication Networks, 6(12), 1478-1489. |
|
868 |
|
Bedi, D. S. (2013). Information security in hospitality SMMEs in the Cape Metropole area: policies and measures in the online environment (Doctoral dissertation, Cape Peninsula University of Technology). |
|
869 |
|
Aye, N., Khin, H. S., Win, T. T., KoKo, T., Than, M. Z., Hattori, F., & Kuwabara, K. (2013). Multi-domain public key infrastructure for information security with use of a multi-agent system. In Intelligent Information and Database Systems (pp. 365-374). Springer Berlin Heidelberg. |
|
870 |
|
Peng, B., & Li, L. (2013). QoS Multicast Routing Algorithm Based on Genetic Algorithm and Ant Colony Optimization. International Information Institute (Tokyo). Information, 16(10), 7717. |
|
871 |
|
Chen, H., & Zhou, P. (2013, July). An ant algorithm for solving the four-coloring map problem. In Natural Computation (ICNC), 2013 Ninth International Conference on (pp. 491-495). IEEE. |
|
872 |
|
Nakhumwa, J. N. (2013). Adoption of E-commerce Payment Systems by Commercial Banks in Kenya (Doctoral dissertation, University of Nairobi). |
|
873 |
|
Kerrigan, M. (2013). A capability maturity model for digital investigations. Digital Investigation, 10(1), 19-33. |
|
874 |
|
Saleem, S., Popov, O., & Appiah-Kubi, O. K. (2013). Evaluating and comparing tools for mobile device forensics using quantitative analysis. In Digital Forensics and Cyber Crime (pp. 264-282). Springer Berlin Heidelberg. |
|
875 |
|
Fenu, G., & Solinas, F. (2013). computer forensics investigation an approach to evidence in cyperspace. In The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) (pp. 77-88). The Society of Digital Information and Wireless Communication. |
|
876 |
|
Neil, A. M., Elmogy, M., & RIAD, A. (2013). A Proposed Framework for Crime Investigation Based On Windows Registry Analysis. Journal of Engineering and Applied Science, Faculty of Engineering, Cairo University, 60(1). |
|
877 |
|
Fenu, G., & Solinas, F. (2013). Computer forensics between the italian legislation and pragmatic questions. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2(1), 9-24. |
|
878 |
|
Vlachopoulos, K., Magkos, E., & Chrissikopoulos, V. (2013). A model for hybrid evidence investigation. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, 150. |
|
879 |
|
Bulbul, H. I., Yavuzcan, H. G., & Ozel, M. (2013). Digital forensics: An Analytical Crime Scene Procedure Model (ACSPM). Forensic science international, 233(1), 244-256. |
|
880 |
|
Hewling, M. O. (2013). Digital forensics: an integrated approach for the investigation of cyber/computer related crimes. |
|
881 |
|
Krishnan, M., Karthikeyan, T., Chinnusamy, T. R., & Murugesan, A. (2013). Dynamic Scheduling of Flexible Manufacturing System Using Scatter Search Algorithm. International Journal of Emerging Technology and Advanced Engineering, 3(10), 329-341. |
|
882 |
|
Ismail, M. A. (2013, April). Multi-core processor based parallel implementation for finding distribution vectors in Markov processes. In Electronics, Communications and Photonics Conference (SIECPC), 2013 Saudi International (pp. 1-5). IEEE. |
|
883 |
|
Shahi, G., & Singh, C. (2013). To Secure and Compress the Message on Local Area Network. International Journal of Computer Applications, 69(17), 43-47. |
|
884 |
|
Dutta, S., Kumar, C., & Chakraborty, S. (2013). A symmetric key algorithm for cryptography using music. International Journal of Engineering and Technology, 5(3), 3109-3115. |
|
885 |
|
Rote, G. D., & Patil, A. M. Steganography with Cryptography Technique For Data Hiding. |
|
886 |
|
Das, D., Lanjewar, U. A., & Sharma, S. J. The Art of Cryptology: From Ancient Number System to Strange Number System. |
|
887 |
|
Nithyaa, A. N., Premkumar, R., Kanchana, D., & Krishnan, N. A. (2013). Automated Detection and Classification of Blood Diseases. In Recent Advancements in System Modelling Applications (pp. 393-404). Springer India. |
|
888 |
|
Suradkar, P. T. (2013). Detection of malarial parasite in blood using image processing. International Journal of Engineering and Innovative Technology (IJEIT), 2(10). |
|
889 |
|
Waghmare, V., & Akhter, S. Image Analysis Based System for Automatic Detection of Malarial Parasite in Blood Images. |
|
890 |
|
Opoku-Ansah, J., Anderson, B., Eghan, J. M., Boampong, J. N., Adueming, P. O. W., Amuah, C. L. Y., & Akyea, A. G. (2013). Automated Protocol for Counting Malaria Parasites (P. falciparum) from Digital Microscopic Image Based on L* a* b* Colour Model and K-Means Clustering. |
|
891 |
|
Elmir, A., Elmir, B., & Bounabat, B. (2013, November). Multi-facet quality assessment of process driven services in collaborative networks. In ISKO-Maghreb, 2013 3rd International Symposium (pp. 1-7). IEEE. |
|
892 |
|
Könst, W. J. (2013). Usability of Networked Information. |
|
893 |
|
Elmir, A., Elmir, B., & Bounabat, B. (2013). Towards an Assessment-oriented Model for External Information System Quality Characterization. arXiv preprint arXiv:1310.8111. |
|
894 |
|
Mahajan, D., & Sachdeva, M. (2013, December). Distinguishing DDoS Attack from Flash Event Using Real-World Datasets with Entropy as an Evaluation Metric. In Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on (pp. 90-94). IEEE. |
|
895 |
|
Kaur, S., & Bansal, R. (2013). enhanced technique for secured and reliable watermarking using mfhwt. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(5), pp-1674. |
|
896 |
|
Mishra, S., Mahapatra, A., & Mishra, P. (2013). A survey on Digital watermarking techniques. International Journal of Computer Science and Information Technologies, 4(3), 451-456. |
|
897 |
|
Shrirao, D. W., & Honole, S. A Survey on Improving Robustness of Image Watermarking By Using Gradient. |
|
898 |
|
Hasan, H. R., Sulong, G. B., & Selamat, A. A Novel Blind Color Image Watermarking Technique in Hybrid Domain Using LSB Approach and Discrete Slantlet Transform. |
|
899 |
|
Nilizadeh, A. F., & Nilchi, A. R. N. (2013). Steganography on RGB Images Based on a “Matrix Pattern” using Random Blocks. International Journal of Modern Education and Computer Science (IJMECS), 5(4), 8. |
|
900 |
|
Mann, V. K., & Dhaliwal, H. S. (2013). 32* 32 Colour Image Steganography. International Journal of Engineering Trends and Technology (IJETT) Vol, 4. |
|
901 |
|
Maan, V. K., & Dhaliwal, H. S. 32× 32 Vector Quantization Based Colour Image Steganography. |
|
902 |
|
Mohebbi, K., Ibrahim, S., & Idris, N. B. (2013). Prediction of relevance between requests and web services using ANN and LR models. In Intelligent Information and Database Systems (pp. 40-49). Springer Berlin Heidelberg. |
|
903 |
|
Shibata, S. I., Sato, F., Kimura, H., & Oyabu, T. A Fluctuation Characteristic of Plant Bioelectric Potential for Evaluating Abnormal Growth in Physiological Disorders. |
|
904 |
|
Das, S., Zaman, J. U., & Ghosh, R. (2013). Generation of AES S-boxes with Various Modulus and Additive Constant Polynomials and Testing their Randomization. Procedia Technology, 10, 957-962. |
|
905 |
|
Riman, C., & Hallal, H. H. (2013, January). DES Based Educational Encryption System. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp). |
|
906 |
|
Yadav, S., & Lakhani, K. (2013). A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET. International Journal of Distributed and Parallel Systems, 4(2), 17. |
|
907 |
|
Sivagurunathan, S., & Prathapchandran, K. (2013). Survey of Cluster-Based Cryptographic Schemes to Secure MANET. In Proceedings of the International Conference on Applied Mathematics and Theoretical Computer Science (p. 243). |
|
908 |
|
Oguike, O. E. (2013). Recursive Shortest Route Algorithm Using Abstract Data Type, Graph. African Journal of Computing & ICT, 6(2). |
|
909 |
|
Shaikh, E. A., & Dhale, A. AGV Path Planning and Obstacle Avoidance Using Dijkstra’s Algorithm. |
|
910 |
|
Ismail, M. N., Aborujilah, A., Musa, S., & Shahzad, A. (2013, January). Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. In Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication (p. 36). ACM. |
|
911 |
|
Chawla, I., Kaur, D., & Luthra, P. DDoS Attacks in Cloud and Mitigation Techniques. |
|
912 |
|
Shah, N., Chaudhary, L., Rajmane, A., Patil, N., & Khatke, K. (2013). Implementation Of C-Trend For Commercial Application. |
|
913 |
|
Sardar, M., & Majumder, K. Asurvey on trust based secure routing in manet. |
|
914 |
|
Ganesh, M. S., & Thanushkodi, K. (2013).Fashcep: Fuzzy and Analogy Based Hybrid Software Cost Estimation Process. International Review on Computers and Software (IRECOS), 8(7), 1497-1505. |
|
915 |
|
Pauline, M., Aruna, P., & Shadaksharappa, B. Comparison of available Methods to Estimate Effort, Performance and Cost with the Proposed Method. |
|
916 |
|
Aljahdali, S., & Sheta, A. (2013).Evolving software effort estimation models using multigene symbolic regression genetic programming. Int. J. Adv. Res. Artif. Intell, 2, 52-57. |
|
917 |
|
Haghshenas, m., & jeddi, k. Y. (2013). Using mobile devices to improve learning technologies. Ijitr, 1(6), 519-523. |
|
918 |
|
Gómez ardila, s. E. (2013). Learning design implementation in context-aware and adaptive mobile learning. |
|
919 |
|
Sun, g. (2013). Teamwork as a service: design of a cloud-based system for enhancing teamwork performance in mobile learning. |
|
920 |
|
Mehigan, t. J. (2013). Automatic detection of learner-style for adaptive elearning. |
|
921 |
|
Ahmad, A. (2013).A model of distributed rights allocation in online social interaction: a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology at Massey University, Albany, Auckland, New Zealand (Doctoral dissertation). |
|
922 |
|
Zheng, Y., Huang, Z., & He, T. (2013). Classification based on both attribute value weight and tuple weight under the cloud computing. Mathematical Problems in Engineering, 2013. |
|
923 |
|
Vern, R., & Dubey, S. K. (2013). A Survey on Evaluation of the Quality of Software System by Using Fuzzy Logic Approach. Global Journal of Computer Science and Technology, 13(1). |
|
924 |
|
Tegegne, W., Belachew, M., & Kifle, M. (2013). Quantification of Software Requirements Specification and Software Quality: Quantitative Approach. HiLCoE Journal of Computer Science and Technology, 144. |
|
925 |
|
Hmood, A. (2013). A Unified Metamodel for Assessing and Predicting Software Evolvability Quality (Doctoral dissertation, Concordia University). |
|
926 |
|
Tomar, A., & Thakare, V. M. (2013). A Customized Model on Software Quality Assurance & Reuse. International Journal Of Computer Science And Applications, 6(2). |
|
927 |
|
Ibrahim, N. H., Mustapha, A., Rosli, R., & Helmee, N. H. (2013). A hybrid model of hierarchical clustering and decision tree for rule-based classification of diabetic patients. International Journal of Engineering and Technology (IJET), 5(5), 3986-91. |
|
928 |
|
Thakare, S., & Wadhe, A. P. (2013). A literature Review on Desktop Phishing Based on Visual Appearance Analysis. International Journal of Research in Computer Engineering & Electronics, 2(2). |
|
929 |
|
Mitev, I., & Maimarev, R. International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net. |
|
930 |
|
Gayathri, C., & Kalpana, V. (2013). Study on Image Steganography Techniques. International Journal of Engineering and Technology (IJET) Vol, 5. |
|
931 |
|
Al-Bahadili, H. (2013). A Secure Block Permutation Image Steganography Algorithm. Submitted to the International Journal on Cryptography and Information Security (IJCIS) on 30th July. |
|
932 |
|
Kelash, H. M., Abdel Wahab, O. F., Elshakankiry, O., & El-sayed, H. S. (2013, October). Hiding data in video sequences using steganography algorithms. In ICT Convergence (ICTC), 2013 International Conference on (pp. 353-358). IEEE. |
|
933 |
|
Chugh, G. (2013). Image Steganography Techniques: A Review Article. acta technica corviniesis-Bulletin of engineering Tome VI July-September, 97-104. |
|
934 |
|
Sharda, S., & Budhiraja, S. (2013). Performance Analysis of Image Steganography based on DWT and Arnold Transform. International Journal of Computer Applications, 69(21). |
|
935 |
|
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42. |
|
936 |
|
Chee, A. (2013). Steganographic techniques on social media: investigation guidelines (Doctoral dissertation, Auckland University of Technology). |
|
937 |
|
Sohag, S. A., Islam, D. M. K., & Islam, M. B. (2013). A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key. American Journal of Engineering Research (AJER) Volume-02, Issue-09. |
|
938 |
|
Shah, H., Shinde, P., & Kukreja, J. (2013). Retouching Detection and Steganalysis. International Journal of Engineering Innovations and Research, 2(6), 487. |
|
939 |
|
Ali, A. A., & Saad, A. H. S. (2013). New Image Steganography Method by Matching Secret Message with pixels of Cover Image (SMM). International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), 3 (2), 1-10. |
|
940 |
|
Saejung, S., Boondee, A., Preechasuk, J., & Chantrapornchai, C. (2013, September). On the comparison of digital image steganography algorithm based on DCT and wavelet. In Computer Science and Engineering Conference (ICSEC), 2013 International (pp. 328-333). IEEE. |
|
941 |
|
Patil, H. H., & Hingway, S. P. Improved Way of Image Stegnography for JPEG2000 Compression Standard by Using EBCOT. |
|
942 |
|
Poongavanam, V., & Shamala, l. m. an enhanced difference pair mapping steganography method to improve embedding capacity. |
|
943 |
|
FADHIL, J. A. (2013). A New Method for Improving the Capacity of Data Hiding in an Image Steganography. |
|
944 |
|
Rad, J. M. (2013). Intensity Adaptive LSB Method Applying a Revised Matching. International Journal of Computer Applications, 70(27). |
|
945 |
|
Bedwal, T., & Kumar, M. (2013). An Enhanced and Secure Image Steganographic Technique Using RGB-Box Mapping. |
|
946 |
|
Arora, A., Neeru, M. N., & Taqdir, M. image steganography techniques: an overview. |
|
947 |
|
Jassim, F. A. (2013). A Novel Robust Method to Add Watermarks to Bitmap Images by Fading Technique. arXiv preprint arXiv:1307.1166. |
|
948 |
|
Lal, G. J., Veena, V. K., & Soman, K. P. (2013). A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition. In Security in Computing and Communications (pp. 52-62). Springer Berlin Heidelberg. |
|
949 |
|
Shihab, A. M., Mohammed, R. K., & Abed, W. M. (2013). evaluating the performance of the secure block permutation image steganography algorithm. international journal of network security & its applications, 5(5), 167. |
|
950 |
|
Nagaty, K. A. (2013). Secret Sharing using Image Hashing. International Journal of Computer Applications, 73(20), 14-22. |
|
951 |
|
Patil, A. U., Hingway, S. P., & Hingway, S. P. Nav view search. |
|
952 |
|
Barmawi, A. M. (2013, November). Strengthening Dynamic Cell Spreading (DCS) image steganography. In Information and Network Security (ICINS 2013), 2013 International Conference on (pp. 1-6). IET. |
|
953 |
|
Yunus, Y. A., Ab Rahman, S., & Ibrahim, J. (2013). Steganography: A Review of Information Security Research and Development in Muslim World. American Journal of Engineering Research (AJER), 2(11), 122-128. |
|
954 |
|
AKTAS, H., & KALKAN, M. An Application of the Crystography. |
|
955 |
|
Kovtun, VY, Hnatiuk, S., & Kinzeryavyy, A. (2013). Systematics modern methods of computer steganography. Safety information, 19 (3), 209-217. |
|
956 |
|
Rodrigues, P., Belguinha, A., Gomes, C., Cardoso, P., Vilas, T., Mestre, R., & Rodrigues, J. M. F. (2013). Open source technologies involved in constructing a web-based football information system. In Advances in Information Systems and Technologies (pp. 715-723). Springer Berlin Heidelberg. |
|
957 |
|
Syamala, P. J., Vimalai, R., & Vimala, R. Nav view search. |
|
958 |
|
Kuseler, T., Lami, I. A., & Al-Assam, H. (2013, May). Location-assured, multifactor authentication on smartphones via LTE communication. In SPIE Defense, Security, and Sensing (pp. 87550B-87550B). International Society for Optics and Photonics. |
|
959 |
|
Al-Assam, H., Lami, I. A., & Kuseler, T. (2013). Integrating Cancellable Biometrics with Geographical Location for Effective Unattended Authentication of Users of Mobile Devices. Journal of Communications, 8(11). |
|
960 |
|
Namayanja, J. M., & Janeja, V. P. (2013, June). Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks. In Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on (pp. 191-196). IEEE. |
|
961 |
|
Mandal, S., Saha, G., & Pal, R. K. (2013). An Approach towards Automated Disease Diagnosis & Drug Design Using Hybrid Rough-Decision Tree from Microarray Dataset. J Comput Sci Syst Biol, 6, 337-343. |
|
962 |
|
Yinkfu Chuye, K. (2013). Design and Implementation of Machine Learning and Rule-Based System for Verifying Automation System Designs. |
|
963 |
|
Gabriel, I., Charles, A. O., & Officer, A. C. (2013). Fingerprint Matching using Neighbourhood Distinctiveness. |
|
964 |
|
Babatunde, I. G., & Charles, A. O. (2013). A Fingerprint-based Authentication Framework for ATM Machines. J Comput Eng Inf Technol 2: 3. doi: http://dx. doi. org/10.4172/2324, 9307, 2. |
|
965 |
|
Babatunde, I. G., Charles, A. O., & Officer, A. C. (2013, October). Fingerprint matching by neighbourhood characteristics. In Science and Information Conference (SAI), 2013 (pp. 434-442). IEEE. |
|
966 |
|
Angaye, C. O., Akinyokun, O. C., & Iwasokun, g. b. experimental study of minutiae based algorithm for fingerprint matching. |
|
967 |
|
Han, S. W., Jeoune, D. S., & Yoon, Y. W. (2013). New Minutiae Detection Algorithm from Fingerprint Image using the Improved Tracing on Ridge Curve. International Journal of Security and Its Applications, 7(4), 343-352. |
|
968 |
|
Babatunde, I. G., Charles, A. O., & Olatunbosun, O. (2013). Uniformity Level Approach to Fingerprint Ridge Frequency Estimation. International Journal of Computer Applications, 62(22). |
|
969 |
|
Jain, N., Sharma, S. K., & Pal, B. L. (2013). Development of a Multimodal Biometric Identification and Verification System using Two Fingerprints. International Journal of Computer Applications, 74(12). |
|
970 |
|
Sahu, M., & Shukla, N. Rotation Invariant Approach of SURF for Unimodal Biometric System. |
|
971 |
|
Peng xi, peng xiao-qi, zhong yunfei, tang ying, & left the dragon. (2013). extraction of minutiae identity detection method.computer applications and software, 30 (6), 132-136. |
|
972 |
|
Dogra, N., & Kaur, H. (2013). Cloud Computing Security: Issues and Concerns. International Journal of Emerging Technology and Advanced Engineering, 3(3). |
|
973 |
|
Beham, M. P., & Roomi, S. M. M. (2013). A review of face recognition methods. International Journal of Pattern Recognition and Artificial Intelligence, 27(04), 1356005. |
|
974 |
|
Shah, S., Khan, S. A., & Riaz, N. (2013). Analytical Study of Face Recognition Techniques. |
|
975 |
|
Thomas, L. L., Gopakumar, C., & Thomas, A. A. Face Recognition based on Gabor Wavelet and Backpropagation Neural Network. |
|
976 |
|
Sahraoui, S., & Bouam, S. (2013). Secure routing optimization in hierarchical cluster-based wireless sensor networks. International Journal of Communication Networks and Information Security (IJCNIS), 5(3). |
|
977 |
|
Yuhong Zhen, Wu Yonghao, & Zhou Fengli. (2013). Based on vehicle terminal system design µC / OS-? Computer Applications and Software, 30 (2), 324-327. |
|
978 |
|
Left flat, Yunfang, Wangsan Fu, & Wang ya. (2013). A new proxy signature scheme without certificate directional Computer Applications and Software, 30 (2), 315-316. |
|
979 |
|
Chen, B. C., & Yeh, H. T. (2013). Secure proxy signature schemes from the Weil pairing. The Journal of Supercomputing, 65(2), 496-506. |
|
980 |
|
Zambrano, J. G., Guzmán-Ramírez, E., & Pogrebnyak, O. (2013). Search Algorithm for Image Recognition Based on Learning Algorithm for Multivariate Data Analysis. INTECH Open Access Publisher. |
|
981 |
|
Hoelz, B. W., & Ralha, C. G. (2013, March). A framework for semantic annotation of digital evidence. In Proceedings of the 28th Annual ACM Symposium on Applied Computing (pp. 1966-1971). ACM. |
|
982 |
|
Tanner, A., & Duncan, S. On Integrating Mobile Applications into the Digital Forensic Investigative Process. |
|
983 |
|
Ezeah, G. H., Asogwa, C. E., & Edogor, I. O. (2013). Social media use among students of universities in South-East Nigeria. Journal of Humanities and Social Sciences, 16, 23-32. |
|
984 |
|
Shittu, A. T., Madarsha, K. B., AbduRahman, N. S. N., & Ahmad, T. B. T. (2013). Determinants of social networking software acceptance: A multi-theoretical approach. The Malaysian Online Journal of Educational Technology, 1(1), 27-43. |
|
985 |
|
koçak, n. g., kaya, s., & EROL, E. Social Media from the Perspective of Diffusion of Innovation Approach. |
|
986 |
|
Mahmud, Y., Rahim, N. Z. A., & Miskon, S. (2013, October). Developing a conceptual framework of Social Network Site (SNS) appropriation in family context. In Science and Information Conference (SAI), 2013 (pp. 288-293). IEEE. |
|
987 |
|
Yaghmaei, & F. Users tend to use this system to evaluate the hospital information system based on innovation diffusion model Razi hospital. Journal of Health Administration. |
|
988 |
|
Patel, A., & Verma, M. K. Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET: Reliability Value based Approach. International Journal of Computer Applications (0975-8887) Volume. |
|
989 |
|
Patel, A., & Verma, M. K. (2013). Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET. International Journal of Computer Applications, 82(1). |
|
990 |
|
Shrivastava, S. Normalized Worm-Hole Local Intrusion Detection Algorithm (NWLIDA). |
|
991 |
|
Gupta, A., & Malviya, M. A Novel Recommendation Trust Proxy (RTP) Based Pre-emptive Malicious Node Detection Mechanism for AODV in MANET. |
|
992 |
|
Seo, D., Lee, H., & Perrig, A. (2013). APFS: adaptive probabilistic filter scheduling against distributed denial-of-service attacks. Computers & Security, 39, 366-385. |
|
993 |
|
Chellani, G., & Kalla, A. (2013). A Review: Study of Handover Performance in Mobile IP. arXiv preprint arXiv:1312.2108. |
|
994 |
|
Kumar, R., Verma, P., & Singh, Y. (2013). Mobile Ad Hoc Networks and It’s Routing Protocols. World Academy of Science, Engineering and Technology International Journal of Computer, Information, Systems and Control Engineering, 7(8). |
|
995 |
|
Roopak, M., & Reddy, B. (2013). Blackhole Attack Implementation in AODV Routing Protocol. International Journal of Scientific & Engineering Research, 4(5), 402-406. |
|
996 |
|
Mobadersany, P., Khanmohammadi, S., & Ghaemi, S. (2013, May). An efficient fuzzy method for path planning a robot in complex environments. In Electrical Engineering (ICEE), 2013 21st Iranian Conference on (pp. 1-6). IEEE. |
|
997 |
|
Jafarzadeh, H., Gholami, S., & Bashirzadeh, R. (2013). Decision Science Letters. |
|
998 |
|
Garbervetsky, D., & Kim, S. (2013). Report from 2nd international workshop on developing tools as plug-ins (TOPI 2012). ACM SIGSOFT Software Engineering Notes, 38(1), 49-51. |
|
999 |
|
Singh, Y., Khatkar, A., Rani, P., Deepika, D., & Barak, D. D. (2013, April). Wormhole Attack Avoidance Technique in Mobile Adhoc Networks. In Advanced Computing and Communication Technologies (ACCT), 2013 Third International Conference on (pp. 283-287). IEEE. |
|
1000 |
|
Fritzsche, M., & Gilani, W. (2013). U.S. Patent No. 8,438,533. Washington, DC: U.S. Patent and Trademark Office. |
|
1001 |
|
Elkabbany, G. F., & Elnemr, H. A. (2013). An Efficient Parallel Based Diabetic Retinopathy Grading Algorithm. International Journal of Computer Science and Information Security, 11(9), 12. |
|
1002 |
|
Younes, O., & Thomas, N. (2013). Modelling and performance analysis of multi-hop ad hoc networks. Simulation Modelling Practice and Theory, 38, 69-97. |
|
1003 |
|
Krishnakumar, L., & Varughese, N. M. (2013, December). High speed classification of vulnerabilities in cloud computing using collaborative network security management. In Advanced Computing and Communication Systems (ICACCS), 2013 International Conference on (pp. 1-6). IEEE. |
|
1004 |
|
Kaur, R. (2013). Energy efficient routing protocols in mobile ad hoc network based on AODV protocol. Int. J. Appl. Innov. Eng. Manag.(IJAIEM), 2(1), 323-324. |
|
1005 |
|
Rajeshkanna, R., & Saradha, A. (2013). Energy Efficient Enhanced AODV Routing Protocol for maximize the lifetime of Mobile Ad hoc Networks. International Journal of Computer Technology and Applications, 4(5), 856. |
|
1006 |
|
Gupta, R., & Aggarwal, H. (2013). Network Density based Analysis of MANET Routing Protocols. International Journal of Computer Applications, 77(10). |
|
1007 |
|
Gupta, R. (2013). Ad-hoc routing protocol “review paper”. Journal of Global Research in Computer Science, 4(5), 26-29. |
|
1008 |
|
Bernard, T., Fouchal, H., Linck, S., & Perrin, E. (2013, June). Impact of routing protocols on packet retransmission over wireless networks. In Communications (ICC), 2013 IEEE International Conference on (pp. 2979-2983). IEEE. |
|
1009 |
|
Rajeshkanna, R., Senthilkumar, S. P., & Kumuthini, C. (2013). Energy Efficient Routing Protocols in Mobile Ad hoc Network Based on Enhanced AODV Protocol. |
|
1010 |
|
Bhushan, S., Saroliya, A., & Singh, V. (2013). Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols. International Journal of Advanced Research in Computer and Communication Engineering, 2(6). |
|
1011 |
|
Sharma, V., Singh, H., & Kant, S. (2013, September). AODV based energy efficient IEEE 802.16 G VANET network. In Communication and Computing (ARTCom 2013), Fifth International Conference on Advances in Recent Technologies in (pp. 35-43). IET. |
|
1012 |
|
Arya, P., Vijay, S., Gupta, V., & Pandey, A. (2013). Effect of File Mobility Pattern on AODV, DSDV and ZRP Routing Protocols in MANET. International Journal of Computer Applications, 80(2). |
|
1013 |
|
Yibyeonggwan , and jeongeunhui . (2013) . GSK (Group Secret Key) based SAODV (Secure AODV) routing protocol to detect packet injection attacks. Security Engineering Research Institute Journal of Security Engineering, 10 (6), 681-694. |
|
1014 |
|
Agarwal, M. (2013). Text steganographic approaches: a comparison. arXiv preprint arXiv:1302.2718. |
|
1015 |
|
Awad, W. S., & Zolait, A. H. (2013). E-Mail as an Official Communication Tool in Bahrain: Individual and Public Organization Perspectives. International Journal of E-Services and Mobile Applications (IJESMA), 5(1), 51-76. |
|
1016 |
|
da Rocha, M. C., & Saraiva, J. T. (2013). A discrete evolutionary PSO based approach to the multiyear transmission expansion planning problem considering demand uncertainties. International Journal of Electrical Power & Energy Systems, 45(1), 427-442. |
|
1017 |
|
Latha, K., Rajinikanth, V., & Surekha, P. M. (2013). PSO-based PID controller design for a class of stable and unstable systems. ISRN Artificial Intelligence, 2013. |
|
1018 |
|
Arasomwan, M. A., & Adewumi, A. O. (2013, June). An adaptive velocity particle swarm optimization for high-dimensional function optimization. In Evolutionary Computation (CEC), 2013 IEEE Congress on (pp. 2352-2359). IEEE. |
|
1019 |
|
Arasomwan, M. A., & Adewumi, A. O. (2013). On the performance of linear decreasing inertia weight particle swarm optimization for global optimization. The Scientific World Journal, 2013. |
|
1020 |
|
Arasomwan, M. A., & Adewumi, A. O. (2013, April). On adaptive chaotic inertia weights in particle swarm optimization. In Swarm Intelligence (SIS), 2013 IEEE Symposium on (pp. 72-79). IEEE. |
|
1021 |
|
Jadon, S. S., Sharma, H., Bansal, J. C., & Tiwari, R. (2013, January). Self adaptive acceleration factor in particle swarm optimization. In Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012) (pp. 325-340). Springer India. |
|
1022 |
|
Yavari, S., Zoej, V., Mohammad, J., Mohammadzadeh, A., & Mokhtarzade, M. (2013). Particle swarm optimization of RFM for georeferencing of satellite images. Geoscience and Remote Sensing Letters, IEEE, 10(1), 135-139. |
|
1023 |
|
Pessin, G., Osório, F. S., Souza, J. R., Ueyama, J., Costa, F. G., Wolf, D. F., ... & Vargas, P. A. (2013). Investigation on the evolution of an indoor robotic localization system based on wireless networks. Applied Artificial Intelligence, 27(8), 743-758. |
|
1024 |
|
Wang, L. (2013). An improved cooperative particle swarm optimizer. Telecommunication Systems, 53(1), 147-154. |
|
1025 |
|
Chen, R. M., & Wu, D. S. (2013). Solving Scheduling Problem Using Particle Swarm Optimization with Novel Curve Based Inertia Weight and Grouped Communication Topology. International Journal of Digital Content Technology and its Applications, 7(7), 94. |
|
1026 |
|
Ramphuengnit, P., & Polvichai, J. An Effective Hybrid-DEPSO applied with Dynamic Sigmoid Weights. |
|
1027 |
|
Costeira da Rocha, M., & Tome Saraiva, J. (2013, June). Transmission expansion planning—A multiyear PSO based approach considering load uncertainties. In PowerTech (POWERTECH), 2013 IEEE Grenoble (pp. 1-6). IEEE. |
|
1028 |
|
Singh, N., & Singh, S. B. (2013, September). A New Modified Approach of Mean Particle Swarm Optimization Algorithm. In Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on (pp. 296-300). IEEE. |
|
1029 |
|
Chen, R. M., & Hsu, C. C. (2013). Guiding Search Using an Asymmetric Decline Control Function for Solving Flowshop Problems. Journal of Convergence Information Technology, 8(6). |
|
1030 |
|
Bahaa-Eldin, A. M. (2013). A medium resolution fingerprint matching system. Ain Shams Engineering Journal, 4(3), 393-408. |
|
1031 |
|
Lim, J. F., & Chin, R. K. Y. (2013, December). Enhancing Fingerprint Recognition Using Minutiae-Based and Image-Based Matching Techniques. In Artificial Intelligence, Modelling and Simulation (AIMS), 2013 1st International Conference on (pp. 261-266). IEEE. |
|
1032 |
|
Chockaian, K., Vayanaperumal, R., & Kanagaraj, B. R. (2013). New approach for identifying hereditary relation using primary fingerprint patterns. Image Processing, IET, 7(5), 423-431. |
|
1033 |
|
Babu, K. R., & Sunitha, K. V. N. (2013). Enhancing Hazy Images with the Aid of Particle Swarm Optimization (PSO) and Morphological Operation. International Review on Computers and Software (IRECOS), 8(1), 21-28. |
|
1034 |
|
Babu, K. R., & Sunitha, K. V. N. (2013). Image De-noising and Enhancement for Salt and Pepper Noise using Genetic Algorithm-Morphological Operations. International Journal on Signal and Image Processing, 4(1), 36. |
|
1035 |
|
Koteska, B., & Velinov, G. (2013). Component-Based Development: A Unified Model of Reusability Metrics. In ICT Innovations 2012 (pp. 335-344). Springer Berlin Heidelberg. |
|
1036 |
|
Valliappan, N., Lozano, A., & Heath, R. W. (2013). Antenna subset modulation for secure millimeter-wave wireless communication. Communications, IEEE Transactions on, 61(8), 3231-3245. |
|
1037 |
|
Goswami, B., & Mandal, D. (2013). A genetic algorithm for the level control of nulls and side lobes in linear antenna arrays. Journal of King Saud University-Computer and Information Sciences, 25(2), 117-126. |
|
1038 |
|
Banerjee, S., & DWIVEDI, V. V. (2013). Review of Adaptive Linear Antenna Array Pattern Optimization. International Journal of Electronics. |
|
1039 |
|
Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24. |
|
1040 |
|
Mandala, S., Abdullah, A. H., Ismail, A. S., Haron, H., Ngadi, M. A., & Coulibaly, Y. (2013, November). A review of blackhole attack in mobile adhoc network. In Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), 2013 3rd International Conference on (pp. 339-344). IEEE. |
|
1041 |
|
Daniel, J. V., Joshna, S., & Manjula, P. (2013). A Survey of Various Intrusion Detection Techniques in Wireless Sensor Networks. International Journal of Computer Science and Mobile Computing, 2(9). |
|
1042 |
|
Singh, D., & Bedi, S. S. (2013). A State of an Art Survey of Intrusion Detection System in Mobile Ad-hoc Network. International Journal of Computer Applications, 82(5). |
|
1043 |
|
Butun, I. (2013). Prevention and Detection of Intrusions in Wireless Sensor Networks. |
|
1044 |
|
Subha, P. S., & Moses, J. C. A Survey of Various Risk Mitigating Techniques in MANET Environment. |
|
1045 |
|
Jacobs, M., Chang, L., & Pulkkinen, A. (2013, January). Automatic Segmentation and Classification of Multiple Coronal Mass Ejections from Coronagraph Images. In Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV) (p. 1). The Steering Committee of The World Congress in Computer Science, Compute |
|
1046 |
|
Lee, g. s. color image segmentation using a morphological gradient-based active contour model. |
|
1047 |
|
Gupta, R. K., & Singh, P. (2013). A new way to design and implementation of hybrid crypto system for security of the information in public network. International Journal of Emerging Technology and Advanced Engineering, 3(8), 108-115. |
|
1048 |
|
Msvs, B. R., Vardhan, V., & Reddy, P. A noval security model for indic scripts-a case study on Telugu. Int. J. Comput. Sci. Secur.(IJCSS), 3(4), 303. |
|
1049 |
|
Sinha, S. K., Shrivastava, M., & Pandey, K. K. (2013). A New Way of Design and Implementation of Hybrid Encryption to Protect Confidential Information from Malicious Attack in Network. system, 6, 7. |
|
1050 |
|
Das, D., Lanjewar, U. A., & Sharma, S. J. Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS. |
|
1051 |
|
Jain, S. A New Approach of Dynamic Encryption using Steganography. |
|
1052 |
|
Ceccucci, W., Peslak, A., Kruck, S. E., & Patricia, S. (2013). DOES GENDER PLAY A ROLE IN TEXT MESSAGING?. Issues in Information Systems, 14(2). |
|
1053 |
|
Lewis-Mohabir, B. N. (2013). English Language Butchered: A Study of the Correlational Relationship Between Text Messaging Frequency and the Instance of Jargon in Formal Writing. |
|
1054 |
|
Fasola, J. P. (2013). socially assistive and service robotics for older adults: from motivating exercise to following spatial language instructions. |
|
1055 |
|
Lazim, h. b. m., & sasitharan, d. what factor persuade malaysians consumer to purchase smartphone?. |
|
1056 |
|
Kaur, V., Chattopadhyay, D. P., & Kaur, S. (2013). Study on Extraction of Bamboo Fibres from Raw Bamboo Fibres Bundles Using Different Retting Techniques. Textiles and Light Industrial Science and Technology. |
|
1057 |
|
Faruk, I. H. (2013). A Novel Approach of Secure Routing Protocol for Mobile Ad Hoc Network (Doctoral dissertation). |
|
1058 |
|
Joshi, M. K., & Lalmandoria, H. A Review On Wireless Adhoc Network Security. |
|
1059 |
|
Azad, M., Pal, R., Nautiyal, J., Panday, M., & Kumar, K. Review of Emerging Threats, Vulnerabilities and Techniques of Security on Mobile Ad hoc Networks. |
|
1060 |
|
Kazemitabar Amirkolaei, M. (2013). Enhancing Bio-inspired Intrusion Response in Ad-hoc Networks (Doctoral dissertation, Edinburgh Napier Unversity). |
|
1061 |
|
Valluvan, K. R. (2013). A Comparative Study of Secure Intrusion-Detection Systems for Discovering Malicious Nodes on MANETs. |
|
1062 |
|
Labbai, t. p. m., & rajamani, v. (2013). prevention of worm hole and black hole attacks in secure vbor for mobile ad hoc networks. journal of theoretical and applied information technology, 55(2). |
|
1063 |
|
Kalaivani, R., & Thangaraj, P. (2013). An effective technique to identify a river’s stage through satellite images by means of RBFNN. The Imaging Science Journal, 61(3), 279-291. |
|
1064 |
|
Medialdea, J. L. G., Manamparan, M. E. C., Sorita, M. G. M., Ponce, E. L., & Beltran Jr, A. A. A Novel Thermal Gas Analyzer Using Adaptive Neuro-Fuzzy Inference System (ANFIS). |
|
1065 |
|
Salam, M. S. B. H., Mohamad, D., & Salleh, S. H. S. Connected digit speech segmentation: a malay speech case using statistical approach with insertion reduction using neural network. |
|
1066 |
|
Diamant, R., & Lampe, L. (2013). Underwater localization with time-synchronization and propagation speed uncertainties. Mobile Computing, IEEE Transactions on, 12(7), 1257-1269. |
|
1067 |
|
Kheirabadi, M. T., & Mohamad, M. M. (2013). Greedy routing in underwater acoustic sensor networks: a survey. International Journal of Distributed Sensor Networks, 2013. |
|
1068 |
|
Han, G., Qian, A., Li, X., Jiang, J., & Shu, L. (2013, August). Performance evaluation of localization algorithms in large-scale underwater sensor networks. In Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on (pp. 493-498). IEEE. |
|
1069 |
|
Li Zuopeng, Caishao Bin, Zhang Jing, high Zhenguo, & Zhao Jing. (2012). Summary of underwater acoustic sensor network node localization technology. Small Computer Systems, 33 (3), 442-447. |
|
1070 |
|
Roee, D. (2013). Spatial reuse scheduling and localization for underwater acoustic communication networks. |
|
1071 |
|
Tunaa, G., Gungorb, V. C., Dasc, R., & Gulezd, K. A Survey on Potential Applications of Underwater Acoustic Sensor Networks: Deployment Techniques, Localization Algorithms, and Research Challenges. |
|
1072 |
|
Dabbour, M., Alsmadi, I., & Alsukhni, E. (2013). Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT. International Journal of Security and its Applications IJAST, 7(1). |
|
1073 |
|
Devaraju, S., & Ramakrishnan, S. (2013). Performance comparison of intrusion detection system using various techniques–A review. ICTACT Journal on Communication Technology, 4(3), 802-812. |
|
1074 |
|
Manivannan, S. S., & Sathiyamoorthy, E. An Efficient and Accurate Intrusion Detection System to detect the Network Attack Groups using the Layer wise Individual Feature Set. |
|
1075 |
|
Nugroho, H. T., & Wicaksono, B. A. (2013). Utilizing Instant Messaging for Real-Time Notification and Information Retrieval of Snort Intrusion Detection System. ISICO 2013. |
|
1076 |
|
Arunachalam, V. P., & Ravichandran, T. A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback. International Journal of Computer Science and Security (IJCSS), 3(4), 272. |
|
1077 |
|
Barreto, rdmm right, cyberspace and networks: consumer protection challenges in social commerce. |
|
1078 |
|
Nithya, M., & Varadarajan, V. (2013). An Security Architecture for Campus Virtual Organization Using Role Based Access Control. Life Science Journal, 10(7s). |
|
1079 |
|
Swain, G., & Lenka, S. K. (2013). Steganography using two sided, three sided, and four sided side match methods. CSI transactions on ICT, 1(2), 127-133. |
|
1080 |
|
Swain, G. (2013). Steganography in Digital Images Using Maximum Difference of Neighboring Pixel Values. International Journal of Security & Its Applications, 7(6). |
|
1081 |
|
Tayel, M., Shawky, H., & Hafez, A. E. S. (2013, January). A hybrid chaos-fuzzy-threshold steganography algorithm for hiding secure data. In Advanced Communication Technology (ICACT), 2013 15th International Conference on (pp. 156-161). IEEE. |
|
1082 |
|
Thanekar, S., & Pawar, S. S. (2013, December). OCTA (STAR) PVD: A different approach of image steganopgraphy. In Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on (pp. 1-5). IEEE. |
|
1083 |
|
Solanki, R., Chuahan, M., & Desai, m. survey of image steganography techniques. |
|
1084 |
|
Kaur, R., & Kaur, B. A Study and Review of Techniques of Spatial Steganography. |
|
1085 |
|
Elangovan, B., Rajesh, K., & Venkateswari, P. (2013). An Efficient Method for High Secured Image Steganography Using Image Segments. International Journal of Applied Engineering Research, 8(12). |
|
1086 |
|
Sedeeq, I. T. (2013). Steganography in Colored Images. International Journal of Computer Science and Information Security, 11(4), 87. |
|
1087 |
|
Gracy, S. A., & Jayakumar, C. (2013). Identifying and Locating Multiple Spoofing Attackers Using Cluster Analysis. In International Conference on Engineering and Technology (p. 123). |
|
1088 |
|
Kovtun, VY , Hnatyuk, S. , & Kinzeryavyy , A. (2013) . Systematics modern methods of computer steganography . Safety information , 19 ( 3), 209-217. |
|
1089 |
|
Kumari, P., Kumar, C., & Preeyanshi, J. B. (2013). Data Security Using Image Steganography And Weighing Its Techniques. International Journal of Scientific & Technology Research, 2(11). |
|
1090 |
|
Al-Bahadili, H. (2013). A Secure Block Permutation Image Teganography Algorithm. Submitted to the International Journal on Cryptography and Information Security (IJCIS) on 30th July. |
|
1091 |
|
Asole, S., & Mundada, M. (2013). A Survey on Securing Databases From Unauthorized Users. Int. J. Sci. Technol. Res, 2(4), 2-4. |
|
1092 |
|
Abbasy, M. B., & Ordonez, L. M. L. (2013, March). Single-Sink Mobility Performance Analysis on a Wireless Senosr Networks. In Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on (pp. 407-412). IEEE. |
|
1093 |
|
Li, B., Springer, J., Bebis, G., & Gunes, M. H. (2013). A survey of network flow applications. Journal of Network and Computer Applications, 36(2), 567-581. |
|
1094 |
|
Chadokar, S. K., Singh, D., & Singh, A. (2013, July). Optimizing network traffic by generating association rules using hybrid apriori-genetic algorithm. In Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on (pp. 1-5). IEEE. |
|
1095 |
|
Dhanore, G., & Chaturvedi, S. K. (2013). An Optimization of Association Rule Mining using K-Map and Genetic Algorithm for Large Database. International Journal of Computer Applications, 84(17), 26-31. |
|
1096 |
|
Taleb, A. M., Yahya, A. A., & Taleb, N. M. Parallel Genetic Algorithm Model to Extract Association Rules. |
|
1097 |
|
Krishnamoorthy, k. pagerank algorithm and genetic algorithm in web mining. |
|
1098 |
|
Shankar, S., & Purusothaman, T. (2013). A new utility-emphasized analysis for stock trading rules. Intelligent Data Analysis, 17(2), 271-294. |
|
1099 |
|
Dahiya, P., & Jyotsna, M. Swam Based ACO Routing Protocol in MANET. |
|
1100 |
|
Sutariya, D., & Kamboj, P. (2013). A Survey of QOS Multicast Routing Protocol for MANET. |
|
1101 |
|
Nivetha, S. K., Asokan, R., & Senthilkumaran, N. (2013, July). A swarm-based hybrid routing protocol to support multiple Quality of Service (QoS) metrics in mobile ad hoc networks. In Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on (pp. 1-8). IEEE. |
|
1102 |
|
Pourahmad, S., Safarpour, A. R., Bananzadeh, A., Rahimikazerooni, S., & Zabangirfard, Z. (2013). A Pilot study on Prediction of Pouchitis in Ulcerative Colitis Patients by Decision Tree Method Versus Logistic Regression Analysis. Annals of Colorectal Research, 1(2), 67-70. |
|
1103 |
|
Gebremeskel, K. (2013). Application of Data Mining Techniques to Predict Customers’ churn at Commercial Bank of Ethiopia (Doctoral dissertation, AAU). |
|
1104 |
|
Jahantigh, F. F., Nazarnejad, R., & Jahantigh, M. F. Investigating the Risk Factors for Low Birth Weight Using Data Mining: A Case Study of Imam Ali Hospital, Zahedan, Iran. |
|
1105 |
|
Blandón, M. G., Howard, G. M., & Torres, R. (2013). Estudio de Medición de la Actividad de Botnets en la República de Panamá. |
|
1106 |
|
LA, A. D. B. E.mario isaac gongora bland on. |
|
1107 |
|
Lekova, A., & Adda, M. (2013). Reliable OLSR in MANETs for detecting and isolating user selfish nodes. Complex Control Systems, 11, 1-9. |
|
1108 |
|
SAI PRAGATHI, Y. V. S., & Setty, S. P. (2013). HYBRID ANONYMOUS LOCATION-AIDED ROUTING PROTOCOL FOR PRIVACY PRESERVING AND AUTHENTICATION IN MANET. Journal of Theoretical & Applied Information Technology, 55(2). |
|
1109 |
|
Bhuvaneshwari, K., & Devaraj, A. F. S. (2013). Examination of Impact of Flooding attack on MANET and to accentuate on Performance Degradation. International Journal of Advanced Networking and Applications, 4(4), 1695. |
|
1110 |
|
Seethalakshmi, S., & Manikandan, K. C. (2013). Comparison of Different Methods to identify wormhole attacks in MANETS. International Journal of Advanced Networking and Applications, 4(5), 1760. |
|
1111 |
|
Sinnreich, A., Graham, N., & Trammell, A. MONDO NET. |
|
1112 |
|
Callegari, C., Giordano, S., Mannella, S., & Pagano, M. (2013). Design and Implementation of a Testbed for the Security Assessment of MANETs. In Cyberspace Safety and Security (pp. 228-242). Springer International Publishing. |
|
1113 |
|
Sanaei, M. G., Ghani, I., Hakemi, A., & Jeong, S. R. (2013). ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW. Science International, 25(4). |
|
1114 |
|
Sudhakar Sengan, D. S. (2013). A Trust and Co-Operative Nodes with Affects of Malicious Attacks and Measure the Performance Degradation on Geographic Aided Routing in Mobile Ad Hoc Network. Life Science Journal, 10(4s). |
|
1115 |
|
Arunachalam, V. P., & Ravichandran, T. A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback. International Journal of Computer Science and Security (IJCSS), 3(4), 272. |
|
1116 |
|
Arora, K., & Jindal, S. ANALYTICAL REVIEW OF AODV IN WORM HOLE ATTACK. |
|
1117 |
|
Abdul Jawad, P. P., & Chacko, B. ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS. |
|
1118 |
|
Ghani, I., Hakemi, A., Jeong, S. R., & Sanaei, M. G. P. (2013). ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW. Science International, 25(4). |
|
1119 |
|
Gandhi, R., & Joeg, P. LERP: A Secure Location Based Efficient Routing Protocol. |
|
1120 |
|
Panda, P., Gadnayak, K. K., & Panda, N. (2013). MANET Attacks and their Countermeasures: A Survey. |
|
1121 |
|
Benghabrit, A., Ouhbi, B., Behja, H., & Frikh, B. (2013, June). Text clustering using statistical and semantic data. In Computer and Information Technology (WCCIT), 2013 World Congress on (pp. 1-6). IEEE. |
|
1122 |
|
Suja, K. R., & Raglend, I. J. (2013). Adaptive genetic algorithm/neuro-fuzzy logic controller based unified power quality conditioner controller for compensating power quality problems. Australian Journal of Electrical and Electronics Engineering, 10(3), 351-361. |
|
1123 |
|
Chan, G. Y., Lee, C. S., & Heng, S. H. (2013). Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks. Journal of Network and Computer Applications, 36(2), 829-842. |
|
1124 |
|
Chandrashekhar, A. M., & Raghuveer, K. (2013). Fortification of hybrid intrusion detection system using variants of neural networks and support vector machines. International Journal of Network Security & Its Applications, 5(1), 71-90. |
|
1125 |
|
Husagic-Selman, A., Koker, R., & Selman, S. (2013, October). Intrusion detection using neural network committee machine. In Information, Communication and Automation Technologies (ICAT), 2013 XXIV International Symposium on (pp. 1-6). IEEE. |
|
1126 |
|
Parate, S., Nirkhi, S. M., & Dharaskar, R. V. (2013, December). Application of Network Forensics for Detection of Web Attack using Neural Network. In IJCA Proceedings on National Conference on Innovative Paradigms in Engineering & Technology 2013 (No. 2, pp. 28-31). Foundation of Computer Science (FCS). |
|
1127 |
|
Chana, G. Y., Leea, C. S., & Hengb, S. H. (2013). peanfis-farm framework in defending against web service attacks. |
|
1128 |
|
Hameed, S. M., Saad, S., & AlAni, M. F. (2013). An Extended Modified Fuzzy Possibilistic C-Means Clustering Algorithm for Intrusion Detection. Lecture Notes on Software Engineering, 1(3), 273-278. |
|
1129 |
|
Selman, A. H. (2013). Intrusion Detection System using Fuzzy Logic. |
|
1130 |
|
Li Nan , Zhang Xuefu & study found that knowledge-based application system related data. |
|
1131 |
|
LABBAI, T. P. M., & RAJAMANI, V. (2013). PREVENTION OF WORM HOLE AND BLACK HOLE ATTACKS IN SECURE VBOR FOR MOBILE AD HOC NETWORKS. Journal of Theoretical and Applied Information Technology, 55(2). |
|
1132 |
|
Skracic, K., Pale, P., & Jeren, B. (2013, January). Knowledge based authentication requirements. In MIPRO 2012 International Convention Opatija. |
|
1133 |
|
van Eekelen, W. A., van den Elst, J., & Khan, V. J. (2013, April). Picassopass: a password scheme using a dynamically layered combination of graphical elements. In CHI'13 Extended Abstracts on Human Factors in Computing Systems (pp. 1857-1862). ACM. |
|
1134 |
|
Khan, F. N., & Govil, K. (2013). Distributed Task Allocation Scheme for Performance Improvement in Mobile Computing Network. International Journal of Trends in Computer Science, 2(3), 809-817. |
|
1135 |
|
Kamal, S., & Singh, B. H. (2013). Scheduling Of Parallel Constrained Task Graphs On Multiprocessor Systems. American International Journal of Research in Science, Technology, Engineering and Mathematics, 153-158. |
|
1136 |
|
Kaur, A., & Kaur, P. (2013). Implementation of Mapping Heuristic Genetic Algorithm. International Journal of Advanced Research in Computer and Communication Engineering, 3224-3229. |
|
1137 |
|
Tutueanu, R. I., Pop, F., Vasile, M. A., & Cristea, V. (2013). Scheduling Algorithm Based on Agreement Protocol for Cloud Systems. In Algorithms and Architectures for Parallel Processing (pp. 94-101). Springer International Publishing. |
|
1138 |
|
Kaur, P., & Kaur, A. Implementation of Dynamic Level Scheduling Algorithm using Genetic Operators. International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume, 2. |
|
1139 |
|
Awadall, M., Ahmad, A., & Al-Busaidi, S. (2013). Min–min GA Based Task Scheduling In Multiprocessor Systems. International Journal of Soft Computing and Engineering (IJSCE). ISSN, 2231-2307. |
|
1140 |
|
Vasile, M. A., Pop, F., Tutueanu, R. I., & Cristea, V. (2013). HySARC2: Hybrid Scheduling Algorithm Based on Resource Clustering in Cloud Environments. In Algorithms and Architectures for Parallel Processing (pp. 416-425). Springer International Publishing. |
|
1141 |
|
Geetha, T., Mahalakshmi, K., Ummusalma, I., & Kumaran, K. M. (2013). An Observational Analysis of Genetic Operators. International Journal of Computer Applications, 63(18), 24-34. |
|
1142 |
|
Kaur, A., & Singh, B. (2013). Enhancement of Power Aware Job Scheduling with Minimum Completion Time Algorithm. International Journal of Engineering Science and Technology, 5(7), 1465. |
|
1143 |
|
Na'mneh, A., & Darabkh, K. (2013, November). A new genetic-based algorithm for scheduling static tasks in homogeneous parallel systems. In Robotics, Biomimetics, and Intelligent Computational Systems (ROBIONETICS), 2013 IEEE International Conference on (pp. 46-50). IEEE. |
|
1144 |
|
Sivasankar, S., Jeyapaul, R., & Kunhahamed, P. K. (2013). Performance study of tool materials and optimisation of pulse duration on EDM of zirconium di boride. International Journal of Machining and Machinability of Materials, 14(2), 123-141. |
|
1145 |
|
El-Said, A. M., Eldesoky, A. I., & Arafat, H. A. (2013). An efficient object oriented text analysis (OOTA) approach to construct static structure with dynamic behavior. International Journal of Information Acquisition, 9(01), 1350006. |
|
1146 |
|
Benghabrit, A., Ouhbi, B., Behja, H., & Frikh, B. (2013). Statistical and Semantic Feature Selection for Text Clustering. Journal of Intelligent Computing, 4(2), 69-79. |
|
1147 |
|
De Quiroz, V. B. A., & Guizzardi, R. S. S. Secure Tropos. |
|
1148 |
|
Fotso, D. B. F. (2013). Efficient data aggregation and routing in wireless sensor networks (Doctoral dissertation). |
|
1149 |
|
FOTUE, D. (2013). Agrégation et Routage Efficace de Données dans les Réseaux de Capteurs Sans Fils. |
|
1150 |
|
Mohammadi, F. G., & Abadeh, M. S. (2012). A survey of data mining techniques for steganalysis. Recent Advances in Steganography, 1-25. |
|
1151 |
|
5. G. Liu and X. Chen, “A Positioning Research of Underwater Acoustic Sensor Networks Based on Support Vector Regression”, Engineering Future Computing, Communication, Control and Management Lecture Notes in Electrical Engineering, 2012, Volume 144, pp. 9-16. |
|
1152 |
|
Shukla, D., Verma, K., & Gangele, S. (2012). Least square curve fitting applications under rest state environment in internet traffic sharing in computer network. International Journal of Computer Science and Telecommunications (IJCST), 3(05), 43-51. |
|
1153 |
|
Shukla, D., Verma, K., & Gangele, S. (2012). Iso-Failure in Web Browsing using Markov chain model and curve fitting analysis. International journal of modern engineering research (IJMER), 2(02), 512-517. |
|
1154 |
|
Sultan Aljahdali, “Development of a Software Effort Estimation Model Using Differential Evolution”, Journal Of Electronics And Computer Systems (IJECS). 12(1), pp. 1-8, 2012. |
|
1155 |
|
Woungang, I., Dhurandher, S. K., Peddi, R. D., & Obaidat, M. S. (2012, May). Detecting blackhole attacks on DSR-based mobile ad hoc networks. In Computer, Information and Telecommunication Systems (CITS), 2012 International Conference on (pp. 1-5). IEEE. |
|
1156 |
|
Ramana, V. V., Reddy, A., & Sekaran, K. C. (2012). Bio Inspired Approach to Secure Routing in MANETs. arXiv preprint arXiv:1208.3486. |
|
1157 |
|
Choudhury, P., Nandi, S., Pal, A., & Debnath, N. C. (2012, July). Mitigating route request flooding attack in MANET using node reputation. In Industrial Informatics (INDIN), 2012 10th IEEE International Conference on (pp. 1010-1015). IEEE. |
|
1158 |
|
Pavani, K., & Avula, D. (2012). Performance of Mobile Adhoc Networks in Presence of Attacks. International Proceedings of Computer Science and Information Technology, 56, 147. |
|
1159 |
|
Bhosle, A. A., Thosar, T. P., & Mehatre, S. (2012). Black-hole and wormhole attack in routing protocol AODV in MANET. International Journal of Computer Science, Engineering and Applications, 2(1), 45. |
|
1160 |
|
Singh, G., Kumar, N., & Verma, A. K. (2012). Ant colony algorithms in MANETs: A review. Journal of Network and Computer Applications, 35(6), 1964-1972. |
|
1161 |
|
Bharathi, C. R., & Shanthi, V. (2012). An effective system for acute spotting aberration in the speech of abnormal children via artificial neural network and genetic algorithm. American Journal of Applied Sciences, 9(10), 1561. |
|
1162 |
|
Gupta, R., & Satsangi, C. S. (2012). An efficient range partitioning method for finding frequent patterns from huge database. International Journal of Advanced Computer Research, 2(2), 62-69. |
|
1163 |
|
S. Patil, A. Patil and A. Kumar, “Implemented Encryption Scheme Using Even (10’s and 2’s) Complement with Binary Addition Approach”, International Journal of Information Technology and Knowledge Management, 5(1), pp. 65-67, 2012. |
|
1164 |
|
Swain, G., & Lenka, S. K. (2012). A Novel Approach to RGB Channel Based Image Steganography Technique. Int. Arab J. e-Technol., 2(4), 181-186. |
|
1165 |
|
Swain, G., & Lenka, S. K. (2012). LSB array based image steganography technique by exploring the four least significant bits. In Global Trends in Information Systems and Software Applications (pp. 479-488). Springer Berlin Heidelberg. |
|
1166 |
|
Hassan, W. A., & Rahman, T. A. (2012). A Spectrum Sharing Model for Compatibility between IMT-Advanced and Digital Broadcasting. TIIS, 6(9), 2073-2085. |
|
1167 |
|
A. Ranjan, R. S. Murthy and R. P. Kumar, “A Review of Secure SMS Based M-Commerce”, International Journal of Engineering Sciences & Emerging Technologies, 1(2), pp: 1-7, 2012. |
|
1168 |
|
W. Barkouti, S. Oueslati and A. Cherif, “PCM Encoding and a Spread Spectrum Modulation in the Watermarking System”, The Online Journal on Computer Science and Information Technology (OJCSIT), 2(1), pp. 111-114, January, 2012. |
|
1169 |
|
G. Swain and S. K. Lenka, “Application Of A Large Key Cipher In Image Steganography By Exploring The Darkest And Brightest Pixels”, International Journal of Computer Science and Communication, 3(1), pp. 49-53, January-June 2012. |
|
1170 |
|
Tyagi, A., & Sharma, S. (2012). Implementation Of ROCK Clustering Algorithm For The Optimization Of Query Searching Time. International Journal on Computer Science and Engineering, 4(5), 809. |
|
1171 |
|
S. R. Jathe and D. M. Dakhane, “Indicators for Detecting Sinkhole Attack in MANET”, International Journal of Emerging Technology and Advanced Engineering, 2(1), pp. 369-372, January 2012. |
|
1172 |
|
D. Pendlimarri and P. B. B. Petlu, “Ancillary Resistor leads to Sparse Glitches: an Extra Approach to Avert Hacker using Syndicate Browser Design”, International Journal on Advanced Science, Engineering and Information Technology, 2 (5), pp. 57-60, 2012. |
|
1173 |
|
D. Shravani, Dr. P. S. Varma, K. V. Rao, M.U. Kumar and Dr.B.P. Rani, “Dependable Web Services Security Architecture Development Theoretical and Practical Issues – Spatial Web Services Case Study”, Natarajan Meghanathan, et al. (Eds): ITCS, SIP, JSE-2012, CS & IT 04, pp. 79–98, 2012. |
|
1174 |
|
Prof. S. K. Bandyopadhyay and S. Roy, “Detection of Sharp Contour of the element of the WBC and Segmentation of two leading elements like Nucleus and Cytoplasm”, International Journal of Engineering Research and Applications (IJERA), 2(1), pp.545-551, Jan-Feb 2012. |
|
1175 |
|
D. Vishwakarma, Prof. S. Maheshwari and Prof. S. Joshi, “Efficient Information Hiding Technique Using Steganography”, International Journal of Emerging Technology and Advanced Engineering, 2(1), pp. 154-159 January 2012. |
|
1176 |
|
N. Kaur, H. Kaur and S. P. Ahuja, “Inter-Intra Fairness Schedular for Resource Management in Grid Environment”, International Journal of Advanced Research in Computer Science and Software Engineering, 2(1), January 2012. |
|
1177 |
|
A. Ranjan, R. S. Murthy and R. P. Kumar, “A Review of Secure SMS Based M-Commerce”, International Journal of Engineering Sciences & Emerging Technologies, 1(2), pp: 1-7, 2012. |
|
1178 |
|
R. R. Chavan, Sabnees and Manoj , “Secured mobile messaging”, in Proceedings of Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference, Nagercoil, Tamil Nadu, India, 21-22 March 2012, pp. 1036 - 1043 . |
|
1179 |
|
R.H. Jhaveri, S.J.Patel, and D.C. Jinwala, “DoS Attacks in Mobile Ad Hoc Networks: A Survey”, in Proceedings of Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference , Rohtak, Haryana, 7-8 Jan. 2012, pp. 535 – 541 |
|
1180 |
|
11. D.Devi Aruna and P.Subashini, “CCMP-AES Model with SNAuth SPMAODVRouting Potocol to Secure Link and Network Layer for Mobile Adhoc Networks in Military Scenario”, International Journal of Engineering and Advanced Technology (IJEAT), 1(4), pp. 230-236, 2012 |
|
1181 |
|
A. K. Rai and R. R. Tewari, “A Secure Framework for Integrated MANET-Internet Communication”, in Proceedings of the National Academy of Sciences, India, 2012. |
|
1182 |
|
M. Kumar, A. Bhushan and Amit Kumar, “A Study of wireless Ad-Hoc Network attack and Routing”, International Journal of Advanced Research in Computer Science and Software Engineering, 2(4), pp. 30-33, 2012. |
|
1183 |
|
Jeongmingyu , and Kim Jae-kyung . (2012) . Intelligent audience emotions determine models for personalized exhibition service implementation. Intelligence and Information Systems, 18 (1) , 39-57. |
|
1184 |
|
Pal, U., Jayadevan, R., & Sharma, N. (2012). Handwriting recognition in indian regional scripts: a survey of offline techniques. ACM Transactions on Asian Language Information Processing (TALIP), 11(1), 1. |
|
1185 |
|
Ingle, V. A. (2012, December). Processing of unstructured data for information extraction. In Engineering (NUiCONE), 2012 Nirma University International Conference on (pp. 1-4). IEEE. |
|
1186 |
|
Chaudhary, A., Kolhe, S., & Kamal, R. (2012, September). Machine learning techniques for Mobile Intelligent Systems: A study. In 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN). |
|
1187 |
|
Bahaidara, A. S. (2012). Algorithem and Programme for Computation of Forces Acting on Line Supports. International Journal of Computer Science and Security (IJCSS), 6(1), 53. |
|
1188 |
|
GETACHEW, W. application of case-based reasoning for anxiety disorder diagnosis. |
|
1189 |
|
Mguni, K., & Ayalew, Y. (2012, September). Improving maintainability of COTS based system using Aspect Oriented Programming: An empirical evaluation. In Sofware Engineering and Applied Computing (ACSEAC), 2012 African Conference on (pp. 21-28). IEEE. |
|
1190 |
|
Oliveira, R. R. D. (2012). Avaliação de manutenibilidade entre as abordagens de web services RESTful e SOAP-WSDL (Doctoral dissertation, Universidade de São Paulo). |
|
1191 |
|
Lalnunsanga, M. (2012). An Introduction to a Meta-meta-search Engine. |
|
1192 |
|
Kumar, A. V., Jeyapal, A., & Gowda, R. (2012). FPGA implementation of enhanced ABR protocol with auto defense towards malicious node in MANETs. Internal Security, 4(2), 139. |
|
1193 |
|
Grebenik, V. V., & Abraham, P. (2012). U.S. Patent No. 8,255,419. Washington, DC: U.S. Patent and Trademark Office. |
|
1194 |
|
Vinay, A., & Saxena, P. (2012). Inter and Intra Cluster Load Balancing Strategies for Cluster Based Video-on-Demand Systems. In Global Trends in Computing and Communication Systems (pp. 772-781). Springer Berlin Heidelberg. |
|
1195 |
|
Gimgeunhyeong , and yunsanghun . (2012) . Impact Factors and services by type comparative analysis of the SNS user satisfaction. Internet e-commerce Research , 12 ( 1), 125-143. |
|
1196 |
|
The Swiss Zhai ( 2012 ) from the community , virtual community to the social network : . Changes in social theory of Lanzhou University ( Social Science Edition ), 40 (5), 51r56. |
|
1197 |
|
Yaghmaei , F. , & Shiraz. (2012 ) . Review system based on user interest Hospital Information System to Use Diffusion of Innovation in Razi hospital . Health Management , 14 ( 46 ) , 11-20. |
|
1198 |
|
Alguliev, R. M., Aliguliyev, R. M., & Isazade, N. R. (2012). DESAMC+ DocSum: Differential evolution with self-adaptive mutation and crossover parameters for multi-document summarization. Knowledge-Based Systems, 36, 21-38. |
|
1199 |
|
Alguliev, R. M., Aliguliyev, R. M., & Hajirahimova, M. S. (2012). GenDocSum+ MCLR: Generic document summarization based on maximum coverage and less redundancy. Expert Systems with Applications, 39(16), 12460-12473. |
|
1200 |
|
Mannes, E., Nogueira, M., & Santos, A. (2012, October). Reliable operational services in MANETs by misbehavior-tolerant quorum systems. In Proceedings of the 8th International Conference on Network and Service Management (pp. 343-349). International Federation for Information Processing. |
|
1201 |
|
Ananthi, S., & Anjanadevi, A. (2012). Reversible Image Data Hiding Using Predictive Coding Technique Based on Steganograpic Scheme. International Journal of Engineering and Innovative Technology (IJEIT) Volume, 2. |
|
1202 |
|
Ogilvie, R., & Weir, G. R. (2012). Genre-based information hiding. In Global Security, Safety and Sustainability & e-Democracy (pp. 104-111). Springer Berlin Heidelberg. |
|
1203 |
|
Wong, R. K. (2012, June). The Economics of Content Optimization Services. In Services Economics (SE), 2012 IEEE First International Conference on (pp. 9-15). IEEE. |
|
1204 |
|
Agarwal, A., Hamza-Lup, G. L., & Khoshgoftaar, T. M. (2012). A System-Level Modeling Methodology for Performance-Driven Component Selection in Multicore Architectures. Systems Journal, IEEE, 6(2), 317-328. |
|
1205 |
|
Nazir, S., Khan, M. A., Anwar, S., Khan, H., & Nazir, M. (2012, May). A novel fuzzy logic based software component selection modeling. In Information Science and Applications (ICISA), 2012 International Conference on (pp. 1-6). IEEE. |
|
1206 |
|
Pauline, M., Aruna, P., & Shadaksharappa, B. (2012). Fuzzy-Based Approach Using Enhanced Function Point to Evaluate the Performance of Software Project. IUP Journal of Computer Sciences, 6(2), 20. |
|
1207 |
|
KUMAR, M. S. R., & SivaSubramanian, S. An Approach towards Developing an Efficient Software Cost Estimation System Using Fuzzy and Analogy Methods. |
|
1208 |
|
Pauline, M., Aruna, P., & Shadaksharappa, B. an enhanced model to estimate effort, performance and cost of the software projects. |
|
1209 |
|
Nimbhorkar, S. U., & Malik, L. G. (2012). A survey on Elliptic curve cryptography (ECC). International Journal of Advanced Studies in Computers, Science and Engineering, 1(1), 1. |
|
1210 |
|
Shukla, D., Verma, K., & Gangele, S. (2012). Iso-Failure in Web Browsing using Markov chain model and curve fitting analysis. International journal of modern engineering research (IJMER), 2(02), 512-517. |
|
1211 |
|
Shukla, D., Verma, K., & Gangele, S. (2012). Curve Fitting Approximation In Internet Traffic Distribution In Computer Network In Two Market Environment. International Journal of Computer Science and Information Security, 10(4), 71. |
|
1212 |
|
Shukla, D., Verma, K., & Gangele, S. (2012). Least square curve fitting applications under rest state environment in internet traffic sharing in computer network. International Journal of Computer Science and Telecommunications (IJCST), 3(05), 43-51. |
|
1213 |
|
Alghazzawi, D. M. (2012). A Novel Password based Multi Party Key Agreement Protocol on Elliptic Curve. International Journal of Computer Science & Information Technology, 4(1), 75-81. |
|
1214 |
|
Swain, G., & Lenka, S. K. (2012). A better RGB channel based image steganography technique. In Global Trends in Information Systems and Software Applications (pp. 470-478). Springer Berlin Heidelberg. |
|
1215 |
|
Tayel, M., Shawky, H., & Hafez, A. E. D. S. (2012, February). A new chaos steganography algorithm for hiding multimedia data. In Advanced Communication Technology (ICACT), 2012 14th International Conference on (pp. 208-212). IEEE. |
|
1216 |
|
Banu, S. S., & Dhanasekaran, R. (2012). A New Residual Energy Based Multipath Routing Approach for Wireless Sensor Networks. |
|
1217 |
|
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012). Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168-187. |
|
1218 |
|
Bhattacharyya, S., & Sanyal, G. (2012). A robust image steganography using dwt difference modulation (dwtdm). International Journal of Computer Network and Information Security (IJCNIS), 4(7), 27. |
|
1219 |
|
Mandal, P. C. (2012). Modern Steganographic technique: A survey. International Journal of Computer Science & Engineering Technology (IJCSET), 3(9), 444-448. |
|
1220 |
|
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012). A Comparison between using SIFT and SURF for characteristic region based image steganography. International Journal of Computer Science Issues, 9(33-3), 110-116. |
|
1221 |
|
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. (2012, April). Characteristic region based image steganography using Speeded-Up Robust Features technique. In Future Communication Networks (ICFCN), 2012 International Conference on (pp. 141-146). IEEE. |
|
1222 |
|
Barukab, O. M., Khan, A. I., Shaik, M. S., Murthy, M. R., & Khan, S. A. (2012). Secure Communication Using Symmetric and Asymmetric Cryptographic Techniques. International Journal of Information Engineering and Electronic Business (IJIEEB), 4(2), 36. |
|
1223 |
|
Anitha, M. P., & Sivanandham, S. N. (2012). An efficient neural network based algorithm for detecting steganography content in corporate mails: A web based steganalysis. IJCSI International journal of computer science issues, 9(3). |
|
1224 |
|
Sonaniya, A. K., & Rai, R. K. (2012). A Review on Comparison between Different Image Steganography Methods. |
|
1225 |
|
Hamid, N., Yahya, A., Ahmad, B., Al-Qershi, O. M., Najim, D., & Kanaan, L. (2012). Enhancing the Robustness of Digital Image Steganography Using ECC and Redundancy. |
|
1226 |
|
Kaur, A., & Kaur, B. Secure The Secret Information In An Image Using K-MM In Steganography. |
|
1227 |
|
Dalvi, A., & Kamathe, R. S. Color Image Steganography by Using Dual Wavelet Transform (DWT, SWT). |
|
1228 |
|
Ranjan, A., Rajashekara Murthy, S., & Kumar, R. (2012). AReview OF secure sms based MCommerce. |
|
1229 |
|
Murali, G., Redddy, C. A. P. K., Swetha, G. V. N., & Kumar, P. B. (2012). End to End Security for Mobile Application. Wireless Communication, 4(5), 253-256. |
|
1230 |
|
MIGWI, G. M. (2012). Framework for securing mobile money transfer services (Doctoral dissertation, KCA University). |
|
1231 |
|
Das, D. D. (2012). Strange Number System: An Enhancing Tool for Data Encryption and Decryption. International Journal of Advanced Research in Computer Science, 3(2). |
|
1232 |
|
Chavan, R. R., & Sabnees, M. (2012, March). Secured mobile messaging. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 1036-1043). IEEE. |
|
1233 |
|
Saxena, S., & Gupta, P. C. (2012). A Novel Approach of Handwritten Devanagari Character Recognition through Feed Forward Back Propagation Neural Network. International Journal of Computer Applications, 51(20), 33-41. |
|
1234 |
|
Jadhav, N. B., Mulay, G. N., & Anuse, A. D. (2012). Recognition of Identical Shape Handwritten Devnagari Vowels. Artificial Intelligent Systems and Machine Learning, 4(5), 314-318. |
|
1235 |
|
Mantri, K. S., Ramteke, S. P., & Suralkar, S. R. (2012). Pali Character Recognition System. |
|
1236 |
|
El Zanfaly, D. S., Darwish, A., Gomaa, A. G., & Youssif, A. A. (2012, May). Heterogeneous data reduction model for payment request file of direct debit processes. In Informatics and Systems (INFOS), 2012 8th International Conference on (pp. DE-8). IEEE. |
|
1237 |
|
Kamalanathan, S., & Selvaraju, S. (2012). Collaborative Approaches for Personalized Web Search Using Fuzzy Neural Networks. In Global Trends in Information Systems and Software Applications (pp. 367-376). Springer Berlin Heidelberg. |
|
1238 |
|
Toufik, B., & Mokhtar, N. (2012). The Wavelet Transform for Image Processing Applications. INTECH Open Access Publisher. |
|
1239 |
|
Korbi, I. E., Zeadally, S., & Jumira, O. (2012, December). A chain-based relocation approach to maintain connectivity with a center of Interest. In Computational Science and Engineering (CSE), 2012 IEEE 15th International Conference on (pp. 235-242). IEEE. |
|
1240 |
|
El Korbi, I., Zidi, C., Zeadally, S., & Azouz Saidane, L. (2012, October). A novel sensor node relocation approach to maintain connectivity with a center of interest. In Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems (pp. 135-142). ACM. |
|
1241 |
|
Cunningham, T. (2012). Understanding Synthetic Speech and Language Processing of Students With and Without a Reading Disability (Doctoral dissertation). |
|
1242 |
|
Karmore, P. K., & Gaurishankar, L. G. (2012). Detection of Blackhole Attack on AODV based Mobile Ad hoc Networks using K-means Clustering Technique of Data Mining. |
|
1243 |
|
Balarengadurai, C., & Saraswathi, S. (2012, November). Detection of exhaustion attacks over IEEE 802.15. 4 MAC layer using fuzzy logic system. In Intelligent Systems Design and Applications (ISDA), 2012 12th International Conference on (pp. 527-532). IEEE. |
|
1244 |
|
Biswas, S., Dey, P., & Neogy, S. (2012, November). Trusted checkpointing based on ant colony optimization in MANET. In Emerging Applications of Information Technology (EAIT), 2012 Third International Conference on (pp. 433-438). IEEE. |
|
1245 |
|
Rai, A. K., & Tewari, R. R. (2012). A Secure Framework for Integrated MANET-Internet Communication. Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 82(3), 251-255. |
|
1246 |
|
Aruna, D. D., & Subashini, D. P. (2012). Securing Physical and network layer using SNAuth-SPMAODV with DSSS for Mobile adhoc networks in Military Scenario. International Journal of Electronics and Computer Science Engineering (IJECSE, ISSN: 2277-1956), 1(03), 1840-1849. |
|
1247 |
|
Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012, January). DoS attacks in mobile ad hoc networks: A survey. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 535-541). IEEE. |
|
1248 |
|
Sadeghi, M., & Yahya, S. (2012, July). Analysis of Wormhole attack on MANETs using different MANET routing protocols. In Ubiquitous and Future Networks (ICUFN), 2012 Fourth International Conference on (pp. 301-305). IEEE. |
|
1249 |
|
Indirani, G., & Selvakumar, K. (2012). Swarm based Intrusion Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks. International Journal of Computer Applications (0975–8887), 50(19), 1-7. |
|
1250 |
|
Kumar, M., & Kumar, A. B. A. (2012). A study of wireless Ad-hoc Network attack and routing Protocol attack. International Journal of Advanced Research in Computer Science and Software Engineering ISSN, 2277. |
|
1251 |
|
Grochocki, D., Huh, J. H., Berthier, R., Bobba, R., Sanders, W. H., Cardenas, A., & Jetcheva, J. G. (2012, November). AMI threats, intrusion detection requirements and deployment recommendations. In Smart Grid Communications (SmartGridComm), 2012 IEEE Third International Conference on (pp. 395-400). IEEE. |
|
1252 |
|
Banerjee, S., & Majumder, K. (2012). A comparative study on wormhole attack prevention schemes in mobile ad-hoc network. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 372-384). Springer Berlin Heidelberg. |
|
1253 |
|
Patel, M. C., & Kuche, A. J. (2012). Different Attacks in MANET. International Journal of Managment, IT and Engineering, 2(9), 394-406. |
|
1254 |
|
Mirzaei, A., & Mohammadi, S. (2012). Use of Honeypots along with IDS in Cluster-Based MANETs. American Journal of Scientific Research, (80), 155-163. |
|
1255 |
|
Banerjee, S., & Majumder, K. (2012). A survey of blackhole attacks and countermeasures in wireless mobile ad-hoc networks. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 396-407). Springer Berlin Heidelberg. |
|
1256 |
|
Jathe, S. R., & Dakhane, D. M. (2012). Indicators for Detecting Sinkhole Attack in MANET. International Journal of Emerging Technology and Advanced Engineering, 2, 2250-2459. |
|
1257 |
|
Kaur, E. H., Pooja, E., & Gupta, O. P. (2012). International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net. |
|
1258 |
|
Sharma, E. S., & Singh, E. T. (2012). An Efficient Intrusion Detection System for Routing Attacks in Manets: An Analytical Report. NETWORKS, 19(20), 21. |
|
1259 |
|
Aruna, D. D., & Subashini, P. (2012). CCMP-AES Model with SNAuth-SPMAODV Routing Potocol to Secure Link and Network Layer for Mobile Adhoc Networks in Military Scenario. International Journal of Engineering and Advanced Technology (IJEAT) ISSN, 2249-8958. |
|
1260 |
|
Jayanand, A., & Jebarajan, T. (2012). Improved Multi-Path Secured Routing Protocol. Networking and Communication Engineering, 4(13), 787-792. |
|
1261 |
|
Sharma, E. S., & Singh, E. T. P. (2012). Distance Vector Routing Algorithm for Detection and Correction of Grey & Black Hole Attack by Implementing IDS. |
|
1262 |
|
Pendlimarri, D., & Petlu, P. B. B. (2012). Ancillary Resistor leads to Sparse Glitches: an Extra Approach to Avert Hacker using Syndicate Browser Design. International Journal on Advanced Science, Engineering and Information Technology, 2(5), 57-60. |
|
1263 |
|
Mewada, V. B., & Borisagar, V. modified dsr for mitigating blackhole impact in manet. |
|
1264 |
|
Sharma, k., & singla, p. a survey on various security attacks in manet. |
|
1265 |
|
Patheja, P. S., Waoo, A. A., & Sharma, R. (2012). Comparison of Efficient and Rand Index Fitness Function for Clustering Gene Expression Data. In Advances in Computer Science and Information Technology. Computer Science and Information Technology (pp. 160-167). Springer Berlin Heidelberg. |
|
1266 |
|
Mata Moya, D. A. D. L. (2012). Diseño de detectores robustos en aplicaciones radar. |
|
1267 |
|
Thilagavathi, K., & Rajeswari, P. G. (2012). Efficiency and Effectiveness Analysis over ECC-Based Direct and Indirect Authentication Protocols: An Extensive Comparative Study. ICTACT Journal on Communication Technology, 3(1), 515-524. |
|
1268 |
|
Shravani, D., Varma, P. S., Rao, K. V., Rani, B. P., & Kumar, M. U. (2012). dependable web services security architecture development theoretical and practical issues–spatial web services case study. |
|
1269 |
|
Thepade, D. S. D., Parekh, D., Shah, J., Shah, B., & Vora, P. (2012). Classification of Fingerprint using KMCG Algorithm. International Journal of Science and Technology Research, 1(6). |
|
1270 |
|
Soliman, H. H., Hikal, N. A., & Sakr, N. A. (2012). A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. Egyptian Informatics Journal, 13(3), 225-238. |
|
1271 |
|
Fernandes, R., Li, B., Vadakkeveedu, K., Verma, A., Gustafson, P., & Hwang, J. (2012, May). Agent-based analysis of trustworthiness in wireless sensor networks. In SPIE Defense, Security, and Sensing (pp. 84070W-84070W). International Society for Optics and Photonics. |
|
1272 |
|
Kotenko, I., & Chechulin, A. (2012). Attack modeling and security evaluation in SIEM systems. International Transactions on Systems Science and Applications, 8, 129-147. |
|
1273 |
|
Dey, N., Roy, A. B., & Dey, S. (2012). A novel approach of color image hiding using RGB color planes and DWT. arXiv preprint arXiv:1208.0803. |
|
1274 |
|
Rubab, S., & Younus, M. (2012). Improved image steganography technique for colored images using wavelet transform. image, 100, 512x512. |
|
1275 |
|
Raftari, N., & Moghadam, A. M. E. (2012, May). Digital image steganography based on integer wavelet transform and assignment algorithm. In Modelling Symposium (AMS), 2012 Sixth Asia (pp. 87-92). IEEE. |
|
1276 |
|
Chanu, Y. J., Singh, K. M., & Tuithung, T. (2012). Image steganography and steganalysis: A survey. International Journal of Computer Applications, 52(2). |
|
1277 |
|
Raftari, N., & Moghadam, A. M. E. (2012, July). Digital Image Steganography Based on Assignment Algorithm and Combination of DCT-IWT. In Computational Intelligence, Communication Systems and Networks (CICSyN), 2012 Fourth International Conference on (pp. 295-300). IEEE. |
|
1278 |
|
Vongurai, N., & Phimoltares, S. (2012, September). Frequency-Based Steganography Using 32x32 Interpolated Quantization Table and Discrete Cosine Transform. In Computational Intelligence, Modelling and Simulation (CIMSiM), 2012 Fourth International Conference on (pp. 249-253). IEEE. |
|
1279 |
|
Masoumi, M., & Amiri, S. (2012). A High Capacity Digital Watermarking Scheme for Copyright protection of Video Data based on YCbCr Color Channels Invariant to Geometric and Non-Geometric Attacks. International Journal of Computer Applications, 51(13), 0975-8887. |
|
1280 |
|
Nithyanandam, P., Ravichandran, T., Priyadharshini, E., & Santron, N. M. (2012). An image steganography for colour images using lossless compression technique. International Journal of Computational Science and Engineering, 7(3), 194-205. |
|
1281 |
|
Goel, M. K., & Jain, N. (2012). A RSA-DWT Based Visual Cryptographic Steganogrphy Technique. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 1(2), pp-95. |
|
1282 |
|
Pandian, N., & Thangavel, R. (2012). Gray Coded Grayscale Image Steganoraphy using Hufman Encoding. International Journal of Image Processing (IJIP), 6(5), 334. |
|
1283 |
|
Satyavathy, G., & Punithavalli, M. (2012). Distinct Steganographic Approach for 4D-DCT Combined with RSA and HAAR-DWT for Safe Delivery of Text and Images without Distortion. European Journal of Scientific Research, 91(4), 555-562. |
|
1284 |
|
Zan, M. M., & Aye, N. A Modified High Capacity Colored Image Steganography in RGB Color Space. |
|
1285 |
|
Vishwakarma, D., Maheshwari, S., & Joshi, S. Efficient Information Hiding Technique Using Steganography. |
|
1286 |
|
Cauvery, N. K. Empirical Computation Of Rs-Analysis For Building Robust Steganography Using Integer Wavelet Transform And Genetic Algorithm. |
|
1287 |
|
Kumar, D., & Anand, B. Evaluation of RS-Analysis Proficiency by Genetic Algorithm for Robust Steganography using IWT. |
|
1288 |
|
Rasheed, Z. A. S. Comparative Study for Steganography Techniques. |
|
1289 |
|
Gezehagn, G. E. (2012). Afaan Oromo Text Retrieval System. |
|
1290 |
|
Arai, K., & Sentinuwo, S. R. (2012). Spontaneous-braking and lane-changing effect on traffic congestion using cellular automata model applied to the two-lane traffic. IJACSA) International Journal of Advanced Computer Science and Applications, 3(8). |
|
1291 |
|
Huang, W., Wang, X., Li, J., & Jin, Z. (2012). A Novel Feature Extraction Method based on Collaborative Representation for Face Recognition. International Journal of Pattern Recognition and Artificial Intelligence, 1556004. |
|
1292 |
|
MUGO, E. A. K. (2012). A Model to Measure Information Security Awareness (Doctoral dissertation, Strathmore University). |
|
1293 |
|
Yasin, S., Haseeb, K., & Qureshi, R. J. (2012). Cryptography based e-commerce security: a review. International Journal of Computer Science Issues, 9(2), 132-137. |
|
1294 |
|
Opoku, S. K. (2012). A Robust Cryptographic System using Neighborhood-Generated Keys. arXiv preprint arXiv:1209.2738. |
|
1295 |
|
Abbadi, L. (2012). Multi-factor Authentication Techniques for Video Applications over the Untrusted Internet (Doctoral dissertation, University Of Ottawa). |
|
1296 |
|
Idrizi, F., & Ninka, I. (2012). Some potential challenges during the implementation of security models for electronic transactions. International Journal of Science, Innovation & New Technology. |
|
1297 |
|
ANT, L. B. U. F. B. (2012). International Journal of Engineering & Science Research. |
|
1298 |
|
Sivaprasad, A., & Jangale, S. (2012, March). A complete study on tools & techniques for digital forensic analysis. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 881-886). IEEE. |
|
1299 |
|
Al-Fedaghi, S., & Al-Babtain, B. (2012). Modeling the forensics process. Int. J. Security Appl, 6(4). |
|
1300 |
|
Adams, R. (2012). The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice (Doctoral dissertation, Murdoch University). |
|
1301 |
|
Knight, G. (2012). The forensic curator: Digital forensics as a solution to addressing the curatorial challenges posed by personal digital archives. International Journal of Digital Curation, 7(2), 40-63. |
|
1302 |
|
Jawale, N. (2012). Locating and extracting digital evidence from hosted virtual desktop infrastructures: cloud context (Doctoral dissertation, Auckland University of Technology). |
|
1303 |
|
Susaimanickam, R. (2012). A workflow to support forensic database analysis (Doctoral dissertation, Murdoch University). |
|
1304 |
|
Kumar, K., Sofat, S., Aggarwal, N., & Jain, S. K. (2012). Identification of User Ownership in Digital Forensic using Data Mining Technique. International Journal of Computer Applications, 50(4), 1-5. |
|
1305 |
|
Lee, K., & Boddington, M. R. (2012). A Workflow to Support Forensic Database Analysis. |
|
1306 |
|
Hanson, S. Computer Forensics: Investigations of the Future. |
|
1307 |
|
Roger, A. E., & Achille, M. M. Article: Multi-perspective Cybercrime Investigation Process Modeling}. International Journal of Applied, 2, 14-20. |
|
1308 |
|
Rajagopal, R., & Chitra, M. (2012, July). Trust based interoperability security protocol for grid and Cloud computing. In Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on (pp. 1-5). IEEE. |
|
1309 |
|
Maruthanayagam, D., & Rani, R. U. (2012). International Journal of Engineering & Science Research. |
|
1310 |
|
Nimako, G., Otoo, E. J., & Ohene-Kwofie, D. (2012, October). Cache-sensitive MapReduce DGEMM algorithms for shared memory architectures. In Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference (pp. 100-110). ACM. |
|
1311 |
|
Dash, T., & Nayak, T. (2012). Chain Multiplication of Dense Matrices: Proposing a Shared Memory based Parallel Algorithm. Matrix, 10, 16. |
|
1312 |
|
Ismail, M. A., Altaf, T., & Mirza, S. H. Parallel Matrix Multiplication on Multi-Core Processors using SPC 3 PM. |
|
1313 |
|
Zirra, P. B., Wajiga, G. M., & Boukari, S. (2012). Generating Ciphertext Using Systems of Equations: An Asymmetric Key Approach. Int. J. Pure Appl. Sci. Technol, 8(2), 47-53. |
|
1314 |
|
Bandyopadhyay, S. K., & Roy, S. (2012). Detection of sharp contour of the element of the WBC and segmentation of two leading elements like nucleus and cytoplasm. Int J Eng Res Appl (IJERA), 2(1), 545-551. |
|
1315 |
|
Crysdian, C., & Abdullah, A. H. (2012). The Application of Multi Gradient Operators to Enhance Watershed Transform for Generic Medical Segmentation. Journal of Next Generation Information Technology, 3(4). |
|
1316 |
|
Ghate, D. A., & Jadhav, C. (2012). Automatic Detection of Malaria Parasite from Blood Images. International Journal of Computer Science & Applications (TIJCSA), 1(3). |
|
1317 |
|
Wahyuningrum, R. T., & Indrawan, A. K. (2012). a hybrid automatic method for parasite detection and identification of plasmodium falciparum in thin blood images. International Journal of Academic Research, 4(6). |
|
1318 |
|
Tuomela, M. J. 1. Tietoturvallisuuden mittaaminen. |
|
1319 |
|
Rebolledo, M. D. Optimización de la ruta de cumplimiento de un estándar de Seguridad de la Información. |
|
1320 |
|
Chitla, A., & Mohan, M. C. (2012). Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC). International Journal of Computer Applications, 57(6). |
|
1321 |
|
Rashed, A. N. Z. (2012). International Journal of Engineering & Science Research. |
|
1322 |
|
Vongurai, N., & Phimoltares, S. (2012, September). Frequency-Based Steganography Using 32x32 Interpolated Quantization Table and Discrete Cosine Transform. In Computational Intelligence, Modelling and Simulation (CIMSiM), 2012 Fourth International Conference on (pp. 249-253). IEEE. |
|
1323 |
|
Nithyanandam, P., & Ravichandran, T. (2012). Geometrical Rotation Addressed Steganography Technique using Matrix Embedding and Huffman Encoding. European Journal of Scientific Research, 87(1), 31-45. |
|
1324 |
|
Pandian, N., & Thangavel, R. (2012). Gray Coded Grayscale Image Steganoraphy using Hufman Encoding. International Journal of Image Processing (IJIP), 6(5), 334. |
|
1325 |
|
Pourahmad, S., Azad, M., Paydar, S., & Reza, H. (2012). Prediction of malignancy in suspected thyroid tumour patients by three different methods of classification in data mining. In First International Conference on advanced information technologies and applications (pp. 1-8). |
|
1326 |
|
Kaleeswari, N., & Baskaran, K. (2012). Secure Energy Efficient Multipath Routing Scheme for Data Gathering in WSNs. European Journal of Scientific Research, 91(4), 505-514. |
|
1327 |
|
Jain, P., Trivedi, V. K., & LNCT, B. (2012). A Novel Technique for Data Hiding in Audio by Using DWTs. International Journal of Computational Engineering and Management, 15(4), 2230-7893. |
|
1328 |
|
Nadaf, R., & Desai, V. (2012). Hardware Implementation of Modified AES with Key Dependent Dynamic S-Box. IEEE ICARET. |
|
1329 |
|
Al-Dallah, R. A., Al-Anani, A. M., Al-Khalid, R. I., & Massadeh, S. A. (2012). An Efficient technique for data hiding in audio signals. American Academic & Scholarly Research Journal, 4(5), 1. |
|
1330 |
|
Chouhan, K., & Ravi, S. Hardware Implementation of Polarization Encryption (EP) Based Data Security in Network. |
|
1331 |
|
Tamimi, S. Performance Evaluation of Computational Models Based FEM. |
|
1332 |
|
Uzunov, A. V., Fernandez, E. B., & Falkner, K. (2012). Engineering Security into Distributed Systems: A Survey of Methodologies. J. UCS, 18(20), 2920-3006. |
|
1333 |
|
Wenerstrom, B., Ragade, R., & Kantardzic, M. (2012).ReClose Fuzz: Improved Automatic Summary Generation using Fuzzy Sets. ICSIIT 2012, 8. |
|
1334 |
|
Mittal, H., Sharma, M., & Mittal, J. P. (2012, January). Analysis and modelling of websites quality using fuzzy technique. In 2012 Second International Conference on Advanced Computing & Communication Technologies (pp. 10-15). IEEE. |
|
1335 |
|
Al-Jamimi, H. A., & Ahmed, M. (2012, June). Prediction of software maintainability using fuzzy logic. In Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on (pp. 702-705). IEEE. |
|
1336 |
|
Azath, H., & Wahidabanu, R. S. D. (2012). Efficient effort estimation system viz. function points and quality assurance coverage. Software, IET, 6(4), 335-341. |
|
1337 |
|
Harchay, a., cheniti-belcadhi, l., & braham, r. (2012, june). Towards a formal description of mobile personalized assessment. In communications and information technology (iccit), 2012 international conference on (pp. 270-275). Ieee. |
|
1338 |
|
Harchay, a., cheniti-belcadhi, l., & braham, r. (2012, june). A model driven infrastructure for context-awareness mobile assessment personalization. In trust, security and privacy in computing and communications (trustcom), 2012 ieee 11th international conference on (pp. 1676-1683). Ieee. |
|
1339 |
|
Pereira, F. J. R., de Alcântara Correia, A., da Silva, C. C., Neto, E. D. A. L., & de Moraes, R. M. (2012). Condições de Acesso às Pessoas com Deficiência em Instituições de Ensino Enfermagem: Utilização de Redes Neurais Artificiais como Suporte à Decisão. Revista Brasileira de Ciências da Saúde, 16(2), 143-148. |
|
1340 |
|
Thapar, S. S., Singh, P., & Rani, S. (2012). Challenges to Development of Standard Software Quality Model. International Journal of Computer Applications, 49(10). |
|
1341 |
|
ANT, L. B. U. F. B. (2012).International Journal of Engineering & Science Research. |
|
1342 |
|
Sampath, S., Nanjesh, B. R., & Pramod, H. B. (2012). Evaluation of Parallel Application's Performance Dependency on RAM using Parallel Virtual Machine. International Journal of Computer Science & Communication Networks, 2(6), 641. |
|
1343 |
|
Mandal, P. C. (2012). Modern Steganographic technique: A survey. International Journal of Computer Science & Engineering Technology (IJCSET), 3(9), 444-448. |
|
1344 |
|
Rao, D. S., & Parihar, P. S. Embedding Approach of Audio Data in RGB Images Using Circle Equation. |
|
1345 |
|
Goel, M., & Chaudhari, m. secured data hiding by using extended visual cryptography. |
|
1346 |
|
Singh, S., Gill, N., & Kaur, G. Identical Frames Based Video Steganography. |
|
1347 |
|
Goel, M., & Chaudhari, M. M. A Novel Approach for Data Hiding by integrating Steganography & Extended Visual Cryptography. |
|
1348 |
|
Hamza, Y. A. Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet Transform. |
|
1349 |
|
Hamid, N., Yahya, A., Ahmad, B., Al-Qershi, O. M., Najim, D., & Kanaan, L. (2012). Enhancing the Robustness of Digital Image Steganography Using ECC and Redundancy. |
|
1350 |
|
Shyamala, G., Jeya, I. J. S., & Revathi, M. Secure and Reliable Watermarking in Relational Databases. |
|
1351 |
|
Subha, M., & Vanithaasri, S. (2012). A study on authenticated admittance of ATM Clients using biometrics based cryptosystem. International Journal of Advances in Engineering & Technology, 4(2), 456-463. |
|
1352 |
|
Babatunde, I. G., Charles, A. O., & Olatubosun, O. (2012). A Block Processing Approach to Fingerprint Ridge-Orientation Estimation. Computer Technology and Application, 3(6). |
|
1353 |
|
Babatunde, I. G., Charles, A. O., & Olatunbosun, O. A Mathematical Modeling Method for Fingerprint Ridge Segmentation and Normalization. |
|
1354 |
|
Akinyokun, o. c. strategy for software knowledge incubation and skill development for nigerian students. |
|
1355 |
|
Iwasokun, G. B., Akinyokun, O. C., & Dehinbo, O. J. Minutiae Inter-Distance Measure for Fingerprint Matching. |
|
1356 |
|
Pradhan, M. P., & Ghose, M. K. (2012). automatic techniques for identification of minutiae’s in morphology study of terrain. European Scientific Journal, 8(16). |
|
1357 |
|
Bhele, S. G., & Mankar, V. H. (2012). A review paper on face recognition techniques. International Journal of Advanced Research in Computer Engineering & Technology, 1(8), 339-346. |
|
1358 |
|
Jung, M. K., & Kim, J. K. (2012). The Intelligent Determination Model of Audience Emotion for Implementing Personalized Exhibition. Journal of Intelligence and Information Systems, 18(1), 39-57. |
|
1359 |
|
Das, A. (2012, December). Face recognition in reduced Eigen-plane. In Communications, Devices and Intelligent Systems (CODIS), 2012 International Conference on (pp. 620-623). IEEE. |
|
1360 |
|
Jeongmingyu, and Kim Jae-kyung. (2012). Intelligent audience feeling judged models for personalized exhibition service implementation. Intelligence and Information Systems, 18 (1), 39-57. |
|
1361 |
|
Javaid, A. Y., Sun, W., Devabhaktuni, V. K., & Alam, M. (2012, November). Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 585-590). IEEE. |
|
1362 |
|
Hsu, C. L., & Lu, C. F. (2012). A security and privacy preserving e-prescription system based on smart cards. Journal of medical systems, 36(6), 3637-3647. |
|
1363 |
|
Aboud, S., & Yousef, S. (2012). a practical proxy signature scheme. International Journal of Digital Information and Wireless Communications (IJDIWC), 2(4), 27-36. |
|
1364 |
|
Philosophiae, d. (2012). mlungisi sizwe duma (doctoral dissertation, university of johannesburg). |
|
1365 |
|
Lernatovych, DA, & Kondratenko, Y. (2012). Identification by image element comparisons. Artificial Intelligence. |
|
1366 |
|
Tanner, A., Dampier, D., & Thompson, J. (2012, November). On developing a conceptual modeling report management tool for digital forensic investigations. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 445-450). IEEE. |
|
1367 |
|
Al-Fedaghi, S., & Al-Babtain, B. (2012). Modeling the forensics process. Int. J. Security Appl, 6(4). |
|
1368 |
|
Buang, M. F. M., & Daud, S. M. (2012, May). A web-based KM system for digital forensics-knowledge sharing capability. In Multimedia Computing and Systems (ICMCS), 2012 International Conference on (pp. 528-533). IEEE. |
|
1369 |
|
Weiner, M. D., Puniello, O. T., Noland, R. B., Ciemnecki, D., & Turakhia, C. (2012). Consider the non-adopter: Developing a prediction model for the adoption of household-level broadband access. Socio-economic planning sciences, 46(3), 183-193. |
|
1370 |
|
Ayinde, L. O., & Echchabi, A. (2012). Perception and adoption of Islamic insurance in Malaysia: An empirical study. World Applied Sciences Journal, 20(3), 407-415. |
|
1371 |
|
Gimgeunhyeong, & yunsanghun. (2012). Comparative Analysis of Impact Factors and services by type of SNS user satisfaction. Internet e-commerce study, 12 (1), 125-143. |
|
1372 |
|
Zhai The Swiss (2012) from communities, virtual communities to social networks: Changes of social theory Lanzhou University: Social Sciences, 40 (5), 7-7. |
|
1373 |
|
Yatigammana, M. R. K. N., Johar, M. G. M., & Gunawardhana, c. postgraduate students’perceived e learning acceptance: framework of extended technology acceptance model. |
|
1374 |
|
Haigh, C., & Costa, C. (2012). Reconsidering the role of participatory media in nursing research and knowledge dissemination. Journal of Research in Nursing, 17(6), 598-607. |
|
1375 |
|
Yaghmaei, F., & Shirazi, M. (2012). Assessment of Users’ Intention to Use Hospital Information Systems Based on Diffusion of Innovation Theory in Razi Hospital of Ahvaz. Journal of Health Administration, 14(46), 11-20. |
|
1376 |
|
Liu, Y. (2012). Knowledge, Persuasion, and Decision: Examining Predictors of Microblogging’s Diffusion in China. |
|
1377 |
|
HONG, C. W. (2012). factors affecting undergraduates’involvement in entrepreneurial activities through online social networks (malaysia context) (doctoral dissertation, universiti tunku abdul rahman). |
|
1378 |
|
Banmeke, T. O. A., & Oose, M. O. (2012). Assessment of the Use of Social Network Tools (SNTs) by Agriculture Researchers in South West Nigeria. Communications of the IIMA, 12(3), 35. |
|
1379 |
|
Beech, G. M. (2012). Risk-based Aviation Security Diffusion and Acceptance (Doctoral dissertation, Monterey, California. Naval Postgraduate School). |
|
1380 |
|
Jindrichovská, I., & Purcarea, I. diffusion of innovation through social networks: example of social innovations. |
|
1381 |
|
Yun, S. H., Kim, K. H., & Oh, S. R. (2012). Structure Modeling on Factors Influencing the User Satisfaction of Social Network Services by Mediating the Moderator of the Service Types in SNS. The Journal of Information Systems, 21(3), 23-44. |
|
1382 |
|
Yaghmaei, F., & Shiraz. (2012). Studying the tendency of users to use these systems, hospital information system based on innovation diffusion model Razi hospital. Health Management, 14 (46), 11-20. |
|
1383 |
|
Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012, January). DoS attacks in mobile ad hoc networks: A survey. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 535-541). IEEE. |
|
1384 |
|
Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012, January). A novel approach for grayhole and blackhole attacks in mobile ad hoc networks. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 556-560). IEEE. |
|
1385 |
|
Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1-12. |
|
1386 |
|
Shin, S. Y., & Halim, E. H. (2012, October). Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation. In ICT Convergence (ICTC), 2012 International Conference on (pp. 781-786). IEEE. |
|
1387 |
|
Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in aodv based manets. In Advances in Communication, Network, and Computing (pp. 60-67). Springer Berlin Heidelberg. |
|
1388 |
|
Jhaveri, R. H., Patel, A. D., & Dangarwala, K. J. (2012, December). Comprehensive study of various DoS attacks and defense approaches in MANETs. In Emerging Trends in Science, Engineering and Technology (INCOSET), 2012 International Conference on (pp. 25-31). IEEE. |
|
1389 |
|
Kartheesn, L., & Srivatsa, S. K. (2012). A policy based scheme for combined data security in mobile ad hoc networks. Journal of Computer Science, 8(8), 1397. |
|
1390 |
|
Tiwari, A., & Verma, N. A Novel Scheme for Intrusion Detection & Anticipation of Black Hole & Gray Hole Attacks In AODV Based MANET using ZED. |
|
1391 |
|
Aarti, P. R. Nav view search. |
|
1392 |
|
Ahangari, S., Modiri, N., & Zadeh, A. K. (2012). A New Hybrid Model Security Management in Wireless Networks. International Proceedings of Computer Science and Information Technology, 57, 30. |
|
1393 |
|
Bhatnagar, R., & Shankar, U. (2012). The proposal of hybrid intrusion detection for defence of sync flood attack in wireless sensor network. International Journal of Computer Science & Engineering Survey, 3(2), 31-38. |
|
1394 |
|
Ahrabi, A. A. A., Feyzi, K., Orang, Z. A., Bahrbegi, H., Safarzadeh, E., Azimi, A., & Ahrabi, A. (2012). Using Learning Vector Quantization in Alert Management of Intrusion Detection System. International Journal of Computer Science and Security, 6(2), 128. |
|
1395 |
|
Bhatti, D. G., Virparia, P. V., & Patel, B. (2012). Conceptual Framework for Soft Computing based Intrusion Detection to Reduce False Positive Rate. International Journal of Computer Applications, 44(13), 1-3. |
|
1396 |
|
Orang, Z. A., Moradpour, E., Navin, A. H., Ahrabim, A. A. A., & Mirnia, M. K. (2012). Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems. International Journal of Computer Network and Information Security (IJCNIS), 4(11), 32. |
|
1397 |
|
Kane, A. M. (2012). On the use of continued fractions for mutual authentication. International Journal of Information Security Science, 1(3), 88-99. |
|
1398 |
|
Tanil, Ç. (2012, March). Improved heuristic and evolutionary methods for tactical missile mission planning. In Aerospace Conference, 2012 IEEE (pp. 1-8). IEEE. |
|
1399 |
|
Pathania, S., & Saini, J. S. Development of a New Class of Cost Effective and Fault Tolerant Multi Stage Interconnection Network for Parallel Computing System. |
|
1400 |
|
Behdad, M., Barone, L., Bennamoun, M., & French, T. (2012). Nature-inspired techniques in the context of fraud detection. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 42(6), 1273-1290. |
|
1401 |
|
Mostafavi, M. A., Moghanjoughi, A. A., & Mousavi, H. (2012). A Review and Performance Analysis of Reactive and Proactive Routing Protocols on MANET. Network and Communication Technologies, 1(2), 48. |
|
1402 |
|
Guo, J., Han, C., Orlik, P., Zhang, J., & Ishibashi, K. (2012). Loop-free routing in low-power and lossy networks. In SENSORCOMM 2012, The Sixth International Conference on Sensor Technologies and Applications (pp. 59-66). |
|
1403 |
|
Ramassamy, C., Fouchal, H., & Hunel, P. (2012, August). Impact of transmission range in 802.15. 4 with usual routing protocols. In Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International (pp. 728-733). IEEE. |
|
1404 |
|
Nayyar, A. (2012, January). Simulation Based Evaluation of Reactive Routing Protocol for MANET. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 561-568). IEEE. |
|
1405 |
|
Ramassamy, C., Fouchal, H., & Hunel, P. (2012, June). Impact of Application Layer over Wireless Sensor Networks. In IICS (pp. 130-141). |
|
1406 |
|
Tirkey, N. U., Nitin, N., Agrawal, N., & Jaiswal, A. K. (2012, October). Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization. In International Journal of Engineering Research and Technology (Vol. 1, No. 8 (October-2012)). ESRSA Publications. |
|
1407 |
|
Parthiban, S., Amuthan, A., Shanmugam, N., & Joseph, K. S. (2012). NEIGHBOR ATTACK AND DETECTION MECHANISM IN MOBILE AD-HOC NETWORKS. Advanced Computing, 3(2), 57. |
|
1408 |
|
Al-Hujailan, H., Al-Rodhaan, M., & Al-Dhelaan, A. (2012). A Cooperative Intrusion Respond for Clustered MANETs. Journal of Information Assurance & Security, 7(2). |
|
1409 |
|
Kumar, N., & Kim, J. (2012). Performance Analysis of Zone Based Routing by Varying Radius of Zone Using Ant Colony in MANET. In Information Technology Convergence, Secure and Trust Computing, and Data Management (pp. 215-223). Springer Netherlands. |
|
1410 |
|
Kavitha, G., & Sundararajan, J. (2012). An Intelligent Routing Protocol for MANETs using Radial Basis Function Neural Network. European Journal of Scientific Research, 89(3), 342-349. |
|
1411 |
|
Lin, D., & Meng, X. (2012). Optimization and Realization of Ad Hoc On-Demand Distance Vector Routing Based on NS2. In Information Computing and Applications (pp. 531-537). Springer Berlin Heidelberg. |
|
1412 |
|
Zade, A. V., & Shandilya, V. K. (2012). Network Simulation Based Parametric Analysis of AODV Protocol for Wireless Mobile Ad-hoc Network. International Journal of Managment, IT and Engineering, 2(6), 280-290. |
|
1413 |
|
Njeh, F., & Yang, B. (2012, January). A SECURE CLOUD-ENABLED WIRELESS SENSOR NETWORK PLATFORM. In Proceedings of the International Conference on Grid Computing and Applications (GCA) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp). |
|
1414 |
|
Ramassamy, C. (2012). Analyse des protocoles des Réseaux de capteurs sans-fil (Doctoral dissertation, Université de Paris 13). |
|
1415 |
|
Anh, N. T. L., Kim, Y. C., & Lee, G. S. (2012, February). Morphological gradient applied to new active contour model for color image segmentation. In Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication (p. 21). ACM. |
|
1416 |
|
García-Gonzalo, E., & Fernández-Martínez, J. L. (2012). A brief historical review of particle swarm optimization (PSO). Journal of Bioinformatics and Intelligent Control, 1(1), 3-16. |
|
1417 |
|
Malik, R. F., Rahman, T. A., Ngah, R., Mohd, S. Z., & Hashim, H. (2012). The new multipoint relays selection in OLSR using particle swarm optimization. TELKOMNIKA (Telecommunication Computing Electronics and Control), 10(2), 343-352. |
|
1418 |
|
Ismail, A., & Engelbrecht, A. P. (2012). Self-adaptive particle swarm optimization. In Simulated Evolution and Learning (pp. 228-237). Springer Berlin Heidelberg. |
|
1419 |
|
Uma, S. M., Gandhi, K. R., Kirubakaran, E., & Kirubakaran, E. (2012). A hybrid PSO with dynamic inertia weight and GA approach for discovering classification rule in data mining. International Journal of Computer Applications, 40(17). |
|
1420 |
|
Yavari, S., Zoej, M. J. V., Mokhtarzade, M., & Mohammadzadeh, A. (2012). Comparison of Particle Swarm Optimization and Genetic Algorithm in Rational Function Model Optimization. International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 39, B1. |
|
1421 |
|
Chen, R. M., Wang, C. T., Wang, C. T., & Hsu, C. C. (2012, December). An exploration and exploitation search control scheme for permutation flow shop problem. In Computing and Convergence Technology (ICCCT), 2012 7th International Conference on (pp. 1298-1303). IEEE. |
|
1422 |
|
Babu, K. R., & Sunitha, K. V. N. (2012). Image de-noising and enhancement for salt and pepper noise using improved median filter-morphological operations. In Advances in Communication, Network, and Computing (pp. 7-14). Springer Berlin Heidelberg. |
|
1423 |
|
Karthikeyan, T., & Geetha, J. (2012). A Study and Critical Survey on Service Reusability Metrics. International Journal of Information Technology and Computer Science (IJITCS), 4(5), 25.El-Sayed, A., & ElHelw, M. (2012, June). Distributed component-based framework for unmanned air vehicle systems. In Information and Automation (ICIA), 2012 International |
|
1424 |
|
Trivedi, P., & Kumar, R. (2012). Software metrics to estimate software quality using software component reusability. IJCSI International Journal of Computer Science Issues, 9(2). |
|
1425 |
|
Basha, T. G., Prasad, M. G., & Sridevi, P. V. (2012). Beam forming in smart antenna with improved gain and suppressed interference using genetic algorithm. Central European Journal of Computer Science, 2(1), 33-46. |
|
1426 |
|
Kisku, B., & Datta, R. (2012, December). An energy efficient scheduling scheme for intrusion detection system in mobile ad-hoc networks. In Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on (pp. 1-6). IEEE. |
|
1427 |
|
Singh, O., & Singh, J. (2012). Comparative Study of Various Distributed Intrusion Detection Systems for WLAN. |
|
1428 |
|
Srinivasan, S., & Alampalayam, S. P. (2012). Intrusion Detection Algorithm for MANET. Privacy Solutions and Security Frameworks in Information Protection, 163. |
|
1429 |
|
Sathya, R., & Latha, P. (2012). An Effective Security Approach for MANET using Detection Algorithm. Wireless Communication, 4(12), 702-707. |
|
1430 |
|
Kundu, A., Kundu, T. K., & Mukhopadhyay, I. Survey on Intrusion Detection and Prevention System: A MANET Perspective. |
|
1431 |
|
Jung, B. K., Wang, W., Li, Z., Son, S. H., & Kim, J. Y. (2012, October). A sectorized object matching approach for breast magnetic resonance image similarity study. In Proceedings of the 2012 ACM Research in Applied Computation Symposium (pp. 172-175). ACM. |
|
1432 |
|
Dhanalakshmi, M., Sriraam, N., Ramya, G., Bhargavi, N., & Tamizhtennagaarasi, V. (2012). Computer aided diagnosis for enteric lesions in endoscopic images using anfis. International Journal of Wisdom Based Computing, 2(1). |
|
1433 |
|
Rahman, M. (2012). Any File Encryption by Translating ASCII Value of Characters. International Journal of Advanced Research in Computer Science, 3(2). |
|
1434 |
|
EL-ARABY, W. S. M. S. (2012). Video Watermarking Implementation Based on fpga (doctoral dissertation, arab academy for science). |
|
1435 |
|
Masum, M. R. (2012). Any File Encryption by Translating ASCII Value of Characters. International Journal of Advanced Research in Computer Science, 3(2). |
|
1436 |
|
ABEBAYEHU, S. (2012). Amharic-English Script Identification in Real-Life Document Images (Doctoral dissertation, aau). |
|
1437 |
|
Boon, L. K., Chein, T. S., & Yittjia, C. user acceptance of bancassurance in malaysia. |
|
1438 |
|
Božic, T., & Relja, R. (2012). The new culture of communication via mobile phones among young people. Kultura, (136), 85-107. |
|
1439 |
|
Lacey, T. H., Mills, R. F., Mullins, B. E., Raines, R. A., Oxley, M. E., & Rogers, S. K. (2012). RIPsec–Using reputation-based multilayer security to protect MANETs. computers & security, 31(1), 122-136. |
|
1440 |
|
Ochola, E. O., Eloff, M. M., & van der Poll, J. A. (2012). Mobile Ad-hoc Network Security Challenges under AODV Routing Protocol. In International Network Conference (INC 2012) (pp. 113-122). |
|
1441 |
|
Sharma, P. K. EXTENDED DYNAMIC SOURCE ROUTING PROTOCOL FOR AD HOC NETWORK. Indian Journal of Computer Science and Engineering (IJCSE) ISSN, 0976-5166. |
|
1442 |
|
Khari, M. (2012). Mobile ad hoc netwoks security attacks and secured routing protocols: A survey. In Advances in Computer Science and Information Technology. Networks and Communications (pp. 119-124). Springer Berlin Heidelberg. |
|
1443 |
|
Shiral, J. V., & Mahajan, B. N. (2012). A Review on-Comparative Study of Issues in Cellular, Sensor and Adhoc Networks. CCSEA, SEA, CLOUD, DKMP, CS & IT, 5, 199-205. |
|
1444 |
|
Mpofu, P. G. Towards More Realistic Encryption Systems for Wireless Mobile Ad Hoc Networks. |
|
1445 |
|
Andrews, C., & Kakon, J. F. (2012). Impacts and Minimization of Interference in Adhoc Network (Doctoral dissertation, East West University). |
|
1446 |
|
Shiral, J. V. A Comparative Study on Cellular, Sensor and Adhoc Networks. |
|
1447 |
|
Sachdeva, m., sharma, a., & spiet, s. impact of wormhole on adhoc routing protocol. |
|
1448 |
|
Raju, R., Devakumaran, K., Balasubramanian, A., & Balan, G. (2012). A composite model that overwhelms outliers to anticipate the stages in renal disorder. Computer Science & Engineering, 2(3), 1. |
|
1449 |
|
Fook, C. Y., Hariharan, M., Yaacob, S., & Ah, A. (2012, March). Malay speech recognition in normal and noise condition. In Signal Processing and its Applications (CSPA), 2012 IEEE 8th International Colloquium on (pp. 409-412). IEEE. |
|
1450 |
|
Han, G., Jiang, J., Shu, L., Xu, Y., & Wang, F. (2012). Localization algorithms of underwater wireless sensor networks: A survey. Sensors, 12(2), 2026-2061. |
|
1451 |
|
Kebkal, O., Kebkal, K., & Bannasch, R. (2012, May). Long-baseline Hydro-acoustic positioning using D-MAC communication protocol. In oceans, 2012-Yeosu (pp. 1-7). IEEE. |
|
1452 |
|
Wang, S., & Hu, H. (2012). Wireless sensor networks for underwater localization: A survey. School of Computer Science and Electronic Engineering, University of Essex, Tech. Rep. |
|
1453 |
|
Debont, M., Jamshaid, K., Shihada, B., & Ho, P. H. (2012, August). Event localization in underwater wireless sensor networks using Monitoring Courses. In Communications in China (ICCC), 2012 1st IEEE International Conference on (pp. 769-774). IEEE. |
|
1454 |
|
Li Zuopeng , Caishao Bin , Zhang Jing , high Zhenguo , & Zhao Jing . ( 2012 ) . Survey of underwater acoustic sensor network node localization . Computer Systems , 33 ( 3 ) , 442-447. |
|
1455 |
|
Bucure?ti, U. P., & si Calculatoare, F. D. A. A Practical Analysis of Intrusion Detection Techniques on a Linux Environment. |
|
1456 |
|
Ruse, L. C. A Practical Analysis of Intrusion Detection Techniques on a Linux Environment. |
|
1457 |
|
Awodele, O., Onuiri, E. E., & Okolie, S. O. Vulnerabilities in Network Infrastructures and Prevention/Containment Measures. |
|
1458 |
|
Swain, G., & Lenka, S. K. (2012). A Technique for secret communication using a new block cipher with dynamic steganography. International Journal of Security and Its Applications, 6(2), 1-12. |
|
1459 |
|
Pradhan, A., Sharma, D. S., & Swain, G. (2012). Variable rate steganography in digital images using two, three and four neighbor pixels. Indian Journal of Computer Science and Engineering, 3(3), 457-63. |
|
1460 |
|
Swain, G., & Lanka, S. K. (2012). A quick review of network security and steganography. International Journal of Electronics and Computer Science Engineering, 1(2), 426-435. |
|
1461 |
|
Swain, G., & Lenka, S. K. (2012). Application of a large key cipher in image steganography by exploring the darkest and brightest pixels. Int J Comput Sci Comm, 3(1), 49-53. |
|
1462 |
|
Sonaniya, A. K., & Rai, R. K. (2012). A Review on Comparison between Different Image Steganography Methods. |
|
1463 |
|
Arndt, D. J. (2012). An Investigation of Using Machine Learning with Distribution Based Flow Features for Classifying SSL Encrypted Network Traffic. |
|
1464 |
|
Wangjian Ling, Li Wenbin, & Jia Chunsheng. (2012). Based on Data Mining acupuncture and moxibustion literature data warehouse building. Acupuncture study, 37 (1), 67-71. |
|
1465 |
|
Nayak, K., Deccaraman, M., & Nayak, V. (2012). Formulating a Mathematical Model for the E-Nose Application through Genetic Algorithm (GA). International Journal of Computer Applications, 51(1), 7-13. |
|
1466 |
|
Kumar, K. D., & Kumar, K. P. (2012). Performance Evolutions of All Positive and Negative Association Rules. |
|
1467 |
|
Poornamala, K., & Lawrance, R. a general survey on frequent pattern mining using genetic algorithm. |
|
1468 |
|
Poornamala, K., & Lawrance, R. (2012). A Frequent Pattern Tree Algorithm for Mining Association Rule Using Genetic Algorithm. Data Mining and Knowledge Engineering, 4(7), 357-360. |
|
1469 |
|
Kellner, A. (2012). A Multi-objective Ant Colony Optimisation-based Routing Approach for Wireless Sensor Networks Incorporating Trust (Doctoral dissertation, Niedersächsische Staats-und Universitätsbibliothek Göttingen). |
|
1470 |
|
Mukherjee, D., & Acharyya, S. (2012, November). ACO variants in solving Mobile Ad hoc Network routing. In Emerging Applications of Information Technology (EAIT), 2012 Third International Conference on (pp. 366-371). IEEE. |
|
1471 |
|
Bhattacherjee, V., & Giri, D. (2012). a swarm inspired multipath data transmission with congestion control in manets using probabilistic approach. international journal of wireless & mobile networks, 4(4), 109. |
|
1472 |
|
Joardar, S., Bhattacherjee, V., & Giri, D. (2012). A swarm inspired probabilistic path selection with congestion control in MANETs. In Advances in Computer Science, Engineering & Applications (pp. 617-626). Springer Berlin Heidelberg. |
|
1473 |
|
Baboo, S. S., & Narasimhan, B. (2012). Genetic Algorithm Based Congestion Aware Routing Protocol (GA-CARP) for Mobile Ad Hoc Networks. Procedia Technology, 4, 177-181. |
|
1474 |
|
Wankhade, S. B., & Ali, M. S. (2012). Recent trends in ANT based routing protocols for MANET. International Journal of Advances in Engineering & Technology,, ISSN, 2231-1963. |
|
1475 |
|
Sensarma, D., & Majumder, K. (2012). A Comparative Analysis of the Ant Based Systems for QoS Routing in MANET. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 485-496). Springer Berlin Heidelberg. |
|
1476 |
|
Brown, S., Lam, R., Prasad, S., Ramasubramanian, S., & Slauson, J. (2012). Honeypots in the cloud. University of Wisconsin-Madison. |
|
1477 |
|
Zhang Quan . ( 2012 ) . In the network behavior to PSO + K-means of detection mechanism botnets . The dissertation cause Datong University Department of Business Administration , 1-69. |
|
1478 |
|
Shukla, D., Verma, K., & Gangele, S. (2012). Least Square based Curve Fitting in Internet Access Traffic Sharing in Two Operator Environment. International Journal of Computer Applications, 43(12), 26-32. |
|
1479 |
|
Shukla, D., Verma, K., & Gangele, S. (2012). Curve Fitting Approximation In Internet Traffic Distribution In Computer Network In Two Market Environment. International Journal of Computer Science and Information Security, 10(4), 71. |
|
1480 |
|
Stergiou, E., & Garofalakis, J. (2012). Performance estimation of banyan semi layer networks with drop resolution mechanism. Journal of Network and Computer Applications, 35(1), 287-294. |
|
1481 |
|
Khalatbari, A., Jenab, K., Laskarzewska, B., Mehrvar, M., Goel, A., Mishra, R. S., ... & Lan, H. Ibrahim salem saeh, A. Khairuddin. Anesthesiology, 12. |
|
1482 |
|
Priyadarsini, S. (2012). TSRD-RL algorithm based Secured Route Discovery for MANET with improved Route Lifetime. International Journal of Electronics and Electrical Engineering, 1(1), 52-67. |
|
1483 |
|
Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2012). Energy efficient administrator based secure routing in MANET. In Advances in Computer Science, Engineering & Applications (pp. 659-672). Springer Berlin Heidelberg. |
|
1484 |
|
Dadhania, P., & Patel, S. (2012). Comparative performance analysis of AODV and DSR routing protocols in MANET. |
|
1485 |
|
Vinod, B. (2012). Responding to an Attack in Sensor Networks (Doctoral dissertation, Oklahoma State University). |
|
1486 |
|
Munjal, K., Verma, S., & Bakshi, A. (2012). Cooperative black hole node detection by modifying AODV. Int. J. Manag. IT Eng.(IJMIE), 2, 484-501. |
|
1487 |
|
Min, S. G., Park, Y. H., Park, Y. H., & Moon, S. J. (2012). Secure routing protocol in cluster-based ad hoc networks. The Journal of Korean Institute of Communications and Information Sciences, 37(12), 1256-1262. |
|
1488 |
|
Sathya, R., & Latha, P. (2012). An Effective Security Approach for MANET using Detection Algorithm. Wireless Communication, 4(12), 702-707. |
|
1489 |
|
Pal, A., & Choudhury, P. (2012). Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph. Mapana-Journal of Sciences, 11(4), 65-76. |
|
1490 |
|
Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2012). A Novel Energy Efficient and Administrator Based Secured Routing in MANET. International Journal of Network Security & Its Applications, 4(4), 73. |
|
1491 |
|
Sathiyakumar, C., & Duraiswamy, K. (2012). A Secured Key Model for Efficient Node Clustering Based on Reputation and Ranking Model. European Journal of Scientific Research, 74(3), 433-439. |
|
1492 |
|
KALOKI, M. P. (2012). SCHOOL OF COMPUTING AND INFORMATICS MASTERS DEGREE OF SCIENCE IN COMPUTER SCIENCE (Doctoral dissertation, The University of Nairobi). |
|
1493 |
|
Minseonggeun , bakyohan , Young Ho Park , & Cryptology . (2012) . Cluster -based security in an ad hoc routing protocol in a network environment.The Journal of Korea Information and Communications Society , 37 ( 12), 1256-1262. |
|
1494 |
|
Chan, G. Y., Lee, C. S., & Heng, S. H. (2012). Policy-enhanced ANFIS model to counter SOAP-related attacks. Knowledge-Based Systems, 35, 64-76. |
|
1495 |
|
Naoum, R. S., & Al-Sultani, Z. N. (2012). Learning Vector Quantization (LVQ) and k-Nearest Neighbor for Intrusion Classification. World of Computer Science and Information Technology Journal (WCSIT), 2(3), 105-109. |
|
1496 |
|
Choi, B. H., Choi, S. K., & Cho, K. S. (2012). Anomaly Detection Scheme of Web-based attacks by applying HMM to HTTP Outbound Traffic. |
|
1497 |
|
Hameed, S. M., & Sulaiman, S. S. (2012). Intrusion Detection Using a Mixed Features Fuzzy Clustering Algorithm. Iraq Journal of Science (IJS), 53(2), 427-434. |
|
1498 |
|
Chandrashekar, A. M., & Raghuveer, K. (2012, October). Fusion of multiple data mining techniques for effective network intrusion detection: a contemporary approach. In Proceedings of the Fifth International Conference on Security of Information and Networks (pp. 178-182). ACM. |
|
1499 |
|
Dharmar, V., Parveen, M. A. R., & Bhuvaneswaran, R. S. Black Hole Detection in Adhoc Networks using Neural Networks. Dear Scholars, 29. |
|
1500 |
|
Al-Sultani, Z. N. M. A. (2012). an enhanced resilient backpropagation artificial neural network for intrusion detection system (doctoral dissertation, middle east university). |
|
1501 |
|
Kode, S. R. (2012). A relational interval tree for efficient insertion and searching of transient mobile data. |
|
1502 |
|
Mocanu, E. M., Florea, M., Andreica, M. I., & Tapus, N. (2012, March). Cloud computing—task scheduling based on genetic algorithms. In Systems Conference (SysCon), 2012 IEEE International (pp. 1-6). IEEE. |
|
1503 |
|
Delavar, A. G., Boroujeni, A. R. K., & Bayrampoor, J. (2012). A Balanced Scheduling Algorithm with Fault Tolerant and Task Migration based on Primary Static Mapping (PSM) in Grid. International Journal of Computer Applications, 52(8). |
|
1504 |
|
Singh, S. N., Thakur, A. K., & Kumar, N. (2012). International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net. development, 13, 19. |
|
1505 |
|
Gao, Y., Gu, X., Yang, Q., & Ke, H. Y. (2012). Improved Genetic Scheduling Algorithm in Heterogeneous System. Jisuanji Gongcheng/ Computer Engineering, 38(19). |
|
1506 |
|
Remmersmann, T., Schade, U., & Schlick, C. (2012, October). Supervisory control of multi-robot systems by disaggregation and scheduling of quasi-natural language commands. In Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on (pp. 315-320). IEEE. |
|
1507 |
|
Strickland, S., & Sanders, T. A Genetic Algorithm for Task Scheduling. |
|
1508 |
|
Plateau, Gu Xing, Yang Juan, & Ke Yang Ho. (2012). Heterogeneous systems improved genetic scheduling algorithm. Computer Engineering, 38 (19), 142-146. |
|
1509 |
|
Mahalle, M. S. D., & Shah, D. K. Semantic Based Approach for Document Clustering. Journal of Sci., Engg. & Tech. Mgt. Vol 4 (1), MPSTME, Mumbai. July 2012. |
|
1510 |
|
Khandare, S. S., & Malode, S. N. International Journal of Science Innovations and Discoveries An International peer. |
|
1511 |
|
Jiang, F. Deriving Topics and Opinions from Microblog. |
|
1512 |
|
Mahalle, M. S. D., & Shah, K. Document Clustering by using Semantics. |
|
1513 |
|
Gutema, G. (2012). Afaan Oromo Text Retrieval System (Doctoral dissertation, AAU). |
|
1514 |
|
Mohamed, V. Verifying ODP Computational Behavioral Specification by using B-Method. |
|
1515 |
|
Farham Mohamed, M., Lazim, Y. M., & Mohamed, S. B. Managing Multimedia Data: A Temporal-Based Approach. |
|
1516 |
|
Islam, G., & Qureshi, M. A. (2012). A Framework for Security Requirements Elicitation. |
|
1517 |
|
Alorfi, A. S. M. (2012). Web Based Online Volunteer Trainer System (OVTRS) (Doctoral dissertation, Universiti Utara Malaysia). |
|
1518 |
|
Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2011). Fidelity Index Based on Demand (FBOD) Secure Routing in Mobile Ad Hoc Network. In Advances in Parallel Distributed Computing (pp. 615-627). Springer Berlin Heidelberg. |
|
1519 |
|
Y. C. Lee, Y. Hsieh and P. Lee, “Improvement on the Password Authenticated Three-Party Key Agreement Protocol”, Journal of Computational Information Systems, 7(1), pp. 42-48, 2011 |
|
1520 |
|
D. Shikha and B.V. Dhandra, “Abnormality Detection in Endoscopic Images of Throat Cancer by Morphological Operations ”, Indian Stream Research Journal, 1(4), pp. 1-14, 2011. |
|
1521 |
|
2. R.Dhanalakshmi and Dr.C.Chellappan , “Secure Email – Ensuring CIA (Confidentiality, Integrity and Authentication) and Privacy for Organizations”, in International Conference on Environment, Economics, Energy, Devices, Systems, Communications, Computers, Mathematics, University Center Drobeta Turnu Severin, Romania, October 27-29, 2011. |
|
1522 |
|
Ms. Preetee, K. Karmore, Ms. Sonali and T. Bodkhe, “A Survey on Intrusion in Ad Hoc Networks and its Detection Measures”, International Journal on Computer Science and Engineering (IJCSE), 3 (5), pp. 1896- 1903, 2011. |
|
1523 |
|
Mrs. F. Suthar, Mrs. U. PATEL, Mrs. A. K. PATEL, “To Study, Analysis and Issues of Wireless Adhoc Network”. Journal of Information, Knowledge and Research in Computer Science and Applications, 1(2), pp. 32-37, 2011. |
|
1524 |
|
E. O. Ochola, M. M. Eloff, (2011). “A Review of Black Hole Attack on AODV Routing in MANET”, Presented at Information Security South Africa Conference, Johannesburg, South Africa, Aug. 15-17, 2011. |
|
1525 |
|
W. Lane and C. Manner, “The Impact of Personality Traits on Smartphone Ownership and Use”, International Journal of Business and Social Science, 2(17), pp.. 22-28, 2011. |
|
1526 |
|
Kawas, S. Al, (2011), “Textisms. (c2011)”. |
|
1527 |
|
A. Kumar, R. Kumar and P. S. GROVER, “Unified Cohesion Measures for Aspect-Oriented Systems”, International Journal of Software Engineering and Knowledge Engineering (IJSEKE), 21(1), pp. 143-163, 2011. |
|
1528 |
|
V. Thilagavathe and Dr. K Duraiswamy. “Cross Layer Based Congestion Control Technique for Reliable and Energy Aware Routing in MANET”. International Journal of Computer Applications 36(12) pp. 1-6, 2011. |
|
1529 |
|
1. J.C. Bansal, P.K. Singh, M. Saraswat, A. Verma, S.S. Jadon and A. Abraham, “Inertia Weight strategies in Particle Swarm Optimization”, in Nature and Biologically Inspired Computing (NaBIC), 2011 Third World Congress, Salamanca, pp. 633 – 640, 19-21 Oct. 2011. |
|
1530 |
|
K. Deep, M. Arya and J. C. Bansal, “A Non-Deterministic Adaptive Inertia Weight In PSO”, in Proceedings of the 13th Annual Conference on Genetic and Evolutionary Computation, New York, USA, 12 – 16 July. 2011. |
|
1531 |
|
R. Bansal, P. Sehgal and P. Bedi, “Minutiae Extraction from Fingerprint Images-a Review”, International Journal of Computer Science Issues (IJCSI), 8(5), pp. 74-85, Sep. 2011. |
|
1532 |
|
M. Karami, M. K. Rafsanjani, A. H. F. Navid and Y. Yavari, “QAIDS: Quantitative and Agent based Intrusion Detection System”, Computer and Information Science, 4(2), pp. 64-74, 2011. |
|
1533 |
|
Y. Singh and S. K. Jena, “Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks”, Computer Science Advances in Parallel Distributed Computing Communications in Computer and Information Science, 203(1), pp. 410-419, 2011. |
|
1534 |
|
Rajeswari, R., & Irudhayaraj, A. A. (2011). Implementation of Radial Basis Function for fMRI Registration. International Journal of Computer Theory and Engineering, 3(2), 287. |
|
1535 |
|
H. P. Tan, R. Diamant, W. K.G. Seah and M. Waldmeyer, “A Survey Of Techniques and Challenges in Underwater Localization”, Ocean Engineering 38(14–15), pp. 1663–1676, October 2011 |
|
1536 |
|
M. E. Kantarci, H.T. Mouftah and S. Oktug, “A Survey of Architectures and Localization Techniques for Underwater Acoustic Sensor Networks”, Communications Surveys & Tutorials, IEEE, 13 (3) pp. 487 – 502, 2011. |
|
1537 |
|
R. Diamant and L. Lampe, “Underwater Localization with Time-Synchronization and Propagation Speed Uncertainties”, in Positioning Navigation and Communication (WPNC), 8th Workshop, Dresden , 7-8 April 2011, pp. 100 – 105. |
|
1538 |
|
R. W. Harder and R. Darken, “A Quantitative Model for Assessing Visual Simulation Software Architecture”, Doctor Of Philosophy Thesis In Modeling, Virtual Environments, and Simulation (MOVES), Naval Postgraduate School, Monterey, California, 2011. |
|
1539 |
|
Shukla, D., Gangele, S., Verma, K., & Thakur, S. (2011). A Study on Index Based Analysis of Users of Internet Traffic Sharing in Computer Networking. World Applied Programming (WAP), 1(04), 278-287. |
|
1540 |
|
Shukla, D., Gangele, S., Verma, K., & Trivedi, M. (2011). Elasticity variation under rest state environment in case of Internet traffic sharing in computer network. International Journal of Computer Technology and Application (IJCTA), 2, 2052-2060. |
|
1541 |
|
Jalab, H. A. (2011, September). Image retrieval system based on color layout descriptor and Gabor filters. In Open Systems (ICOS), 2011 IEEE Conference on (pp. 32-36). IEEE. |
|
1542 |
|
N. Dey , A. Bardhan Roy and S. Dey, “A Novel Approach of Color Image Hiding using RGB Color planes and DWT”, International Journal of Computer Applications, 36(5), pp. 19-24, December 2011. |
|
1543 |
|
N. Dey , A. Bardhan Roy and S. Dey, “A Novel Approach of Color Image Hiding using RGB Color planes and DWT”, International Journal of Computer Applications, 36(5), pp. 19-24, December 2011. |
|
1544 |
|
4. Z.Muda, W.Yasin, M.N.Sulaiman and N.I.Udzir, “A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection” International Technology Journal, 10(3), pp. 648-656, 2011. |
|
1545 |
|
H. J. Hsu and F. J. Wang, “A Delegation Framework for Task-Role Based Access Control in WFMS”, Journal of Information Science and Engineering, 27, pp. 1011-1028, 2011. |
|
1546 |
|
P. C. Sherimon, P. V. Vinu and R. Krishnan, “Enhancing The Learning Experience In Blended Learning Systems: A Semantic Approach”, in Proceedings of the 2011 International Conference on Communication, Computing & Security, New York, USA, 2011. |
|
1547 |
|
P.V. Vinu, P.C. Sherimon and Reshmy Krishnan, “Towards Pervasive Mobile Learning – The Vision Of 21st Century”, in Proceedings Procedia - Social and Behavioral Sciences Volume 15, 3rd World Conference on Educational Sciences – 2011, pp. 3067–3073. |
|
1548 |
|
Mustare, N. B. (2011). A Study of Conservative Physiological Homeostasis and its Analysis Linked to Status of E. Coli Environment Related to Cancer Disease. |
|
1549 |
|
Basak, T. K., Ramanujam, T., Jeybalan, S., Bhatt, M., Garg, D., & Garg, R. (2011). Growth Factor Inhibiting PKC Sensor in E-coli Environment Using Classification Technique and ANN Method. Sensors & Transducers, 126(3), 125. |
|
1550 |
|
Sinnreich, A., Graham, N., & Trammell, A. (2011). Weaving a new'Net: A mesh-based solution for democratizing networked communications. The Information Society, 27(5), 336-345. |
|
1551 |
|
Mohammadi, S., & Jadidoleslamy, H. (2011). A comparison of physical attacks on wireless sensor networks. International Journal of Peer to Peer Networks, 2(2), 24-42. |
|
1552 |
|
Mohammadi, S., Atani, R. E., & Jadidoleslamy, H. (2011). A Comparison of Routing Attacks on Wireless Sensor Networks. organization, 4, 21. |
|
1553 |
|
Jebadurai, J. V. S., Melvin, A. A. R., & Jebadurai, I. J. R. (2011, April). Sinkhole detection in mobile ad-hoc networks using mutual understanding among nodes. In Electronics Computer Technology (ICECT), 2011 3rd International Conference on (Vol. 3, pp. 321-324). IEEE. |
|
1554 |
|
Jebadurai, I. J. R., & Rajsingh, E. B. (2011). A Survey on Sinkhole attack Detection methods in Mobile Ad-hoc Networks. In 3rd International Conference on Mechine Learning and Computing (Vol. 4). |
|
1555 |
|
Mohammadi, S., & Jadidoleslamy, H. (2011). A Comparison of Transport and Application Layers Attacks on Wireless Sensor Networks. organization, 4, 21. |
|
1556 |
|
Tamilarasan, S., & Reddy, M. S. (2011). A Quantitative Study and Comparison of Secure OLSR Routing Protocol. S Tamilarasan et al, Int. J. Computer Technology & Applications, 3(2), 632-638. |
|
1557 |
|
Mohammadi, S., & Jadidoleslamy, H. (2011). A comparison of link layer attacks on wireless sensor networks. arXiv preprint arXiv:1103.5589. |
|
1558 |
|
Maulik, R., & Chaki, N. (2011). A study on wormhole attacks in MANET. International Journal of Computer Information Systems and Industrial Management Applications ISSN, 2150-7988. |
|
1559 |
|
V. K. Tiwari, S. Thakur and D. Shukla, “Analysis of Internet Traffic Distribution for User Behaviour Based Probability in Two-Market Environment”, International Journal of Computer Applications, 30(8), pp. 44-51, 2011. |
|
1560 |
|
Dr. H. B. Kekre and V. Kulkarni, “Speaker Identification using Row Mean of DCT and Walsh Hadamard Transform”, International Journal on Computer Science and Engineering (IJCSE), 3(3), pp. 1295- 1301, Mar. 2011. |
|
1561 |
|
V. K. Tiwari, S. Thakur and D. Shukla. “Analysis of Internet Traffic Distribution for User Behavior based Probability in Two-Market Environment”. International Journal of Computer Applications, 29(8), pp. 44-51, 2011. |
|
1562 |
|
D. Shukla, S. Gangele?, K. Verma and M. Trivedi, “Two-Call Based Cyber Crime Elasticity Analysis of Internet Traffic Sharing in Computer Network”, International Journal of Computer Application, 2(1), pp. 27-38, 2011. |
|
1563 |
|
D. Minnie and S. Srinivasan, “Meta Search Engines for Information Retrieval on Multiple Domains”, International Journal of Technology and Engineering System, 2(2), pp. 115-118, 2011. |
|
1564 |
|
D. Minnie and S. Srinivasan, “Multi-Domain Meta Search Engine with an Intelligent Interface for Efficient Information Retrieval on the Web”, Trends in Computer Science, Engineering and Information Technology Communications in Computer and Information Science, 204(1), pp. 121-129, 2011. |
|
1565 |
|
W. Tang, J. Ni, M. Chen and X. Yang, ?Contextual Role-Based Security Enhancement Mechanism for 2G-RFID Systems?, in Proceedings, Computer Communications Workshops (INFOCOM WKSHPS), IEEE Conference, Shanghai, 10-15 April 2011, pp. 942-946. |
|
1566 |
|
W. Tang, M. Chen, J. Ni and X. Yang "Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems". Sensors, 11(7), pp. 6743-6759. 2011. |
|
1567 |
|
A. Vinay , K. G. Abhijit , M. Saifulla , D. Jayashree and T. N. Anitha, “A Comparative Analysis of Centralized and Distributed Dynamic Load Balancing Algorithms for Cluster Based Video-on-Demand Systems”, in Proceedings of the International Conference & Workshop on Emerging Trends in Technology ACM, New York, USA, 2011. |
|
1568 |
|
R. M. Alguliev, R. M. Aliguliyev and C. A. Mehdiyev, “pSum-SaDE: A Modified p-Median Problem and Self-Adaptive Differential Evolution Algorithm for Text Summarization”, Applied Computational Intelligence and Soft Computing, Vol. 2011, Article ID 351498, 13 pages, 2011. |
|
1569 |
|
R. M. Alguliev, R. M. Aliguliyev, M. S. Hajirahimova and C. A. Mehdiyev, “MCMR: Maximum Coverage and Minimum Redundant Text Summarization Model”, Expert Systems with Applications, 38(12), pp. 14514–14522, 2011. |
|
1570 |
|
K. P. David, “Decentralised Soft-Security in Distributed Systems”, Ph.D. Thesis, College of Engineering and Physical Sciences, University of Birmingham., 2011. |
|
1571 |
|
Dewang, R., & Agarwal, J. (2011). A New Method for Generating All Positive and Negative Association Rules. International Journal on Computer Science and Engineering, 3(4), 1649-1657. |
|
1572 |
|
Kumar, M. R., & Iyakutti, D. K. (2011). Application of Genetic algorithms for the prioritization of Association Rules. IJCA Special Issue on Artificial Intelligence Techniques-Novel Approaches and Practical Applications, 1-3. |
|
1573 |
|
Ravi S. Sharma, “Towards a Strategic Tool for the Business Modeling of IDM Startups - Implementing the Advisor Framework”, International Journal of Applied Engineering and Technology, 1 (1), pp.68-79, 2011. |
|
1574 |
|
X. Xie, H. Chen, Y. Wu, H. Zhang and P. Wu, “New Encryption Scheme of One-Time Pad Based on KDC”, Computer Science Intelligent Computing and Information Science Communications in Computer and Information Science, 134, pp. 51-55, 2011. |
|
1575 |
|
J. Barker, P. Hannay and P. Szewczyk, "Using Traffic Analysis to Identify the Second Generation Onion Router," in Proceedings, 9th International Conference on Embedded and Ubiquitous Computing, Melbourne, Victoria Australia, October 24- 26, 2011, pp.72-78. |
|
1576 |
|
C. McCarthy, A.N. Z. Heywood, “An Investigation on Identifying SSL Traffic”, in Proceedings Computational Intelligence for Security and Defense Applications (CISDA), 2011 IEEE Symposium , Paris, 11-15 April 2011, pp. 115-122. |
|
1577 |
|
N. Lammari , J. S. Bucumi , J. Akoka and I. C. Wattiau, “A Conceptual Meta-Model for Secured Information Systems”, in Proceedings of the 7th International Workshop on Software Engineering for Secure Systems ACM New York, NY, USA, 2011. |
|
1578 |
|
S. Kannan , S. Karthik and V.P. Arunachalam, “An Enhanced Packet Retransmission Method for Improving TCP-Aware Source Routing in Mobile Ad-Hoc Network”, Asian Journal of Information Technology, 10(1), pp. 20 – 25, 2011. |
|
1579 |
|
H. A. Hujailan, M. A. Rodhaan and A. A. Dhelaan, , “A Cooperative Intrusion Detection Scheme for Clustered Mobile Ad Hoc Networks ”, in Proceedings of Information Assurance and Security (IAS), 2011 7th International Conference , Melaka, 5-8 Dec. 2011, pp. 179-185. |
|
1580 |
|
K. Patel, T. Vasavada and M. Vegad, “Effect of Hello Message on Performance of Ad-hoc On-demand Routing Protocol”, in Proceedings of National Conference on Recent Trends in Engineering & Technology, B.V.M. Engineering College, V.V.Nagar,Gujarat,India , 13-14 May 2011. |
|
1581 |
|
S. D. Pandya and P. V. Virparia, “Context Free Data Cleaning and its Application in Mechanism for Suggestive Data Cleaning”, International Journal of Information Science, 1(1), pp. 32-35, 2011. |
|
1582 |
|
E.M. Mohamed, Y.M.Y. Hasan, H. Furukawa, “Novel Remotely Keyed Encryption Schemes for Smart Card Applications”, in Proceedings, Communications (ICC), 2011 IEEE International Conference, Kyoto, pp. 1-5, 5-9 June 2011. |
|
1583 |
|
E. Zanaj and I. Enesi, “Wireless Sensor Networks and nodes information collecting ability”, Asian Transactions on Engineering, 01(03), pp. 8-13, 2011. |
|
1584 |
|
P.Nithyanandam , T.Ravichandran , N.M.Santron and E. Priyadharshini, “A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding”, International Journal of Computer Science and Security (IJCSS), 5(5), pp. 456 – 468, 2011. |
|
1585 |
|
M. Subhedar and G. Birajdar, “Block Level Entropy Thresholding Technique for High Volume Image Adaptive Data Hiding”, International Journal on Graphics, Vision and Image Processing, 11(III), pp. 31--38, 2011. |
|
1586 |
|
F. Zhang, P. Li, Z. G. Hou, Y. Chen, F. Xu, J. Hu, Q. Li. and M. Tan, “SEMG feature extraction methods for pattern recognition of upper limbs”, in Proceedings of Advanced Mechatronic Systems (ICAMechS), 2011 International Conference , Zhengzhou, 11-13 Aug. 2011, pp. 222-227. |
|
1587 |
|
A. Singh and R. Gilhotra, “Data Security Using Private Key Encryption System Based on Arithmetic Coding”, International Journal of Network Security & Its Applications, 3(3), pp. 58-67, 2011. |
|
1588 |
|
N. Belghini, A. Zarghili, J. Kharroubi and A. Majda, , “A Color Facial Authentification System Based On Semi Supervised Backporpagation Neural Network”, in Proceedings, Multimedia Computing and Systems (ICMCS), 2011 International Conference , Ouarzazate, 7-9 April 2011, pp. 1-4. |
|
1589 |
|
A. B. Tomar and Dr.V. M. Thakare, “A Systematic Study of Software Quality Models”, International Journal of Software Engineering & Applications (IJSEA), 2(4), pp. 61-70, October 2011. |
|
1590 |
|
A. O.Bajeh, “A Novel Metric for Measuring the Readability of Software Source Code”, Journal of Emerging Trends in Computing and Information Sciences, 2(10), pp. 492-497, October 2011. |
|
1591 |
|
Z. H. Ahmed, “A Data-Guided Lexisearch Algorithm for the Bottleneck Travelling Salesman Problem”, International Journal of Operational Research, 12(1), pp. 20-33, 2011. |
|
1592 |
|
Yamini, S. (2011). Gaze-based Password Entry Systems. Networking and Communication Engineering, 3(6), 401-403. |
|
1593 |
|
Gkarafli, S., & Economides, A. A. (2011). Comparing the proof by knowledge authentication techniques. International Journal of Computer Science and Security (IJCSS), 4(2), 237-255. |
|
1594 |
|
M. Hussain, “Efficient Data Hiding Techniques with Enhanced Capacity”, Thesis For The Degree Of Master Of Sciences In Information Technology, Department Of Computer Science, Shaheed Zulfiqar Ali Bhutto Institute Of Sciences And Technology (SZABIST), July, 2011. |
|
1595 |
|
K. V. Ramana, Dr.B.R. Babu and S. C.R. Babu, “A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security”, International Journal on Computer Science and Engineering (IJCSE), 3(5), pp. 1878-1889, May 2011. |
|
1596 |
|
E. B. Harb, “A Distributed Architecture for Spam Mitigation on 4g Mobile Networks”, Thesis For Master Of Applied Science (Information Systems Security), The Concordia Institute For Information Systems Engineering (Ciise), Concordia University Montréal, Québec, Canada, September 2011. |
|
1597 |
|
AKL Ahmed, T. Gayraud and P. Berthou, “A New Wireless Architecture for In-Flight Entertainment Systems Inside Aircraft Cabin”, International Journal on Advances in Networks and Services, 4(1 & 2), pp. 159-175, 2011. |
|
1598 |
|
M. Jangid , “Devanagari Isolated Character Recognition by using Statistical features”, International Journal on Computer Science and Engineering (IJCSE), 3(6), pp. 2400-2407, June 2011. |
|
1599 |
|
M. Jangid, K. Singh, R.Dhir and R. Rani, “Performance Comparison of Devanagari Handwritten Numerals Recognition”, International Journal of Computer Applications, 22(1), pp. 1-6, May 2011. |
|
1600 |
|
S. L. S. Vadivu and M. Rajaram, “Optimization of Web Caching and Response Time in Semantic Based Multiple Web Search Engine”, European Journal of Scientific Research, 56(2), pp. 244-255, 2011. |
|
1601 |
|
H. Sukoco and K. Okamura, “Grouping Packet Scheduling for Virtual Networks by Genetic Algorithm”, inProceedings of the 6th International Conference on Future Internet Technologies ACM New York, USA, 2011. |
|
1602 |
|
M. R. Mohamed and M. H. A. Awadalla, “Hybrid Algorithm for Multiprocessor Task Scheduling”, International Journal of Computer Science Issues, 8(3), pp. 79-89, May 2011. |
|
1603 |
|
K. Muthumayil, V. Rajamani, S. Manikandan and M. Buvana, , “A Group Key Agreement Protocol Based on Stability and Power Using Elliptic Curve Cryptography”, in Proceedings of Emerging Trends in Electrical and Computer Technology (ICETECT), 2011 International Conference, Tamil Nadu, 23-24 March 2011, pp. 1051-1056. |
|
1604 |
|
Ms. P. K. Karmore and Ms. S. T. Bodkhe, “A Survey on Intrusion in Ad Hoc Networks and its Detection Measures”, International Journal on Computer Science and Engineering (IJCSE), 3(5), pp. 1896- 1903, May 2011. |
|
1605 |
|
P. K. Karmore and S. M. Nirkhi, “Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering Method of Data Mining”, International Journal of Computer Science and Information Technologies, 2 (4) , pp. 1774-1779, 2011. |
|
1606 |
|
J. Singh, A. Singh and R. Shree. “An Assessment of Frequently Adopted Unsecure Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective”. International Journal of Computer Applications 24(9), pp. 34–39, June 2011. |
|
1607 |
|
S. P. Manikandan and Dr. R. Manimegalai, “Evaluation of Intrusion Detection Algorithms for Interoperability Gateways in Ad Hoc Networks”, International Journal on Computer Science and Engineering (IJCSE), 3(9), pp. 3243-3249, September 2011. |
|
1608 |
|
R. Khan and A. K. Vatsa, “Detection and Control of DDOS Attacks over Reputation and Score Based MANET”, Journal of Emerging Trends in Computing and Information Sciences, 2(11), pp. 646-655, October 2011. |
|
1609 |
|
J. Singh, A. Singh and Ms. R. Shree, “An Assessment of Frequently Adopted Security Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective”, Int Jr of Advanced Computer Engineering and Architecture, 1(1), pp. 111-120, June 2011. |
|
1610 |
|
M. AL-Bzoor , L. Almazaydeh and S. S. Rizvi , “Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks”, International Journal of Computer Science and Security (IJCSS), 5(5), pp. 443 – 455, 2011. |
|
1611 |
|
B. J. Oberer1 and A. Erkollar, “Electronic Government Services in Europe: Strategies, Projects and Applications”, African Journal of Business Management, 5(16), pp. 6991-7005, August 2011. |
|
1612 |
|
Modi, R., & Kaur, K. Thwarting from SQL Injection Attack would Secure Database Server Functions in SQL Server over the Public Network. |
|
1613 |
|
M.U. Kumar, Dr. D. S. Kumar, Dr. B. P. Rani and K. V. Rao, “Designing Dependable Agile Layered Web Services Security Architecture Solutions”, Indian Journal of Computer Science and Engineering (IJCSE), 2(3), pp. 128-436, June-July 2011. |
|
1614 |
|
H. B. Kekre and V. Kulkarni. “Automatic Speaker Recognition using Circular Sectorization of the DFT Complex Plane”, in Proceedings of International Conference and workshop on Emerging Trends in Technology (ICWET), (5), 2011, pp. 35-41. |
|
1615 |
|
G. Sladic, M. Vidakovic and Z. Konjovic, “Agent Based System for Network Availability and Vulnerability Monitoring”, in Proceedings of Intelligent Systems and Informatics (SISY), 2011 IEEE 9th International Symposium, Subotica, 8-10 Sept. 2011, pp. 53 – 58. |
|
1616 |
|
T. Harsono and K. Arai, “Deceleration in The Micro Traffic Model and Its Application to Simulation for Evacuation from Disaster Area”, in Proceedings of The 13th Industrial Electronics Seminar 2011 (IES 2011) Electronic Engineering Polytechnic Institute of Surabaya (EEPIS), Indonesia, October 26, 2011, pp. 463- 468. |
|
1617 |
|
I. O. Ademu, Dr. C. O. Imafidon and Dr D. S. Preston, “A New Approach of Digital Forensic Model for Digital Forensic Investigation”, International Journal of Advanced Computer Science and Applications (IJACSA), 2(12), pp. 175-178, 2011. |
|
1618 |
|
M. F. Saleh, “The Three Dimensions of Security”, International Journal of Security (IJS), 5(2), pp. 85 – 93, 2011. |
|
1619 |
|
P. B. B. Petlu, N. L. K. Anantapalli, D. Pendlimarri and M. M. Rao, “Novel Methodologies to Avert Hacker”, Trends in Computer Science, Engineering and Information Technology Communications in Computer and Information Science, 204(1), pp. 112-120, 2011. |
|
1620 |
|
P. K. Karmore and G. L. Girhe, “DETECTION OF BLACKHOLE ATTACK ON AODV BASED MOBILE AD HOC NETWORKS USING K-MEANS CLUSTERING TECHNIQUE OF DATA MINING”, International Journal of Research in Engineering & Applied Sciences, 2(2), pp. 464-478. |
|
1621 |
|
YungCheng, L. E. E., HSIEH, Y., & PeiJu, L. E. E. (2011). Improvement on the Password Authenticated Three-Party Key Agreement Protocol. Journal of Computational Information Systems, 7(1), 42-48. |
|
1622 |
|
Garg, S., Kahlon, K. S., & Bansal, P. K. How to Measure Coupling in AOP from UML Diagram. |
|
1623 |
|
Aramudhan, M. (2011). A Survey on Mobile Agents Based Load Balancing Based in Distributed Web Servers. Networking and Communication Engineering, 3(2), 121-127. |
|
1624 |
|
Kent, C. K., & Salim, N. (2011, December). Web Based Cross Language Semantic Plagiarism Detection. In Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on (pp. 1096-1102). IEEE. |
|
1625 |
|
Vigneswaran, P., & Dhanasekaran, D. R. (2011). A Dynamic Approach for Anomaly Detection in AODV. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol, 2. |
|
1626 |
|
Kiddie, P. D. (2011). Decentralised soft-security in distributed systems (Doctoral dissertation, University of Birmingham). |
|
1627 |
|
Sharma, R. (2011). Towards a Strategic Tool for the Business Modeling of IDM Startups-Implementing the Advisor Framework. International Journal of Applied Engineering and Technology (Online), 1(1). |
|
1628 |
|
Calvert, C., Hamza-Lup, G. L., Agarwal, A., & Alhalabi, B. (2011, April). An integrated component selection framework for system-level design. In Systems Conference (SysCon), 2011 IEEE International (pp. 261-266). IEEE. |
|
1629 |
|
Shukla, D. (2011). elasticity of internet traffic distribution in computer network in two market environment. Journal of Global Research in Computer Science, 2(6), 6-12. |
|
1630 |
|
Kumar, G., Mangla, N., & Mahajan, A. (2011). Improved Data Mining Based on Semantic Similarity to Mine New Association Rules. Data Mining and Knowledge Engineering, 3(4), 223-230. |
|
1631 |
|
Gkarafli, S., & Economides, A. A. (2011). Comparing the proof by knowledge authentication techniques. International Journal of Computer Science and Security (IJCSS), 149(2), 237. |
|
1632 |
|
Shukla, D., Gangele, S., Verma, K., & Trivedi, M. (2011). Two call based cyber-crime elasticity analysis of Internet traffic sharing in computer network. International Journal of Computer Application (IJCA), 2(1), 27-38. |
|
1633 |
|
Shukla, D. (2011). elasticity of internet traffic distribution in computer network in two market environment. Journal of Global Research in Computer Science, 2(6), 6-12. |
|
1634 |
|
Shukla, D., Gangele, S., Singhai, R., & Verma, K. (2011). Elasticity analysis of web-browsing behavior of users. International Journal of Advanced Networking And Application (IJANA), 3(3), 1162-1168. |
|
1635 |
|
Shukla, D., & Singhai, R. (2011). Analysis of user web browsing behavior using Markov chain model. International Journal of Advanced Networking And Application (IJANA), 2(5), 824-830. |
|
1636 |
|
Shukla, D., Gangele, S., Verma, K., & Thakur, S. (2011). A Study on Index Based Analysis of Users of Internet Traffic Sharing in Computer Networking. World Applied Programming (WAP), 1(04), 278-287. |
|
1637 |
|
Shukla, D., Gangele, S., Verma, K., & Trivedi, M. (2011). Elasticity variation under rest state environment in case of Internet traffic sharing in computer network. International Journal of Computer Technology and Application (IJCTA), 2, 2052-2060. |
|
1638 |
|
Tiwari, V. K., Thakur, S., & Shukla, D. (2011). Analysis of Internet Traffic Distribution for user Behavior based Probability in Two-Market Environment. International Journal of Computer Applications, 30(8). |
|
1639 |
|
Jain, S., & Ojha, S. (2011). elasticity of internet traffic distribu behaviorial study of single level tree network with the help of markov chain modeltion in computer network in two market environment. Computer Science & Telecommunications, 30(1). |
|
1640 |
|
Gkarafli, S., & Economides, A. A. (2011). Comparing the proof by knowledge authentication techniques. International Journal of Computer Science and Security (IJCSS), 149(2), 237. |
|
1641 |
|
Zhang, F., Li, P., Hou, Z. G., Chen, Y., Xu, F., Hu, J., ... & Tan, M. (2011, August). SEMG feature extraction methods for pattern recognition of upper limbs. In Advanced Mechatronic Systems (ICAMechS), 2011 International Conference on (pp. 222-227). IEEE. |
|
1642 |
|
Christaline, J. A., & Vaishali, D. (2011, June). Image steganographic techniques with improved embedding capacity and robustness. In Recent Trends in Information Technology (ICRTIT), 2011 International Conference on (pp. 97-101). IEEE. |
|
1643 |
|
Subhedar, M., & Birajdar, G. (2011). Block Level Entropy Thresholding Technique for High Volume Image Adaptive Data Hiding. ICGST-GVIP Journal, 11(3). |
|
1644 |
|
Swetha, V., Prajith, V., & Kshema, V. Data Hiding Using Video Steganography-A Survey. |
|
1645 |
|
Cauvery, N. K. Empirical Computation Of Rs-Analysis For Building Robust Steganography Using Integer Wavelet Transform And Genetic Algorithm. |
|
1646 |
|
Kumar, D., & Anand, B. Evaluation of RS-Analysis Proficiency by Genetic Algorithm for Robust Steganography using IWT. |
|
1647 |
|
Chaturvedi, P., & Bairwa, R. K. Image Steganography Method for Hiding Secret Message in Colored Images by Using IWT. |
|
1648 |
|
Vyas, A., & Mondikathi, C. international journal of engineering sciences & research technology steganography image in color image using wavelet transform. |
|
1649 |
|
Girdhar, A., & Kaur, A. Secret Image Sharing Scheme with Steganography and Authentication Based on Discrete Wavelet Transform. |
|
1650 |
|
Merritt, C. (2011). Mobile money transfer services: The next phase in the evolution of person-to-person payments. Journal of Payments Strategy & Systems, 5(2), 143-160. |
|
1651 |
|
Singh, A., & Gilhotra, R. (2011). Data security using private key encryption system based on arithmetic coding. International Journal of Network Security & Its Applications (IJNSA), 3(3), 58-67. |
|
1652 |
|
Kayande, D., & Shrawankar, U. (2011). SMS Lingo: Memory Storage Optimization Utility for Mobile Phones. In Annual Symposium. |
|
1653 |
|
Ahmed, Z. H. (2011). A data-guided lexisearch algorithm for the asymmetric traveling salesman problem. Mathematical Problems in Engineering, 2011. |
|
1654 |
|
Jayadevan, R., Kolhe, S. R., Patil, P. M., & Pal, U. (2011). Offline recognition of Devanagari script: A survey. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 41(6), 782-796. |
|
1655 |
|
Dongre, V. J., & Mankar, V. H. (2011). A review of research on Devnagari character recognition. arXiv preprint arXiv:1101.2491. |
|
1656 |
|
Singh, M. J. K., Dhir, R., & Rani, R. (2011). Performance Comparison of Devanagari Handwritten Numerals Recognition. International Journel of Computer Application (0975-8887) volume-22 No.-1. |
|
1657 |
|
Jangid, M. (2011). Devanagari isolated character recognition by using statistical features. International Journal of Computer Science and Engg, 3(2), 2400-2407. |
|
1658 |
|
Jangid, M., Dhir, R., & Rani, R. (2011). A Novel Approach: Recognition of Devanagari Handwritten Numerals. International Journal of Electrical, Electronics and Computer Science (IJEECS), ISSN, 2221-7258. |
|
1659 |
|
Manal, A. B., Almazaydeh, L., & Rizvi, S. (2011). Hierarchical coordination for data gathering (HCDG) in wireless sensor networks. International Journal of Computer Science and Security (IJCSS), 5(5), 443. |
|
1660 |
|
Rizvi, S. R., Lokesh, C., Weigle, M. C., & Olariu, S. A Next-Generation Emergency Response System for First Responders using Retasking of Wireless Sensor Networks. |
|
1661 |
|
Khan, R., & Vatsa, A. K. (2011). Detection and control of DDOS attacks over reputation and score based MANET. Journal of Emerging Trends in Computing and Information Sciences, 2(11). |
|
1662 |
|
Karmore, P. K., & Bodkhe, S. T. (2011). A survey on intrusion in ad hoc networks and its detection measures. International Journal on Computer Science and Engineering, 3(5), 1896-1903. |
|
1663 |
|
Manikandan, S. P., & Manimegalai, D. R. (2011). Evaluation of Intrusion Detection Algorithms for Interoperability Gateways in Ad Hoc Networks. International Journal on Computer Science and Engineering (IJCSE), ISSN, 0975-3397. |
|
1664 |
|
Karmore, P. K., & Nirkhi, S. M. (2011). Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering method of Data Mining. International Journal of Computer Science and Information Technologies, 2(4), 1774-1779. |
|
1665 |
|
Singh, J., Singh, A., & Shree, R. (2011). An Assessment of Frequently Adopted Unsecure Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective. International Journal of Computer Applications (0975–8887), 24(9). |
|
1666 |
|
Petlu, P. B. B., Anantapalli, N. K., Pendlimarri, D., & Rao, M. M. (2011). Novel Methodologies to Avert Hacker. In Trends in Computer Science, Engineering and Information Technology (pp. 112-120). Springer Berlin Heidelberg. |
|
1667 |
|
I ndirani, G., & Selvakumar, K. Performance of Swarm Based Intrusion Detection System Under Different Mobility Conditions in MANET. International Journal of Emerging Technology and Advanced Engineering, ISSN, 2250-2459. |
|
1668 |
|
Kumara, L., & Sharmab, V. An Overview of MANETs: Issues and Security Solutions. |
|
1669 |
|
Singh, J., Singh, A., & Shree, R. Article: An Assessment of Frequently Adopted Unsecure Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective}. International Journal, 24, 34-39. |
|
1670 |
|
Kumar, S., & Malhotra, S. A Survey on security flaws and attacks over wireless ad hoc network. |
|
1671 |
|
Chen, P. Y., & Lin, F. Y. S. Recovery and Resource Allocation Strategies to Maximize Mobile Network. |
|
1672 |
|
Juneja, V., & Rani, M. E. Survey for Optimal Solution to resolve “Big Hole Attack” in AODV. |
|
1673 |
|
Bagga, G. S., & Rai, M. K. Bandwidth Efficient Multicasting Operation in AODV Protocol for Mobile Ad-Hoc Networks. |
|
1674 |
|
Pure, R. S., Patil, G., & Hussain, M. M. Trust based solutions using counter strategies for Routing attacks in MANET. |
|
1675 |
|
Anantharaj, B., & Satheeshkumar, N. An Algorithm for Secure routed creation and Data Transfer in MANETs. |
|
1676 |
|
Yadav, Y., Kumar, S., & Saxena, V. Intrusion Detection and Classification in MANET using Network Characteristics and PNN Algorithm. |
|
1677 |
|
NaseimoDaikpor, M., & Adegbenro, O. (2011, December). Concurrent realization of the multiply-by-7 Elliptic Curve Scalar Multiplication algorithm. In Internet Technology and Secured Transactions (ICITST), 2011 International Conference for (pp. 797-804). IEEE. |
|
1678 |
|
Kekre, D. H., Kulkarni, V., Venkatraman, S., Priya, A., & Narashiman, S. (2011). Speaker Identification using Row Mean of DCT and Walsh Hadamard Transform. International Journal on Computer Science and Engineering, 3(1). |
|
1679 |
|
Kekre, H. B., & Kulkarni, V. (2011, February). Automatic speaker recognition using circular DFT sectors. In Proceedings of the International Conference & Workshop on Emerging Trends in Technology (pp. 1280-1285). ACM. |
|
1680 |
|
Kekre, H. B., & Kulkarni, V. (2011). Performance Comparison of Speaker Identification using circular DFT and WHT Sectors. International Journal of Computer Science and Information Security, 9(3), 139. |
|
1681 |
|
Alvi, A. K., & Zulkernine, M. (2011, December). A natural classification scheme for software security patterns. In Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on (pp. 113-120). IEEE. |
|
1682 |
|
Shravani, D., Varma, P. S., Rani, B. P., Kumar, M. U., & Prasad, A. K. (2011). Designing Dependable Web Services Security Architecture Solutions. In Advances in Network Security and Applications (pp. 140-149). Springer Berlin Heidelberg. |
|
1683 |
|
Shikha, d., & dhandra, b. v. abnormality detection in endoscopic images of. |
|
1684 |
|
Ilic, S. S., Lazic, L., & Spalevic, P. (2011, July). One approach to the testing of security of proposed database application software. In Proc. of the 15th WSEAS Intern. Conf. on Computers, Corfu Island, Greece (pp. 475-480). |
|
1685 |
|
LE, H. T., & LOH, P. K. K. Identification of Performance Issues in Contemporary Black-Box Web Application Scanners in SQLI. |
|
1686 |
|
Nithyanandam, P., Ravichandran, T., Santron, N. M., & Priyadarshini, E. (2011). A spatial domain image steganography technique based on matrix embedding and huffman encoding. International Journal of Computer Science and Security (IJCSS), 5(5), 456. |
|
1687 |
|
Nag, A., Singh, J. P., Khan, S., Ghosh, S., Biswas, S., Sarkar, D., & Sarkar, P. P. (2011). A Weighted Location Based LSB Image Steganography Technique. In Advances in Computing and Communications (pp. 620-627). Springer Berlin Heidelberg. |
|
1688 |
|
Tri, H., & Kohei, A. (2011). Deceleration in The Micro Traffic Model and Its Application to Simulation for Evacuation from Disaster Area. |
|
1689 |
|
Aldasouqi, I., & Awajan, A. (2011). Black Box Backup System. International Journal of Computer Science and Security (IJCSS), 5(3), 368. |
|
1690 |
|
Ismail, M. A., Mirza, S. H., & Altaf, T. (2011). A Parallel and Concurrent Implementation of Lin-Kernighan Heuristic (LKH-2) for Solving Traveling Salesman Problem for Multi-Core Processors using SPC 3 Programming Model. International Journal of Advanced Computer Science and Applications, USA, 2(6). |
|
1691 |
|
Saleh, M. F. (2011). The Three Dimensions of Security. International Journal of Security (IJS), 5(2), 85. |
|
1692 |
|
Rizvi, S. R., Lokesh, C., Weigle, M. C., & Olariu, S. A Next-Generation Emergency Response System for First Responders using Retasking of Wireless Sensor Networks. |
|
1693 |
|
Andriansyah¹, F., Baizal, Z. A., & Kurniati, A. P.Analisis peningkatan kualitas peringkasan teks menggunakan metode fuzzy dan algoritma genetika. |
|
1694 |
|
Liu, c., & h eljueidi, m. A. (2011). Towards an analysis framework to facilitate informal mobile colleborative learning with context awareness. Mobile, 19. |
|
1695 |
|
Basoglu, n., & özdogan, k. (2011). Exploring the major determinants of mobile learning adoption.bogazici university training journal, 28(1). |
|
1696 |
|
Kantore, a. (2011). User-interface evaluation metrics for a typical m-learning application. The school of information communication and technology. Nelson mandela metropolitan university.[accessed march 2013]. Available from: http://books. Google. Com. Br/books. |
|
1697 |
|
Vinu, p. V., sherimon, p. C., & krishnan, r. (2011). Towards pervasive mobile learning–the vision of 21st century. Procedia-social and behavioral sciences, 15, 3067-3073. |
|
1698 |
|
Dunne, K. J. (2011). From vicious to virtuous cycle. Translation and Localization Project Management: The Art of the Possible, 16, 153. |
|
1699 |
|
Dunne, K. I. (2011). From vicious to virtuous cycle Customer-focused translation quality management. Translation and Localization Project Management: The art of the possible, 153. |
|
1700 |
|
vardhan Dwivedi, H. (2011). Analysis and Implementation of Room Assignment Problem and Cannon's Algorithm on General Purpose Programmable Graphical Processing Units with CUDA. Analysis, 1, 1-2011. |
|
1701 |
|
Gawdan, I. S., Chow, C. O., Zia, T., & Sarhan, Q. I. (2011, September). A novel secure key management module for hierarchical clustering wireless sensor networks. In Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on (pp. 312-316). IEEE. |
|
1702 |
|
Wuzong Tao, Chen Haiyan, & Song Feng. (2011). Wireless sensor networks tufted hierarchical key management scheme design. Ship Electronic Engineering, 31 (11), 108-111. |
|
1703 |
|
Musibau, A. A., Eyinnaya, E. S., Edward, D. E., Wantrudis, M. C., & Nojeem, L. A. (2011). The implications of social networking sites in education in Nigeria. Interdisciplinary Journal of Contemporary Research in Business, 3(7), 93. |
|
1704 |
|
Johar, M. G. M., & Gunavardhana, C. Impact of Innovation Attributes and Psychological Wellbeing Towards E-Learning Acceptance of Postgraduate Students: Comparison of Sri Lanka and Malaysia. The Online Journal of Distance Education and e-Learning, 20. |
|
1705 |
|
Sehrawat, M., & Sharma, P. Review on Attacks in Mobile Ad-hoc Networks (MANET). |
|
1706 |
|
Hung, J. Y. C. (2011). Investigation of methods for increasing the energy efficiency on unmanned aerial vehicles (UAVS). |
|
1707 |
|
Zhang, J. H., Peng, H., & Shao, F. J. (2011, July). Energy consumption analysis of MANET routing protocols based on mobility models. In Fuzzy Systems and Knowledge Discovery (FSKD), 2011 Eighth International Conference on (Vol. 4, pp. 2275-2280). IEEE. |
|
1708 |
|
Jisha, G., & Samuel, P. (2011). Impact of Node Density on Node Connectivity in MANET Routing Protocols. In Advances in Computing and Communications (pp. 1-8). Springer Berlin Heidelberg. |
|
1709 |
|
Deshmukh, R. K., & Ambhaikar, A. (2011). Comparative Analysis of AODV and DSR with Reference to Mobility Models and Mobility Speed. International Journal of Advanced Research in Computer Science, 2(3). |
|
1710 |
|
Kaur, P., & Mittal, G. (2011). Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Heavy Application Traffic flow. International Journal of Advanced Research in Computer Science, 2(4). |
|
1711 |
|
Fujara, M. (2011). Methode zur rechnerunterstützten Auslegung und Optimierung der Geometrie des Vollhartmetall-Spiralbohrers. epubli. |
|
1712 |
|
Yang Gang , Kang & clean . (2011). CB Morphological Pyramid and Its Application to Image Matching information technology , ( 8 ) , 6-9. |
|
1713 |
|
Almeida, F. L. F., & Calistru, C. M. (2011). Assessing Quality Issues in Component Based Software Development. International Journal of Advanced Research in Computer Science, 2(2). |
|
1714 |
|
Xenakis, C., Panos, C., & Stavrakakis, I. (2011). A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. Computers & Security, 30(1), 63-80. |
|
1715 |
|
Manikandan, S. P., & Manimegalai, R. (2011). Evaluation of Intrusion Detection Algorithms for Interoperability Gateways in Ad Hoc Networks. International Journal on Computer Science and Engineering, 3(9), 3243. |
|
1716 |
|
Saraydayran, J., Benali, F., & Paffumi, L. (2011). A Survey on new Threats and Countermeasures on Emerging Networks. INTECH Open Access Publisher. |
|
1717 |
|
Vuppala, S., Banerjee, A., Pal, A., & Choudhury, P. (2011). An Attack Identification Scheme Using Hierarchical Data Clustering in MANET. In International Conference on Computer Engineering and Technology, 3rd (ICCET 2011). ASME Press. |
|
1718 |
|
Grbavac, s. Eliminisanje sql Injection napada–mehanizmi odbrane elimination of the sql injection attacks–defense mechanisms. |
|
1719 |
|
ALKAWAS, S. (2011). Textisms: The Pragmatic Evolution Among Students in Lebanon and Its Effect on English Essay Writing (Doctoral dissertation, LEBANESE AMERICAN UNIVERSITY). |
|
1720 |
|
Malik, A., & Kumar, S. (2011). A Review on Mobile Ad-hoc Network (MANET) Security Issues: Its Vulnerabilities and Solutions. Wireless Communication, 3(16), 1134-1137. |
|
1721 |
|
Santos, J. M. V. D. F. (2011). Desenvolvimento de uma infra-estrutura de software para suportar conceitos de eficiência energética usando sistemas móveis pró-activos. |
|
1722 |
|
Muda, Z., Yassin, W., Sulaiman, M. N., & Udzir, N. I. (2011). A K-Means and Naive Bayes learning approach for better intrusion detection. Information technology journal, 10(3), 648-655. |
|
1723 |
|
Ramana, K. V., Babu, B. R., & Babu, C. R. (2011). A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security. International Journal on Computer Science and Engineering, 3(5), 1878-1889. |
|
1724 |
|
Hussain, M. (2011). Efficient Data Hiding Techniques with Enhanced Capacity. |
|
1725 |
|
Björkkvist, P. (2011). Comparative study of metrics for IPTV transport in the access network. |
|
1726 |
|
Omara, E., El Said, T., & Mousa, M. (2011). Employing Neural Networks for Assessment of Data Quality with Emphasis on Data Completeness. ICGST International Journal on Artificial Intelligence and Machine Learning, AIML, 11(1), 21-28. |
|
1727 |
|
. Wangjian Ling, Li Wenbin, & Jia Chunsheng (2011) Design and build a data warehouse literature acupuncture and moxibustion acupuncture magazine world: English, 21 (3), 41-45. |
|
1728 |
|
Sharma, P., Karkhanawala, Y., & Kotecha, K. (2011). Bandwidth constrained routing of multimedia traffic over hybrid MANETs using ant colony optimization. International Journal of Machine Learning and Computing, 1(3), 242-246. |
|
1729 |
|
Gangele, S., & Gangele, S. Nav view search. |
|
1730 |
|
Gangele, S. An Approach for Area Estimation towards Conjunction Control of Internet Traffic Sharing by Using Simpson 1/Rule. |
|
1731 |
|
Sahni, V., Thapar, V., & Jain, B. (2011). Security Implications of Ad-hoc Routing Protocols against Wormhole Attack using Random Waypoint Mobility Model in Wireless Sensor Network. International Journal of Computer Science and Information Security, 9(11), 138. |
|
1732 |
|
Singamsetty, R. S. (2011). Detection of malicious nodes in mobile ad hoc networks (Doctoral dissertation, University of Toledo). |
|
1733 |
|
Seyyedtaj, M., & Jamali, M. A. J. Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network. International Journal of Computer Applications Technology and Research, 3(9), 541-546. |
|
1734 |
|
Magardey, A., & Arjariya, T. Secure Detection and Prevention Scheme for Jamming Attack in MANET. |
|
1735 |
|
SATHEESH, N., & PRASADH, K. (2014). TRUST BASED AD HOC ON DEMAND DISTANCE VECTOR ROUTING PROTOCOL AGAINST WORMHOLE ATTACK. Journal of Theoretical and Applied Information Technology, 70(3). |
|
1736 |
|
Guptha, A. S., & Reshma, S. Minimizing Routing Attacks in MANET Using Extended Dempster-Shefer Theory. |
|
1737 |
|
Paramasiven, A. (2011). Rendering Wormhole Attacks Trivial using the Scalability Features of a Geocasting Protocol. International Journal of Computer Applications, 19(5), 24-28. |
|
1738 |
|
RAGHU, R., & SARAVANAN, V. Classification of routing Protocol. |
|
1739 |
|
Peddi, R. D. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks. |
|
1740 |
|
Pal, K., Sofat, S., & Bansal, D. (2011). Comparison of Secure OLSR Routing Protocol. International Journal of Engineering Science and Technology, 3(6). |
|
1741 |
|
Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2011). A novel and Efficient Secured Routing Algorithm in Mobile Ad hoc Network. International Journal of Wireless & Mobile Networks, 3(5), 245. |
|
1742 |
|
Pal, K., & Bansal, D. (2011). Simulation Analysis of Secure OLSR Routing Protocol. Networking and Communication Engineering, 3(8), 532-537. |
|
1743 |
|
Anwar, Y. (2011). spectre footnotes. SURVIVAL, 6, 10. |
|
1744 |
|
Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2011). Minimized Overhead and Administrator based Secure Routing Protocol. International Journal of Computer Applications, 25(9). |
|
1745 |
|
SHARMA, K., & SINGLA, P. A SURVEY ON VARIOUS SECURITY ATTACKS IN MANET. |
|
1746 |
|
Sravani, B. S., Jagadeepak, T., Devi, B. R., & Rao, B. P. Examining the performance of AODV routing protocol under black hole attack with varied node densities and mobilities. |
|
1747 |
|
Vuppala, S., Banerjee, A., Pal, A., & Choudhury, P. (2011). An Attack Identification Scheme Using Hierarchical Data Clustering in MANET. In International Conference on Computer Engineering and Technology, 3rd (ICCET 2011). ASME Press. |
|
1748 |
|
Shendurkar, M. A. M., Chopde, N. R., & Chopde, N. R. Nav view search. |
|
1749 |
|
Yaghmaei , & F . Hospital Information System to Use willingness to study the system based on innovation diffusion model Razi hospital . Journal of Health Administration. |
|
1750 |
|
Kachurka, P., & Golovko, V. (2011, September). Neural network approach to real-time network intrusion detection and recognition. In Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2011 IEEE 6th International Conference on (Vol. 1, pp. 393-397). IEEE. |
|
1751 |
|
Kukielka, R., & KOTuLSKI, Z. (2011). Systemy wykrywania intruzów wykorzystujace metody sztucznej inteligencji. Przeglad Telekomunikacyjny+ Wiadomosci Telekomunikacyjne, (4), 114-121. |
|
1752 |
|
Alebachew, K. (2011). Designing a Hybrid Classifier for Network Intrusion Detection System (Doctoral dissertation, AAU). |
|
1753 |
|
Chauhan, A., Rani, P., & Student, M. T. A Detail Review of Routing Attacks in Mobile Ad Hoc Networks. |
|
1754 |
|
Chen, Y., Jaekel, A., & Bari, A. (2011). A new model for allocating resources to scheduled lightpath demands. Computer Networks, 55(13), 2821-2837. |
|
1755 |
|
Yesilyurt, h. adli bilisim sorusturma metotlarinin standartlastirilmasi ve etkinlik-verimlilik perspektifinde degerlendirilmesi. |
|
1756 |
|
Mohamed, F., Rahman, M. N. A., & Abdullah, M. L. (2011, November). The development of temporal-based multimedia data management application using web services. In Intelligent Systems Design and Applications (ISDA), 2011 11th International Conference on (pp. 487-492). IEEE. |
|
1757 |
|
Bhowmik, M. K., Bhattacharjee, D., Nasipuri, M., Basu, D. K., & Kundu, M. (2010). A Parallel Framework for Multilayer Perceptron for Human Face Recognition. arXiv preprint arXiv:1007.0627. |
|
1758 |
|
Awad, M., & Occupied, P. (2010). Optimization RBFNNs Parameters using Genetic Algorithms: Applied on Function Approximation Full text. |
|
1759 |
|
S. Menaria, Prof S. Valiveti and Dr K. Kotecha, “Comparative study of Distributed Intrusion Detection in Ad-hoc Networks”, International Journal of Computer Applications, 8(9), pp. 11–16, October 2010. |
|
1760 |
|
Y. Singh, A. Kaur, P. K. Bhatia and O. Sangwan, “Predicting Software Development Effort Using Artificial Neural Network”, International Journal of Software Engineering and Knowledge Engineering (IJSEKE), 20(3), pp. 367-375, 2010. |
|
1761 |
|
N. Daniel. “An Exploratory Study of Different Perception on The Usage of Text Message Lingo Among Male and Female College Students”, Presented at 2010 China Communication Forum, pp. 37-49., 10-12, Dec. 2010 |
|
1762 |
|
N. Bawane and C. V. Srikrishna, “A Novel Method for Quantitative Assessment of Software Quality”, International Journal of Computer Science and Security (IJCSS), 3(6) pp. 508 - 517, 2010. |
|
1763 |
|
R. Kumar, P.S. Grover and A. Kumar, “A Fuzzy Logic Approach to Measure Complexity of Generic Aspect-Oriented Systems” Journal of Object Technology, 9(3), pp. 43-57, May 2010. |
|
1764 |
|
K. Avadhesh, K. Rajesh and P.S.Grover, “Analysis and Design of Metrics for Aspect-Oriented Systems”, Doctor of Philosophy Thesis, School of Mathematics and Computer Applications, Thapar University, Patiala, 147 004 (Punjab), India. 2010. |
|
1765 |
|
J. K. Gupta and R. Kumar. “An Efficient ANN Based Approach for Latent Fingerprint Matching” International Journal of Computer Applications 7(10), pp. 18–21, Oct. 2010. |
|
1766 |
|
S. Mandala, M. A. Ngadi, A. H. Abdullah and A. S. Ismail, “A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol”, Computer Science Recent Trends in Wireless and Mobile Networks Communications in Computer and Information Science, 84(1), pp. 87-98, 2010. |
|
1767 |
|
Qasem, M. A. Rassam, “Anomaly intrusion detection system using immune network with reduced network traffic features”. Thesis Masters, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, 2010. |
|
1768 |
|
Baragada, S. R., Ramakrishna, S., Rao, M. S., & Purushothaman, S. (2010). Polynomial Vector Discriminant Back Propagation Algorithm Neural Network for Steganalysis. IJCSNS, 10(5), 73. |
|
1769 |
|
H. Farsi, “Improvement of Minimum Tracking in Minimum Statistics Noise Estimation Method”, Signal Processing: An International Journal (SPIJ), 4(1), pp. 17 – 22, 2010. |
|
1770 |
|
K. Y. Foo and P. R. Atkins, “A Relative-Localization Algorithm Using Incomplete Pairwise Distance Measurements for Underwater Applications”, Journal on Advances in Signal Processing - Special Issue on Advances in Signal Processing for Maritime Applications Archive, Volume 2010, January 2010. |
|
1771 |
|
N. Bawane and C. V. Srikrishna , “A Novel Method for Quantitative Assessment of Software Quality”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 508 – 517, Jan. 2010. |
|
1772 |
|
M. S. Binwahlan, N. Salim and L. Suanmalui, “Fuzzy Swarm Diversity Hybrid Model for Text Summarization”, Information Processing & Management, 46(5), pp. 571–588, 2010. |
|
1773 |
|
R. Ahmad and A. Khanum , “Document Topic Generation in Text Mining by Using Cluster Analysis with EROCK”, International Journal of Computer Science and Security (IJCSS), 4(2), pp. 176 – 182, 2010. |
|
1774 |
|
S. Aljahdali and A.F. Sheta, “Software Effort Estimation by Tuning COOCMO Model Parameters Using Differential Evolution” Presented at Computer Systems and Applications (AICCSA), 2010 IEEE/ACS International Conference , Hammamet, (16-19 May 2010. |
|
1775 |
|
L. Gheorghe, R. Rughinis and N. Tapus, “Attack Evaluation and Mitigation Framework”, in Proceedings, Networking and Services (ICNS), 2010 Sixth International Conference , Cancun, 7-13 March 2010, pp. 243 – 252. |
|
1776 |
|
C. Manusankar, S. Karthik and T. Rajendran, “Intrusion Detection System with Packet Filtering for IP Spoofing”, in Proceedings of Communication and Computational Intelligence (INCOCCI), 2010 International Conference, Erode, 27-29 Dec. 2010, pp. 563 – 567. |
|
1777 |
|
S. G. Sadasivam , V. Ruckmani , A. K. Kumari , “Secure Group Communication in Grid Environment”, International Journal of Security (IJS), 4(1), pp. 17 – 27, 2010. |
|
1778 |
|
S. Gkarafli and A. A. Economides, “Comparing The Proof By Knowledge Authentication Techniques”, International Journal of Computer Science and Security (IJCSS), 4(2) pp. 149-264, 2010. |
|
1779 |
|
X. Zhao, “Adaptive Content Delivery Based on Contextual and Situational Model”, Thesis For The Degree of Doctor of Philosophy in Engineering, The Graduate School of Information Systems, The University of Electro-Communications Tokyo, Japan, September 2010. |
|
1780 |
|
M.K. Bhowmik, D. Bhattacharjee, M. Nasipuri, D. K. Basu and M. Kundu, (Jul 2010), “A Parallel Framework for Multilayer Perceptron for Human Face Recognition”, International Journal of Computer Science and Security (IJCSS), 3(6). pp. 491 – 507, 2010. |
|
1781 |
|
Tapaswi, S., & Kushwah, V. S. (2010, June). Securing Nodes in MANETs Using Node Based Key Management Scheme. In Advances in Computer Engineering (ACE), 2010 International Conference on (pp. 228-231). IEEE. |
|
1782 |
|
Mamatha, G. S., & Sharma, S. C. (2010). A robust approach to detect and prevent network layer attacks in MANETS. International Journal of Computer Science and Security, 4(3), 275-284. |
|
1783 |
|
He, F., Hao, K., & Ma, H. (2010, July). S-MAODV: A trust key computing based secure Multicast Ad-hoc On Demand Vector routing protocol. In Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on (Vol. 6, pp. 434-438). IEEE. |
|
1784 |
|
M. Majed, “Coexistence between the Mobile Service and Terrestrial - Digital Video Broadcasting in the 790-862 MHz frequency band”. Master’s Thesis, Faculty of Electrical Engineering, Universiti Teknologi Malaysia, 2010. |
|
1785 |
|
T.R. Gopalakrishnan Nair (SM-IEEE), R. Selvarani, M. Vaidehi, (2010), “Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks”, CoRR, Vol. abs/1001.3777, 2010. |
|
1786 |
|
R. R. Aggarwal and Dr. L. Kaur, “Fault-Tolerance and Permutation Analysis of ASEN and its Variant”, International Journal of Computer Science and Information Technologies, 1(1), pp. 24-32, 2010. |
|
1787 |
|
M. Zhao, P. Zhu, T. He, “An Intelligent Topic Web Crawler Based on DTB”, in Proceedings, Web Information Systems and Mining (WISM), International Conference, Sanya, 23-24 Oct. 2010, pp. 84-86. |
|
1788 |
|
S. Gkarafli and A. A. Economides, "Comparing The Proof By Knowledge Authentication Techniques", International Journal of Computer Science and Security (IJCSS), 4(2), pp. 237 - 255, 2010. |
|
1789 |
|
http://ieeexplore.ieee.org/A. Vinay, P. Saxena and T. N. Anitha, “Architectural Solution for Improving Performance of Video-on-Demand Systems”, in Proceedings, Internet Multimedia Services Architecture and Application, IEEE 4th International Conference, Bangalore, 15-17 Dec. 2010, pp. 1-6. |
|
1790 |
|
T. R. G. Nair and P. Jayarekha, “A Rank Based Replacement Policy for Multimedia Server Cache Using Zipf-Like Law”, Journal of Computing, 2(3), 2010. |
|
1791 |
|
M.K. Bhowmik, D. Bhattacharjee, M. Nasipuri, D. K. Basu and M. Kundu, (2010), “A Parallel Framework for Multilayer Perceptron for Human Face Recognition”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 448-594, 2010. |
|
1792 |
|
M. S. Binwahlan, N. Salim and L. Suanmali, “Fuzzy Swarm Diversity Hybrid Model for Text Summarization”, Information Processing & Management, 46(5), pp. 571-588, 2010. |
|
1793 |
|
S. Gkarafli and A. A. Economides, “Comparing the Proof by Knowledge Authentication Techniques’, International Journal of Computer Science and Security (IJCSS), 4(2), pp. 237 – 255, 2010. |
|
1794 |
|
G. S. Mamatha and S. C. Sharma, “A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS”, International Journal of Computer Science and Security (IJCSS), 4(3), pp. 275 – 284, 2010. |
|
1795 |
|
Awad, M. (2010). Optimization RBFNNs parameters using genetic algorithms: applied on function approximation. International Journal of Computer Science and Security (IJCSS), 4(3), 295. |
|
1796 |
|
Miao, H. (2010). A multi-operator based simulated annealing approach for robot navigation in uncertain environments. International Journal of Computer Science and Security, 4(1), 50-61. |
|
1797 |
|
S. Ortolani, M. Conti and B. Crispo, “Censorship-Resilient Communications Through Information Scattering”, in Proceedings of the 18th International Workshop on Security Protocols (IWSP 2010), Cambridge, UK, March 24-26, 2010. |
|
1798 |
|
S. Patil and A. Kumar, “Implemented Cryptographic Symmetric Algorithm with Binary Addition/Subtraction Approach”, Journal of Computer Science and Engineering, 3(2), pp. 52-55, 2010. |
|
1799 |
|
V. J. Vivek , N. Chandrasekar and Y. Srinivas, “Improving Seismic Monitoring System for Small to Intermediate Earthquake Detection”, International Journal of Computer Science and Security (IJCSS), 4(3), pp. 308 – 315, 2010. |
|
1800 |
|
J. Barker, P. Hannay and C. Bolan, “Using Traffic Analysis to Identify Tor Usage – A Proposed Study”, in Proceedings of the International Conference on Security & Management, Las Vegas, Nevada, USA. 2010, pp. 620-623. |
|
1801 |
|
D. Shukla and A. Jain, “Estimation of Ready Queue Processing Time under Systematic Lottery Scheduling Scheme”, International Journal of Computer Science and Security (IJCSS), 4(1), pp. 74 – 81, 2010. |
|
1802 |
|
J. Laassiri , S. E. Hajji and M. Bouhdadi, “Verifying ODP Computational Behavioral Specification by using B-Method”, International Journal of Computer Science and Security (IJCSS), 4(1), pp. 31 – 39, 2010. |
|
1803 |
|
P. Reddy P.V.G. D , “Particle Swarm Optimization in the fine-tuning of Fuzzy Software Cost Estimation Models”, International Journal of Software Engineering (IJSE), 1(2), pp. 12 – 23, 2010. |
|
1804 |
|
S. Asghar and M. Umar, “Requirement Engineering Challenges in Development of Software Applications and Selection of Customer-off-the-Shelf (COTS) Components”, International Journal of Software Engineering (IJSE), 1(2), pp. 32 – 50, 2010. |
|
1805 |
|
P. Reddy , K.R. Sudha , P. R. Sree and Ramesh, “Fuzzy Based Approach for Predicting Software Development Effort”, International Journal of Software Engineering (IJSE), 1(1), pp. 1 - 11, 2010. |
|
1806 |
|
B. D. Satoto, D. O. Siahaan and A. Saikhu, “Perbaikan Struktur Weighted Tree Dengan Metode Partisi Fuzzy Dalam Pembangkitan Frequent Itemset”, Journal Ilmiah, KURSOR, Menuju Solusi Teknologi Informasi, 5(3), pp. 175-185, 2010. |
|
1807 |
|
S.Kannan, Karthik.S and Dr.V.P.Arunachalam, “Performance Analysis and Comparison of Mobile Ad-Hoc Network Routing Protocols”, Research Journal of Applied Sciences, 5(6), pp. 424-428, 2010. |
|
1808 |
|
S. Kannan , S. Karthik and V.P. Arunachalam, “An Investigation on Performance Analysis and Comparison of Proactive and Reactive Routing Protocols in Mobile Ad-Hoc Network”, International Journal of Soft Computing, 5(5), pp. 194 – 199, 2010. |
|
1809 |
|
2. Tarek , B. A. Abdel-latef , A. A. Ahmed and A. M. Mahfouz, “Hybrid Compression Encryption Technique for Securing SMS”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 473 – 481, 2010. |
|
1810 |
|
M. K. Shan and L. Y. Wei, “Algorithms for Discovery of Spatial Co-Orientation Patterns from Images”, Expert Systems with Applications: An International Journal, 37(8), pp. 5795–5802, 2010. |
|
1811 |
|
V. J. Vivek , N. Chandrasekar and Y. Srinivas, “Improving Seismic Monitoring System for Small to Intermediate Earthquake Detection”, International Journal of Computer Science and Security (IJCSS), 4(3), pp. 308 – 315, 2010. |
|
1812 |
|
A. M. Kane, “On the use of Continued Fractions for Electronic Cash”, International Journal of Computer Science and Security (IJCSS), 4(1), pp. 136 – 148, 2010. |
|
1813 |
|
A. Goel , A.K. Singh , R. K. Sethi and V. J. Gond, “Performance Analysis of Continuous Wavelength Optical Burst Switching Networks”, International Journal of Engineering (IJE), 3(6), pp. 609 – 621, 2010. |
|
1814 |
|
R. Ramraj , “Bandwidth Allocation and Routing Information for Wireless Mobile Ad-Hoc Networks’, in Proceedings of Fuzzy Systems and Knowledge Discovery (FSKD), 2010 Seventh International Conference, Yantai, Shandong, 10-12 Aug. 2010, pp. 2968 – 2972. |
|
1815 |
|
Laxmi, Vijaya, Pendse and Ravindra, “Trust Based QOS-Aware Packet Forwarding Model For Ad Hoc Network Independent Of Routing Protocol”, Thesis (M.S.), College of Engineering, Dept. of Electrical Engineering and Computer Science., Wichita State University, 2010. |
|
1816 |
|
S. Saxena , A. S. Pandya , R. Stone , S. Rajput and S. Hsu , “Knowledge Discovery Through Data Visualization Of Drive Test Data”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 559 – 568, 2010. |
|
1817 |
|
A. Ambhaikar, H.R. Sharma and V.K.Mohabey, “Scalability Performance of MANET Routing Protocols with Reference to Variable Pause Time”, International Journal on Computer Science and Engineering, 02(09), pp. 3021-3024, 2010. |
|
1818 |
|
R. Deshmukh and A. Ambhaikar, “Performance Evaluation of AODV and DSR with Reference to Network Size”, International Journal of Computer Applications, 11(8), pp. 27-32, 2010. |
|
1819 |
|
R. Ahmad and A. Khanum, “Document Topic Generation in Text Mining by using Cluster Analysis with EROCK”, International Journal of Computer Science and Security (IJCSS), 4(2), pp. 176 – 182, 2010. |
|
1820 |
|
Oyelade, O. J., & Oladipupo, O. O. Knowledge Discovery from Students’ Result Repository: Association Rule Mining Approach. |
|
1821 |
|
OO, O. Knowledge Discovery from Students’ Result Repository: Association Rule Mining Approach. International Journal of Computer Science and Security (IJCSS), 149(2), 199. |
|
1822 |
|
Elayidom, S., Idikkula, S. M., & Alexander, J. Applying Statistical Dependency Analysis Techniques In a Data Mining Domain. |
|
1823 |
|
E. M. Mohamed , Y. Mahmoud and H. Furukawa, “A Secured Smart Card using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES”, International Journal of Computer Science and Security (IJCSS), 4(1), pp. 9 – 22, 2010. |
|
1824 |
|
S. Gkarafli and A. A. Economides, “Comparing The Proof By Knowledge Authentication Techniques”, International Journal of Computer Science and Security (IJCSS), 4(2), pp. 237 – 255, 2010. |
|
1825 |
|
Tarek , B. A. Abdel-latef , A. A. Ahmed and A. M. Mahfouz, “Hybrid Compression Encryption Technique for Securing SMS”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 473 – 481, 2010. |
|
1826 |
|
D. Shukla, S. Ojha and S. Jain, “Effect of Data Model Approach in State Probability Analysis of Multi-Level Queue Scheduling”, Int. J. of Advanced Networking and Application, 02(01), pp. 419-427, 2010. |
|
1827 |
|
D. Shukla and A. Jain, “Estimation of Ready Queue Processing Time Under Systematic Lottery Scheduling Scheme”, International Journal of Computer Science and Security (IJCSS), 4(1), pp. 74 – 81, 2010. |
|
1828 |
|
S. Saxena , A. S. Pandya , R. Stone , S. Rajput and S. Hsu, “Knowledge Discovery Through Data Visualization Of Drive Test Data”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 559 – 568, 2010. |
|
1829 |
|
M. Sheikhan, K. Asadollahi and E. Hemmati, “High Quality Audio Steganography by Floating Substitution of Lsbs in Wavelet Domain”, World Applied Sciences Journal, 10(12), pp. 1501-1507, 2010. |
|
1830 |
|
V. J. Vivek , N. Chandrasekar and Y. Srinivas, “Improving Seismic Monitoring System for Small to Intermediate Earthquake Detection”, International Journal of Computer Science and Security (IJCSS), 4(3), pp. 308 – 315, 2010. |
|
1831 |
|
M. K. Bhowmik , D. Bhattacharjee , M. Nasipuri , D. K. Basu and M. Kundu, “Fusion of Wavelet Coefficients from Visual and Thermal Face Images for Human Face Recognition – A Comparative Study”, International Journal of Image Processing (IJIP), 4(1), pp. 12 – 23, 2010. |
|
1832 |
|
Miao Haibo , Liu Sheng Huang , Chen Zhili , & Yang Wei . ( 2010 ) . For text analysis and detection of hidden tools Stegparty . COMMUNICATIONS , (9A), 37-258. |
|
1833 |
|
Z. H. Ahmed, “Solution Algorithms for A Deterministic Replacement Problem”, International Journal of Engineering (IJE), 4(3), pp. 233 – 242, 2010. |
|
1834 |
|
J. Laassiri, “Spécification et Vérification des Systèmes Informatiques Distribuées Conformément au Modèle de Référence du Traitement Réparti Ouvert (RM-ODP)”, Thèse De Doctorat, Université Mohammed V – Agdal Faculté Des Sciences Rabat, 24 juin 2010. |
|
1835 |
|
I. Aldasouqi and W. Salameh, “Determining an Optimal Number of Access Points Using GPS data to Secure a Wireless Network Environment”, International Journal of Security (IJS), 4(5), pp. 85 – 99, 2010. |
|
1836 |
|
V. J. Dongre and V. H. Mankar, “A Review of Research on Devnagari Character Recognition”, International Journal of Computer Applications, 12(2), pp. 8-15, November 2010. |
|
1837 |
|
M.B.Chandak, Dr.R.V.Dharaskar and Dr.V.M.Thakre, “Text to Speech Synthesis with Prosody Feature: Implementation of Emotion in Speech Output using Forward Parsing”, International Journal of Computer Science and Security, 4(3), pp. 352-360, July 2010. |
|
1838 |
|
Prof. M. Abo-Zahhad , S. M. Ahmed , N. Sabor and A. F. Al-Ajloun, “The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based Optimization Problems”, Signal Processing: An International Journal (SPIJ) , 4(5), pp. 247 – 266, 2010. |
|
1839 |
|
J. N. Begum, K. Kumar and V. Sumathy, “A Novel Approach towards Multilevel Access Control for Secure Group Communication Using Symmetric Polynomial Based Elliptic Curve Cryptography”, in Proceedings of Computational Intelligence and Communication Networks, 2010 International Conference, Bhopal, 26-28 Nov. 2010, pp. 454-459. |
|
1840 |
|
M. Darbari , R. Asthana and V. K. Singh, “Integrating Fuzzy Mde- AT Framework For Urban Traffic Simulation”, International Journal of Software Engineering (IJSE), 1(2), pp. 24 – 31, 2010. |
|
1841 |
|
P. M. Jawandhiya, M. M. Ghonge, DR. M.S.ALI and PROF. J.S. DESHPANDE, “A Survey of Mobile Ad Hoc Network Attacks”, International Journal of Engineering Science and Technology, 2(9), pp. 4063-4071, 2010. |
|
1842 |
|
R. M. Patil, M. R. Patil, Dr. K. V. Ramakrishnan and Dr. T.C.Manjunath. “IDDP: Novel Development of an Intrusion Detection System through Design Patterns”. International Journal of Computer Applications, 7(12), pp. 22–29, October 2010. |
|
1843 |
|
R.Gobi, P. Sathya, E.G.D.P Raj and T. Sasikumar, “ComEn- a mobile device compression and encryption approach”, in Proceedings of Communication and Computational Intelligence (INCOCCI), 2010 International Conference. Erode, 27-29 Dec. 2010, pp. 609 – 612. |
|
1844 |
|
Awad, M. (2010). Optimization RBFNNs parameters using genetic algorithms: applied on function approximation. International Journal of Computer Science and Security (IJCSS), 4(3), 295. |
|
1845 |
|
Singh, Y., Kaur, A., Bhatia, P. K., & Sangwan, O. (2010). Predicting software development effort using artificial neural network. International Journal of Software Engineering and Knowledge Engineering, 20(03), 367-375. |
|
1846 |
|
Bawane, N., & Srikrishna, C. V. (2010). A novel method for quantitative assessment of software quality. International Journal of Computer Science and Security (IJCSS), 3(6), 508. |
|
1847 |
|
Kumar, R., Grover, P. S., & Kumar, A. (2010). A Fuzzy Logic Approach to Measure Complexity of Generic AspectOriented Systems. Journal of Object Technology, 9(3), 59-77. |
|
1848 |
|
Kumar, A. (2010). Analysis and Design of Metrics for Aspect-Oriented Systems (Doctoral dissertation, Thapar University, Patiala). |
|
1849 |
|
Srikrishna, C. V., & Bawane, N. (2010). A Novel Method for Quantitative Assessment of Software Quality. |
|
1850 |
|
Zhao, M. S., Zhu, P., & He, T. C. (2010, October). An Intelligent Topic Web Crawler Based on DTB. In Web Information Systems and Mining (WISM), 2010 International Conference on (Vol. 1, pp. 84-86). IEEE. |
|
1851 |
|
Saxena, P., & Anitha, T. N. (2010, December). Architectural solution for improving performance of Video-on-Demand systems. In Internet Multimedia Services Architecture and Application (IMSAA), 2010 IEEE 4th International Conference on (pp. 1-6). IEEE. |
|
1852 |
|
Mann, F. (2010). Filmdistribution über internetbasierte Abrufdienste: Gestaltungsoptionen und intermediale Wechselwirkungen. epubli. |
|
1853 |
|
Nair, T. R., & Jayarekha, P. (2010). A rank based replacement policy for multimedia server cache using zipf-like law. arXiv preprint arXiv:1003.4062. |
|
1854 |
|
Shukla, D., Jain, A., & Choudhary, A. (2010). Estimation of ready queue processing time under SL-Scheduling scheme in multiprocessors environment. International Journal of Computer Science and Security (IJCSS), 4(1), 74-81. |
|
1855 |
|
Asghar, S., & Umar, M. (2010). Requirement engineering challenges in development of software applications and selection of customer-off-the-shelf (COTS) components. International Journal of Software Engineering, 1(1), 32-50. |
|
1856 |
|
PVGD, P. R. (2010). Particle swarm optimization in the fine-tuning of fuzzy software cost estimation models. International Journal of Software Engineering (IJSE), 1(2), 12-23. |
|
1857 |
|
Kane, A. M. (2010). On the use of continued fractions for electronic cash. International Journal of Computer Science and Security, 4(1), 136-148. |
|
1858 |
|
Sanjay, T., & Diwakar, S. (2010). Iso-Share Analysis of Internet Traffic Sharing in the Presence of Favoured Disconnectivity. Computer Science & Telecommunications, 27(4). |
|
1859 |
|
Shukla, D., & Thakur, S. (2010). Stochastic Analysis of Marketing Strategies in internet Traffic. INTERSTAT (June 2010). |
|
1860 |
|
Sarma, S. K., Choudhury, S. D., Ahmed, F. U., & Hannan, A. (2010). Efficiency analysis of routing protocols for mobile ad hoc networks for heterogeneity. International Journal of Computer Networks, 2(1), 1-8. |
|
1861 |
|
Saxena, S., Pandya, A. S., Stone, R., Rajput, S., & Hsu, S. (2010). Knowledge Discovery through Data Visualization of Drive Test Data. International Journal of Computer Science and Security (IJCSS), 3(6), 559. |
|
1862 |
|
Shukla, D., & Jain, A. (2010). Estimation of Ready Queue Processing Time Under Systematic Lottery Scheduling Scheme. |
|
1863 |
|
Mahmoud, T. M., Abdel-Latef, B. A., Ahmed, A. A., & Mahfouz, A. M. (2010). Hybrid compression encryption technique for securing SMS. International Journal of Computer Science and Security (IJCSS), 3(6), 473. |
|
1864 |
|
Tarek, B. A., Ahmed, A. A., & Mahfouz, A. M. (2010). Hybrid Compression Encryption Technique for Securing SMS. |
|
1865 |
|
Chandra, E., & Nandhini, K. (2010). Knowledge mining from student data. European Journal of Scientific Research, 47(1), 156-163. |
|
1866 |
|
Anandhavalli, M., Ghose, M. K., Gauthaman, K., & Boosha, M. (2010). Global search analysis of spatial gene expression data using genetic algorithm. In Recent Trends in Network Security and Applications (pp. 593-602). Springer Berlin Heidelberg. |
|
1867 |
|
Bhattacharyya, S., & Sanyal, G. (2010). Data hiding in images in discrete wavelet domain using PMM. World Academy of Science, Engineering and Technology, 68, 597-605. |
|
1868 |
|
Joevivek, V., Chandrasekar, N., & Srinivas, Y. (2010). Improving seismic monitoring system for small to intermediate earthquake detection. International Journal of Computer Science and Security (IJCSS), 4(3), 308. |
|
1869 |
|
Thorat, S., & Bokare, M. M. A Dymanic Method To Secure Confidential Data Using Signcryption With Steganography. IJESAT] International Journal Of Engineering Science & Advanced Technology, 2, 183-191. |
|
1870 |
|
Prajapati, H. A., & Chitaliya, N. G. Secured and Robust Dual Image Steganography: A Survey. |
|
1871 |
|
Barukab, O. M., Shaik, M. S., Khan, S., & Thorat, S. Signcrypted Audio Steganography: A Sophisticated Technique for Data Security. |
|
1872 |
|
Bhattacharyyaa, S., & Sanyalb, G. A Robust Video Steganography using DWTDM. |
|
1873 |
|
Gobi, R., Sathya, P., Raj, E., & Sasikumar, T. (2010, December). ComEn-a mobile device compression and encryption approach. In Communication and Computational Intelligence (INCOCCI), 2010 International Conference on (pp. 609-612). IEEE. |
|
1874 |
|
Ahmed, Z. H. (2010). Solution algorithms for a deterministic replacement problem Full text. |
|
1875 |
|
Ahmed, Z. H. (2010). A hybrid sequential constructive sampling algorithm for the bottleneck traveling salesman problem. |
|
1876 |
|
Bhattacharjee, S. A. D., Nasipuri, M., Kundu, M., Basu, D. K., & Malik, L. Handwritten Devnagari Numeral Recognition using SVM & ANN. |
|
1877 |
|
Jawandhiya, P. M., Ghonge, M. M., Ali, M. S., & Deshpande, J. S. (2010). A survey of mobile ad hoc network attacks. International Journal of Engineering Science and Technology, 2(9), 4063-4071. |
|
1878 |
|
Sehrawat, M., & Sharma, P. Review on Attacks in Mobile Ad-hoc Networks (MANET). |
|
1879 |
|
Kapdi, m. n. b., detroja, m. b. b., & hansaliya, m. b. h. simulation based study of attacks on different layerin mobile ad hoc network (manet). |
|
1880 |
|
Vishwakarma, D., Maheshwari, S., & Joshi, S. Efficient Information Hiding Technique Using Steganography. |
|
1881 |
|
Jhaveri, R. H., Patel, A. D., Parmar, J. D., & Shah, B. I. (2010). MANET routing protocols and wormhole attack against AODV. International Journal of Computer Science and Network Security, 10(4), 12-18. |
|
1882 |
|
Chandra, E., & Nandhini, K. (2010). Knowledge mining from student data. European journal of scientific research, 47(1), 156-163. |
|
1883 |
|
Sarvaiya, J., Patnaik, S., & Goklani, H. (2010). Image registration using NSCT and invariant moment. International Journal of Image Processing (IJIP), 4(2), 119. |
|
1884 |
|
AbuShawar, B. A., & Al-Sadi, J. A. (2010). Learning management systems: Are they knowledge management tools?. International Journal of Emerging Technologies in Learning, 5(1), 4-10. |
|
1885 |
|
Sheta, A. F., & Al-Afeef, A. (2010).Software Effort Estimation for NASA Projects Using Genetic Programming. Journal of Intelligent Computing Volume, 1(3), 147. |
|
1886 |
|
Xu arms, & Wang Fengjian.( 2010 )A timing workflow management systems research (Doctoral dissertation) analysis. |
|
1887 |
|
Abbas, A. I. (2010). Face identification using multiwavelet-based neural network (Doctoral dissertation, University of Baghdad). |
|
1888 |
|
Bawane, N., & Srikrishna, C. V. (2010). A novel method for quantitative assessment of software quality. International Journal of Computer Science and Security (IJCSS), 3(6), 508. |
|
1889 |
|
Bilodeau, V. P. (2010). Intelligent parking technology adoption (Doctoral dissertation, University of Southern Queensland). |
|
1890 |
|
Liulong Long. (2010). I have several views of software engineering teaching computer education, 23, 007. |
|
1891 |
|
Ismail, Z., & Hassan, R. (2010, June). Performance of AODV routing protocol in mobile ad hoc network. In Information Technology (ITSim), 2010 International Symposium in (Vol. 1, pp. 1-5). IEEE. |
|
1892 |
|
Sarma, S. K., Choudhury, S. D., Ahmed, F. U., & Hannan, A. (2010). Efficiency analysis of routing protocols for mobile ad hoc networks for heterogeneity. International Journal of Computer Networks, 2(1), 1-8. |
|
1893 |
|
Ramraj, R. (2010, August). Bandwidth allocation and routing information for wireless mobile ad-hoc networks. In Fuzzy Systems and Knowledge Discovery (FSKD), 2010 Seventh International Conference on (Vol. 6, pp. 2968-2972). IEEE. |
|
1894 |
|
Mamatha, G. S., & Sharma, S. C. (2010). A robust approach to detect and prevent network layer attacks in MANETS. International Journal of Computer Science and Security, 4(3), 275-284. |
|
1895 |
|
Husain, S., Gupta, S. C., Chand, M., & Mandoria, H. L. (2010, September). A proposed model for Intrusion Detection System for mobile adhoc network. In Computer and Communication Technology (ICCCT), 2010 International Conference on (pp. 99-102). IEEE. |
|
1896 |
|
Menaria, S., Valiveti, S., & Kotecha, K. (2010). Comparative study of distributed intrusion detection in ad-hoc networks. International Journal of Computer Applications, 8(9), 11-16. |
|
1897 |
|
Lacey, T. H. (2010). Reputation-based internet protocol security: a multilayer security framework for mobile Ad Hoc networks (No. AFIT/DCS/ENG/10-07). AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH SCHOOL OF ENGINEERING AND MANAGEMENT. |
|
1898 |
|
Fasola, J., & Mataric, M. J. (2010). A Socially Assistive Robot Exercise Coach for the Elderly. Journal of Human-Robot Interaction, 1(1), 1-16. |
|
1899 |
|
Tirdad, K. (2010). Developing pseudo random number generator based on neural networks and neurofuzzy systems. |
|
1900 |
|
Penteado, D. (2010). redes acusticas subaquaticas na monitorac ao de correntes marítimas (doctoral dissertation, universidade federal do rio de janeiro). |
|
1901 |
|
Gandhi, M., & Srivatsa, S. K. (2010). Combination of RBF Algorithm and Filters Applied to Prevent Attacks in a Web Server. International Journal of Computational Intelligence Research, 6(2). |
|
1902 |
|
Sudha Sadasivam, G., & Kumari, A. Secure Group Communication in Grid Environment. International Journal Of Security (IJS), 4(1), 17. |
|
1903 |
|
Joevivek, V., Chandrasekar, N., & Srinivas, Y. (2010). Improving seismic monitoring system for small to intermediate earthquake detection. International Journal of Computer Science and Security (IJCSS), 4(3), 308. |
|
1904 |
|
Oyelade, O. J., & Oladipupo, O. O. (2010). Knowledge Discovery from Students’ Result Repository: Association Rule Mining Approach. |
|
1905 |
|
Awad, M., & Occupied, P. (2010). Optimization RBFNNs Parameters using Genetic Algorithms: Applied on Function Approximation Full text. |
|
1906 |
|
Garofalo, M. GPU Computing for Machine Learning Algorithms. |
|
1907 |
|
Divya, P., & Rajalakshmi, M. S. Classifying Spyware Files Using Data Mining Algorithms and Hexadecimal Representation. |
|
1908 |
|
OO, O. Knowledge Discovery from Students’ Result Repository: Association Rule Mining Approach. International Journal of Computer Science and Security (IJCSS), 149(2), 199. |
|
1909 |
|
Prasanna, Y. L., & reddy, p. c. analysis of anthocnet and aodv performance using ns2. |
|
1910 |
|
Nair, T. R., Selvarani, R., & Vaidehi, M. (2010). Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks. arXiv preprint arXiv:1001.3777. |
|
1911 |
|
Baloda, S., & Aggarwal, R. Reliability Analysis of Regular Multistage Interconnection Networks. |
|
1912 |
|
Shendurkar, M. A. M., & Chopde, N. R. A Review of Black Hole and Worm Hole Attack on AODV Routing Protocol in MANET. International Journal of Engineering Trends and Technology (IJETT)–Volume, 9, 394-399. |
|
1913 |
|
Pavani, K., & Avula, D. Injection of Attacks in MANETs. IOSR Journal of Computer Engineering (IOSRJCE), ISSN, 2278-0661. |
|
1914 |
|
JAIN, S., & GUPTA, H. Detection and Prevention of Flooding in MANET Using Behavioral Rating. |
|
1915 |
|
Meyer, D. TOWARDS a SATELLITE COMMONS. |
|
1916 |
|
Raja, R., Sharmili, M., & Scholar, P. G. ENHANCED CO-OPERATIVE BAIT DETECTION SCHEME FOR DOS IN MANET’s. |
|
1917 |
|
Gosavi, M., & Jayanthi, E. A Survey on Different Available Detection Techniques of IDS and Attacks at Different Layers of MANET. |
|
1918 |
|
SARAVANAN, V., & RAGHU, R. A survey on Different Security Attacks in MANET. |
|
1919 |
|
GODE, M. N. R. INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY. |
|
1920 |
|
Biswas, M., Jana, A., Paul, R., & Saha, H. N. A Secure Routing Protocol Based On Fidelity. |
|
1921 |
|
VAGHELA, M. R. D., & GOSWAMI, N. J. A MODIFIED HYBRID PROTOCOL (ZRP) USED FOR DETECTION AND REMOVAL OF BLACK HOLE NODE IN MANET. |
|
1922 |
|
Babu, M. R., & Selvan, S. A Reliable Attack-Resistant Authenticated Routing Protocol for Mobile Adhoc Networks. |
|
1923 |
|
Sinnreich, A. Weaving a New ‘Net: A Mesh-Based Solution for Democratizing Networked Communications Aram Sinnreich, Nathan Graham, and Aaron Trammell Rutgers University. |
|
1924 |
|
Basuray, C., Giri, D., Chatterjee, S., & Ganguly, S. Minimized Overhead and Administrator based Secured Routing Protocol. |
|
1925 |
|
Sukoco, H., & Okamura, K. (2010, March). Genetic Algorithm for Optimizing and Arrangement of Queue in Virtual Networks. In World Congress on Engineering 2012. July 4-6, 2012. London, UK. (Vol. 2188, pp. 670-675). International Association of Engineers. |
|
1926 |
|
Keole, R. R., & Bamnote, G. R. (2010). Clustering Techniques in Web Content Mining. International Journal of Advanced Research in Computer Science, 1(4). |
|
1927 |
|
Keole, R. R., & Bamnote, G. R. (2010). Fuzzy Clustering in Web Content Mining. International Journal of Advanced Research in Computer Science, 1(4). |
|
1928 |
|
Laassiri, J. (2010). Spécification et vérification des systèmes informatiques distribuées conformément au modèle de référence du traitement réparti ouvert (RM-ODP). |
|
1929 |
|
Dr. M. R. Raybhan. "Bio-Data". IEEE Sponsored International Conference Future Computer and Communication, 2009 |
|
1930 |
|
S. Nema, A. Goel, R.P. Singh. "Integrated DWDM and MIMO-OFDM System for 4G High Capacity Mobile Communication System". Signal Processing: An International Journal (SPIJ), 3(5):132 - 143, 2009 |
|
1931 |
|
B. Raju MSVS, V. B Vishnu, G. A. Naidu, R. L. Pratap and B. A Vinaya, “A Noval Security Model for Indic Scripts- A Case Study on Telugu”, International Journal of Computer Science and Security, (IJCSS), 3(4), pp. 303 – 313, 2009. |
|
1932 |
|
S. Karthik, Dr.V.P.Arunachalam, Dr.T.Ravichandran , “A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback” , International Journal of Computer Science and Security (IJCSS), 3( 4) , pp. 272 – 279, 2009. |
|
1933 |
|
A. Kumar, P. S Grover and R. Kumar, “A Quantitative Evaluation of Aspect-Oriented Software Quality Model (AOSQUAMO)”, ACM SIGSOFT Software Engineering Notes, 34(5), Sep. 2009. |
|
1934 |
|
L. L. Liu, “Embedding Software Engineering Disciplines in Entry-Level Programming”, International Journal of Computer Science and Security (IJCSS), 3(2), pp. 76 – 82, 2009. |
|
1935 |
|
Bhattacharjee, D., Bhowmik, M. K., Nasipuri, M., Basu, D. K., & Kundu, M. (2009). A Parallel Framework for Multilayer Perceptron for Human Face Recognition. International Journal of Computer Science and Security (IJCSS), 3(6), 491-507. |
|
1936 |
|
A. V. Aquino and Y. J. A. Barria, “Change Detection in Time Series Using the Maximal Overlap Discrete Wavelet Transform”. Lat. Am. appl. res. 39(2), pp. 145-152., 2009. |
|
1937 |
|
R. Sabah and R.N. Ainon, “Isolated Digit Speech Recognition in Malay Language Using Neuro-Fuzzy Approach”, in Modelling & Simulation, AMS '09. Third Asia International Conference , Bali, 25-29 May 2009, pp.no. 336 – 340. |
|
1938 |
|
L. L. Liu, “Embedding Software Engineering Disciplines in Entry-Level Programming”, International Journal of Computer Science and Security (IJCSS), 3(2), pp. 76 – 82, May. 2009. |
|
1939 |
|
G.N.K.S. Babu and DR.S.K.Srivatsa, “Analysis and Measures of Software Reusability”, International Journal of Reviews in Computing, 1, pp. 41-46, 2009. |
|
1940 |
|
S. Lee and H. J. Choi; (15-18 Feb. 2009), “Software Component Reusability Measure In Component Grid ”, in Advanced Communication Technology, 11th International Conference , Phoenix Park, pp. 576 – 578, 15-18 Feb. 2009. |
|
1941 |
|
W. A. Ahmed and S. M. Shamsuddin , “Integration of Least Recently Used Algorithm and Neuro-Fuzzy System into Client-side Web Caching” , International Journal of Computer Science and Security (IJCSS), 3(1), pp. 1 – 15, 2009. |
|
1942 |
|
S. Mansor , R. B. Din and A. Samsudin , “Analysis of Natural Language Steganography”, International Journal of Computer Science and Security (IJCSS), 3(2), pp. 113 – 125, 2009. |
|
1943 |
|
B. A. AbuShawar and J. A. Al-Sadi, “Learning Management Systems: Are They Knowledge Management Tools?” presented at IJET, 2010, pp.4-10. |
|
1944 |
|
S. Karthik, V. P. Arunachalam and T. Ravichandran, “A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback”, International Journal of Computer Science and Security (IJCSS), 3(4), pp. 272 - 279, 2009. |
|
1945 |
|
S. P. T. Vinay and A. Shanmugam, “Behavior Based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET”, International Journal of Computer Science and Security (IJCSS), 3(2), pp. 62 – 75, 2009. |
|
1946 |
|
E. Nikolova and V. Jecheva, “Anomaly Based Intrusion Detection Using Data Mining and String Metrics”, in Proceedings of Communications and Mobile Computing, CMC '09. WRI International Conference , Yunnan, 6-8 Jan. 2009, pp. 440 – 444. |
|
1947 |
|
A. S. Hosam, A. Mustafa, S. Ahmad and M. Abbas, “Exception Agent Detection System for IP Spoofing Over Online Environments”, International Journal of Computer Science and Information Security, 6(1), pp. 158-164, 2009. |
|
1948 |
|
Sehgal, P. K., & Nath, R. (2009). A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network. International Journal of Computer Science and Security (IJCSS), 3(1), 16. |
|
1949 |
|
Karthik, S., Arunachalam, V. P., & Ravichandran, T. (2009). A novel Direction ratio sampling algorithm (DRSA) approach for multi directional geographical traceback. |
|
1950 |
|
Z. A. Shamsan and T. A, Rahman, “Intersystem Interference Scenarios between Fixed and IMT-Advanced Services in Different Terrestrial Regions”, in Proceedings, Future Computer and Communication, International Conference, Kuala Lumpar, 3-5 April 2009, pp. 237 – 240. |
|
1951 |
|
Sehgal, P. K., & Nath, R. (2009). A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network. International Journal of Computer Science and Security (IJCSS), 3(1), 16. |
|
1952 |
|
Goel, A., & Sharma, A. (2009). Performance Analysis of Mobile Ad-hoc Network Using AODV Protocol. International Journal of Computer Science and Security (IJCSS), 3(5), 334-343. |
|
1953 |
|
D. Shukla , V. K. Tiwari , S. Thakur and A. K. Deshmukh, “Share Loss Analysis of Internet Traffic Distribution in Computer Networks”, International Journal of Computer Science and Security (IJCSS), 3(5), pp. 414 – 426, 2009. |
|
1954 |
|
D. Shukla, V. K. Tiwari, S. Thakur and M. Tiwari , “A Comparison of Methods for Internet Traffic Sharing in Computer Network”, Int. J. of Advanced Networking and Applications, 01(03), pp. 164-169, 2009. |
|
1955 |
|
I. S. Saeh and A. Khairuddin, “Implementation of Artificial Intelligence Techniques for Steady State Security Assessment in Pool Market”, International Journal of Engineering (IJE), 3(1), pp. 1 – 11, 2009. |
|
1956 |
|
P. L. E. Ekmobo , M. Oumsis and M. Meknassi, “Motion Tracking in MRI by Harmonic State Model: Case of Heart Left Ventricle”, International Journal of Computer Science and Security (IJCSS), 3(5), pp. 428 – 447, 2009. |
|
1957 |
|
H. S. Guruprasad and Dr. H D Maheshappa, “Efficient Resource Allocation in a Distributed VoD Using Agent Technology”, International Journal of Engineering and Technology, 1(5), pp. 461-466, 2009. |
|
1958 |
|
H. S. Guruprasad and H. D. Maheshappa, “Dynamic Bandwidth Management in Distributed VoD Based on the User Class Using Agents”, International Journal of Computer Science and Information Security, 3(1), 2009. |
|
1959 |
|
A. Waleed and S. M. Shamsuddin, “Integration of Least Recently Used Algorithm and Neuro-Fuzzy System into Client-Side Web Caching”. International Journal of Computer Science and Security, 3 (1). pp. 1-15, 2009. |
|
1960 |
|
M. S. Binwahlan, N. Salim and L. Suanmali, “Swarm Diversity Based Text Summarization”, Computer Science Neural Information Processing Lecture Notes in Computer Science, Vol. 5864/2009, pp. 216-225, 2009. |
|
1961 |
|
D. Shukla , V. K. Tiwari , S. Thakur and A. K. Deshmukh, “Share Loss Analysis of Internet Traffic Distribution in Computer Networks”, International Journal of Computer Science and Security (IJCSS), 3(5), pp. 414 – 426, 2009. |
|
1962 |
|
D. Shukla, V. K. Tiwari, S. Thakur and M. Tiwari, “A Comparison of Methods for Internet Traffic Sharing in Computer Network”, Int. J. of Advanced Networking and Applications, 1(3), pp. 164-169, 2009. |
|
1963 |
|
A. Y. Dahab , A. M. Said and H. Hasbullah“Applications of Extreme Value Theory to Burst Predictions”. Signal Processing: An International Journal, 3 (4), pp. 55 – 63, 2009. |
|
1964 |
|
A. B. Mohammed and S. M. Nor, “Near Real Time Online Flow-Based Internet Traffic Classification Using Machine Learning (C4.5)”, International Journal of Engineering (IJE), 3(4), pp. 370 – 379, 2009. |
|
1965 |
|
D. Shukla , V. K. Tiwari , S. Thakur and A. K. Deshmukh, “Share Loss Analysis of Internet Traffic Distribution in Computer Networks”, International Journal of Computer Science and Security (IJCSS), 3(5), pp. 414 – 426, 2009. |
|
1966 |
|
D. Shukla , V. K. Tiwari, S. Thakur and M. Tiwari , “A Comparison of Methods for Internet Traffic Sharing in Computer Network”, Int. J. of Advanced Networking and Applications, 01(03), pp. 164-169, 2009. |
|
1967 |
|
S. J. Aboud, “Secure E-payment Protocol”, International Journal of Security (IJS), 3(5), pp. 85 – 92, 2009. |
|
1968 |
|
J. Kar and B. Majhi, “An Efficient Password Security of Multi-Party Key Exchange Protocol Based on ECDLP”, International Journal of Computer Science and Security (IJCSS), 3(5), pp. 405 – 413, 2009. |
|
1969 |
|
S. J. Aboud, “Secure E-payment Protocol”, International Journal of Security (IJS), 3(5), pp. 85 – 92, 2009. |
|
1970 |
|
M. Z. Rahman , R. A. Shaik and D. V. R. K. Reddy, “Noise Cancellation in ECG Signals using Computationally”, Signal Processing: An International Journal (SPIJ), 3(5), pp. 120 – 131, 2009. |
|
1971 |
|
S. Nema , A. Goel and R.P. Singh, “Integrated DWDM and MIMO-OFDM System for 4G High Capacity Mobile Communication System”, Signal Processing: An International Journal (SPIJ), 3(5), pp. 132 – 143, 2009. |
|
1972 |
|
Kumar, A., Grover, P. S., & Kumar, R. (2009). A quantitative evaluation of aspect-oriented software quality model (AOSQUAMO). ACM SIGSOFT Software Engineering Notes, 34(5), 1-9. |
|
1973 |
|
Liu, L. L. (2009). Embedding Software Engineering Disciplines in Entry-Level Programming. International Journal of Computer Science and Security (IJCSS), 3(2), 76. |
|
1974 |
|
EKOMBO, P. L. E., Oumsis, M., & Meknassi, M. (2009). Motion tracking in MRI by Harmonic State Model: Case of heart left ventricle. International Journal of Computer Science and Security (IJCSS), 3(5), 428. |
|
1975 |
|
Guruprasad, H. S., & Maheshappa, H. D. (2009). Efficient Resource Allocation in a Distributed VoD Using Agent Technology. the proceedings of International Journal of Engineering and Technology, 1(5), 461-466. |
|
1976 |
|
Binwahlan, M. S., Salim, N., & Suanmali, L. (2009, June). Integrating of the diversity and swarm based methods for text summarization. In The 5th postgraduate annual research seminar (PARS) (pp. 17-19). |
|
1977 |
|
Shukla, D., Tiwari, V., Thakur, S., & Deshmukh, A. K. (2009). Share loss analysis of internet traffic distribution in computer networks. International Journal of Computer Science and Security (IJCSS), 3(5), 414-427. |
|
1978 |
|
Ahmed, W. A., & Shamsuddin, S. M. Integration of Least Recently Used Algorithm and Neuro-Fuzzy System into Client-side Web Caching. |
|
1979 |
|
Nair, S. Privacy and Security Automation for Cloud Computing. |
|
1980 |
|
Goto, K., Okabe, H., Shimizu, S., Onoda, M., & Fujioka, Y. (2009). Evaluation method of novel absorbents for CO 2 capture. Energy Procedia, 1(1), 1083-1089. |
|
1981 |
|
ICACT 2009. 11th International Conference on (Vol. 1, pp. 576-578). IEEE. |
|
1982 |
|
Arunachalam, V. P., & Ravichandran, T. A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback. International Journal of Computer Science and Security (IJCSS), 3(4), 272. |
|
1983 |
|
Baragada, S. R., Ramakrishna, S., Rao, M. S., & Purushothaman, S. (2009). Polynomial Discriminant Radial Basis Function for Steganalysis. International Journal of Computer Science and Network Security, IJCSNS, 9(2), 209-218. |
|
1984 |
|
Mansor, S., Din, R., & Samsudin, A. (2009). Analysis of natural language steganography. International Journal of Computer Science and Security (IJCSS), 3(2), 113-125. |
|
1985 |
|
Sundararajan, T. V. P., & Shanmugam, D. A. (2009). Behavior based anomaly detection technique to mitigate the routing misbehavior in manet. International Journal of Computer Science and Security, 3(2), 62-75. |
|
1986 |
|
Mohd, A. B., & bin Mohd Nor, S. (2009). Near Real Time Online Flow-Based Internet Traffic Classification Using Machine Learning (C4. 5). Abuagla Babiker Mohammed, Assoc. Prof. Dr. Sulaiman Mohd Nor., 3(4), 370. |
|
1987 |
|
Dahab, A. Y., bin Md Said, A., & bin Hasbullah, H. (2009). Application of extreme value theory to bursts prediction. SPIJ, 3(4), 55. |
|
1988 |
|
Nath, R., & Sehgal, P. K. (2009). A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network. |
|
1989 |
|
Aggarwal, R., Kaur, L., & Aggarwal, H. (2009). Design and reliability analysis of a new fault-tolerant multistage interconnection network. Icgst-cnir journal, 8(2), 17-23. |
|
1990 |
|
Nath, R., & Sehgal, P. K. (2009). A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network. |
|
1991 |
|
Shanthi, K., & Murugan, D. Pair-wise key agreement and hop-by-hop authentication protocol for MANET. Wireless Networks, 1-9. |
|
1992 |
|
H. Mittal, P. Bhatia, P. Goswami. "Software Quality Assessment Based on Fuzzy Logic Technique". International Journal of Soft Computing Applications,(3):105-112, 2008 |
|
1993 |
|
A. H. A. Hashim, A. N. Ahmed, A. B. Mahfouz, S. Khan , “A Context Transfer Approach to Enhance Mobile Multicast”, International Journal of Computer Science and Security (IJCSS), 2(4), pp. 9 – 17, 2008. |
|
1994 |
|
A. Kumar, R. Kumar and P. S. Grover, “Towards a Unified Framework for Cohesion Measurement in Aspect-Oriented Systems”, in Proceedings of the 19th Australian Conference on Software Engineering IEEE Computer Society Washington, DC, USA, 2008. |
|
1995 |
|
A. Kumar, R. Kumar and P. S. Grover, “Towards a Unified Framework for Complexity Measurement in Aspect-Oriented Systems”, in Proceedings of the International Conference on Computer Science and Software Engineering - Volume 02 IEEE Computer Society Washington, DC, USA, 2008. |
|
1996 |
|
A. Kumar, R. Kumar and P.S. Grover, “Notice of Violation of IEEE Publication Principles Towards a Unified Framework for Complexity Measurement in Aspect-Oriented Systems”, in Computer Science and Software Engineering, 2008 International Conference, Hubei, 12-14 December 2008. |
|
1997 |
|
A. Kumar, R. Kumar and P.S. Grover, “Notice of Violation of IEEE Publication Principles Towards a Unified Framework for Cohesion Measurement in Aspect-Oriented Systems”, in Software Engineering, ASWEC 2008. 19th Australian Conference, Perth, WA, 26-28 Mar, 2008. |
|
1998 |
|
K. Avadhesh, K. Rajesh and P.S Grover, “A Critical Review of Cohesion Measures and Measurement Frameworks in Aspect-Oriented Systems”, in Proceedings of 2nd National Conference: INDIACom- 2008, Computing for National Development, New Dehli, India, 2008. |
|
1999 |
|
M. S Salam, D. Mohamad and S. H Salleh, “Insertion Reduction in Speech Segmentation Using Neural Network”, in Information Technology, 2008. ITSim International Symposium, Kuala Lumpur, 26-28 Aug. 2008, pp.no. 1-7. |
|
2000 |
|
A. H. A. Hashim , A. N. Ahmed , A. B. Mahfouz and S. Khan, “A Context Transfer Approach to Enhance Mobile Multicast”, International Journal of Computer Science and Security (IJCSS), 2(4), pp. 9 – 17, 2008. |
|
2001 |
|
R. Abdolee, T. A. Rahman and V. Vakilan, “Elements Space and Amplitude Perturbation Using Genetic Algorithm for Antenna Array Sidelobe Cancellation”, Signal Processing: An International Journal (SPIJ), 2(2), pp. 10 – 16, 2008. |
|
2002 |
|
E. Atwell, B. A. Shawar, “An AI-Inspired Intelligent Agent/Student Architecture to Combine Language Resources Research and Teaching”, in Proceedings of LREC, 2008. |
|
2003 |
|
B. A. Shawar, “Developing an online library system for AOU as a knowledge management tool”, Presented at CSREA EEECSREA Press (2008), pp. 427-431. |
|
2004 |
|
H. S. Guruprasad and H. D. Maheshappa , “Dynamic Load Balancing Architecture for Distributed VoD using Agent Technology”, International Journal of Computer Science and Security (IJCSS), 2(5), pp. 13 – 22, 2008. |
|
2005 |
|
Z. A. Shamsan and T. B. A. Rahman, “On The Comparison of Intersystem Interference Scenarios Between Imt-Advanced and Fixed Services Over Various Deployment Areas At 3500 MHZ”, PIER C Progress In Electromagnetics Research C, 5, pp. 169-185, 2008. |
|
2006 |
|
Guruprasad, H. S., & Maheshappa, H. D. (2008). Dynamic load balancing architecture for distributed VoD using agent technology. International Journal of Computer Science & Security (IJCSS), 2(5), 14-20. |
|
2007 |
|
M. N. Tahir, "Purpose Engineering for Contextual Role-Based Access Control (C-RBAC)", International Journal of Engineering (IJE), 2(3), pp. 41 - 50, 2008. |
|
2008 |
|
Shaban, D. N., Ibrahim, M. H., & Nossair, Z. B. enhanced verifier-based password authenticated key agreement protocol for three-parties. |
|
2009 |
|
Kumar, A., Kumar, R., & Grover, P. S. (2008, March). Notice of Violation of IEEE Publication Principles Towards a Unified Framework for Cohesion Measurement in Aspect-Oriented Systems. In Software Engineering, 2008. ASWEC 2008. 19th Australian Conference on (pp. 57-65). IEEE. |
|
2010 |
|
Patiala, P., Bahadur, G. T., & Indraprastha, G. G. S. (2008). Towards a unified framework for cohesion measurement in aspect-oriented systems. |
|
2011 |
|
Kumar, A., Kumar, R., & Grover, P. S. (2008, December). Towards a unified framework for complexity measurement in aspect-oriented systems. In 2008 International Conference on Computer Science and Software Engineering (pp. 98-103). IEEE. |
|
2012 |
|
Kumar, A., Kumar, R., & Grover, P. S. (2008). A Critical Review of Cohesion Measures and Measurement Frameworks in Aspect-Oriented Systems. In Proc. 2nd National Conference on Computing for National Development (INDIACom-2008) (pp. 415-420). |
|
2013 |
|
Kumar, A., Kumar, R., & Grover, P. S. (2008, December). Notice of Violation of IEEE Publication Principles Towards a Unified Framework for Complexity Measurement in Aspect-Oriented Systems. In Computer Science and Software Engineering, 2008 International Conference on (Vol. 2, pp. 98-103). IEEE. |
|
2014 |
|
Shawar, B. A. (2008). Developing an Online Library System for AOU as a Knowledge Management Tool. In CSREA EEE (pp. 427-431). |
|
2015 |
|
Hashim, A. H. A., Ahmed, A. N., MAHFOUZ, A. B., & Khan, S. (2008). A Context Transfer Approach to Enhance Mobile Multicast. International Journal of Computer Science and Security (IJCSS), 2(4), 9. |
|
2016 |
|
V. B. Paul and H.P. Yeow, “Hand-Size Variations Effect on Mobile Phone Texting Satisfaction”, Ubiquitous Computing and Communication Journal, 2 (5), pp. 115-122, 2007. |
|
2017 |
|
M. Devare and A. Kumar, “Clustering and Classification (Time Series analysis) Based Congestion Control Algorithm: Data Mining Approach”, International Journal of Computer Science and Network Security (IJCSNS), 7 (9), pp. 241-246, Mar. 2007. |
|
2018 |
|
Radouane, m., boujiha, t., messoussi, r., & touahni, R. (2007). seerable pyramid transform and opimals blocks to ensure robustness of images watermarking. |
|
2019 |
|
M. Andrade and M. A. M. Ferreira, “Criminal and Civil Identification with DNA Databases Using Bayesian Networks”, International Journal of Security (IJS), 3(4), pp. 65 – 74, 2009. |
|
2020 |
|
M. K. Shan, “Discovering Color Styles from Fine Art Images of Impressionism”, International Journal of Computer Science and Security (IJCSS), 3(4), pp. 314 – 324, 2009. |
|
2021 |
|
D. Lavanya and Dr. K.U. Rani, “Performance Evaluation of Decision Tree Classifiers on Medical Datasets”, International Journal of Computer Applications, 26(4), pp. 1-4, 2011. |
|
2022 |
|
S. Soni and S. Shrivastava, “Classification of Indian Stock Market Data Using Machine Learning Algorithms”, International Journal on Computer Science and Engineering, 02(09), pp. 2942-2946, 2010. |
|
2023 |
|
T.N. Tsai, “Development of a Soldering Quality Classifier System Using a Hybrid Data Mining Approach”, Expert Systems with Applications, 39(5), pp. 5727–5738, December 2011. |
|
2024 |
|
W. Okori and J. Obua, “Machine Learning Classification Technique for Famine Prediction”, in Proceedings of the World Congress on Engineering 2011 Vol. II WCE 2011, London, U.K., July 6 - 8, 2011. |
|
2025 |
|
S. M. Elayidom , S. M. Idikkula and J. Alexander, “Applying Statistical Dependency Analysis Techniques in A Data Mining Domain”, International Journal of Data Engineering (IJDE), 1(2), pp. 14 – 24, 2010. |
|
2026 |
|
W. Okori and J. Obua, “Supervised Learning Algorithms for Famine Prediction”, Applied Artificial Intelligence: An International Journal, 25(9), pp. 822-835, 2011. |
|
2027 |
|
Y. M. Lazim and F. Mohamed, “Applying Rough Set Theory in Multimedia Data Classification”, International Journal on New Computer Architectures and Their Applications, 1(3), pp. 706 - 716, 2011. |
|
2028 |
|
K.Vaitheki and R.Tamijetchelvy, “A Havoc Proof for Secure and Robust Audio Watermarking”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 536 – 549, 2010. |
|
2029 |
|
E. M. Mohamed, Y. M. Y. Hasan and H. Furukawa, “Novel Remotely Keyed Encryption Schemes for Smart Card Applications”, in Proceedings, Communications (ICC), 2011 IEEE International Conference, Kyoto, 5-9 June 2011, pp. 1-5. |
|
2030 |
|
R. Shakerian, T. M. Pour, S.H. Kamali and M. Hedayati, “An Identity Based Public Key Cryptography Blind Signature Scheme from Bilinear Pairings”, in Proceedings, Computer Science and Information Technology, 3rd IEEE International Conference, Chengdu, pp. 28-32, 9-11 July 2010. |
|
2031 |
|
Raghuvamshi, A., & Premchand, P. Cryptanalysis of Verifier-Based Password Authenticated Key Agreement Protocol for Three Parties. Research Journal of Recent Sciences ______________________________________________________________ ISSN, 2277, 2502. |
|
2032 |
|
de Oliveira, R. R., Sanchez, R. V. V., & Estrella, J. C. Evaluation of Maintainability among RESTful and SOAP-WSDL web services approaches. |
|
2033 |
|
Antonio, T., & Paramita, A. S. (2015). Feature Selection Technique Impact for Internet Traffic Classification Using Naïve Bayesian. Jurnal Teknologi, 72(5). |
|
2034 |
|
Suryaputra, A., Samopa, F., & Hindayanto, B. C. (2014). klasterisasi dan analisis trafik internet menggunakan fuzzy c mean dengan ekstraksi fitur data. Jurnal Informatika, 12(1), 33-39. |
|
2035 |
|
Paramita, A. S., Samopa, F., & Hindayanto, B. C. (2014). Klasterisasi dan Analisis Trafik Internet Menggunakan Fuzzy C Mean Dengan Ekstraksi Fitur Data. |
|
2036 |
|
Paramita, A. S. (2014). Feature Selection Technique Using Principal Component Analysis For Improving Fuzzy C-Mean Internet Traffic Classification. Australian Basic and Applied Sciences (AJBAS): 2014 International on Engineering Conference on Sciences and Technology Innovation–ISSN: 1997-8178–American-Eurasian Network for Scientific Information (AENS |
|
2037 |
|
Ghaffari, M., & Ghadiri, N. (2014). Ambiguity-Driven Fuzzy C-Means Clustering: How to Detect Uncertain Clustered Records. arXiv preprint arXiv:1409.2821. |
|
2038 |
|
Finsterbusch, M., Richter, C., Rocha, E., Muller, J. A., & Hanssgen, K. (2014). A survey of payload-based traffic classification approaches. Communications Surveys & Tutorials, IEEE, 16(2), 1135-1156. |
|
2039 |
|
Li, B., Springer, J., Bebis, G., & Gunes, M. H. (2013). A survey of network flow applications. Journal of Network and Computer Applications, 36(2), 567-581. |
|
2040 |
|
Arndt, D. J. (2012). An Investigation of Using Machine Learning with Distribution Based Flow Features for Classifying SSL Encrypted Network Traffic. |
|
2041 |
|
Björkkvist, P. (2011). Comparative study of metrics for IPTV transport in the access network. |
|
2042 |
|
Barker, J., Hannay, P., & Szewczyk, P. (2011, October). Using traffic analysis to identify the second generation onion router. In Embedded and Ubiquitous Computing (EUC), 2011 IFIP 9th International Conference on (pp. 72-78). IEEE. |
|
2043 |
|
McCarthy, C. (2011, April). An investigation on identifying ssl traffic. In Computational Intelligence for Security and Defense Applications (CISDA), 2011 IEEE Symposium on (pp. 115-122). IEEE. |
|
2044 |
|
Barker, J., Hannay, P., & Bolan, C. (2010). Using Traffic Analysis to Identify Tor Usage-A Proposed Study. In Security and Management (pp. 620-623). |
|
2045 |
|
McCarthy, C. (2010). An Investigation on Detecting Applications Hidden in SSL Streams using Machine Learning Techniques. |
|
2046 |
|
Joevivek, V., Chandrasekar, N., & Srinivas, Y. (2010). Improving seismic monitoring system for small to intermediate earthquake detection. International Journal of Computer Science and Security (IJCSS), 4(3), 308. |
|
2047 |
|
Shukla, D., Tiwari, V., Thakur, S., & Deshmukh, A. K. (2009). Share loss analysis of internet traffic distribution in computer networks. International Journal of Computer Science and Security (IJCSS), 3(5), 414-427. |
|
2048 |
|
Shukla, D., Tiwari, V. K., Thakur, S., & Tiwari, M. (2009). A comparison of methods for internet traffic sharing in computer network. International Journal of Advanced Networking,(IJANA), 1(3), 164-169. |
|
2049 |
|
Dahab, A. Y., bin Md Said, A., & bin Hasbullah, H. (2009). Application of extreme value theory to bursts prediction. Signal Processing: An International Journal (SPIJ), 3(4), 55. |
|
2050 |
|
Mohd, A. B., & bin Mohd Nor, S. (2009). Near Real Time Online Flow-Based Internet Traffic Classification Using Machine Learning (C4. 5). Abuagla Babiker Mohammed, Assoc. Prof. Dr. Sulaiman Mohd Nor., 3(4), 370. |
|
2051 |
|
Mohammed, A. B., & Nor, S. M. Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4. 5). International Journal of Engineering (IJE), 3(4), 370. |
|
2052 |
|
Shojanazeri, H., Adnan, W. A. W., & Ahmad, S. M. S. (2013). Video Watermarking Techniques for Copyright protection and Content Authentication. International Journal of Computer Information Systems and Industrial Management Applications, 5, 652-660. |
|
2053 |
|
Shojanazeri, H., Adnan, W. A. W., Ahmad, S. M. S., & Saripan, M. I. (2011, December). Analysis of watermarking techniques in video. In Hybrid Intelligent Systems (HIS), 2011 11th International Conference on (pp. 486-492). IEEE. |
|
2054 |
|
Padmanabhan, S. A., & Chandramathi, S. (2011, December). A proficient video encoding system through a novel motion estimation algorithm. In Advanced Computing (ICoAC), 2011 Third International Conference on (pp. 151-156). IEEE. |
|
2055 |
|
Vaitheki, K., & Tamijetchelvy, R. (2010). A Havoc Proof For Secure And Robust Audio Watermarking. International Journal of Computer Science and Security (IJCSS), 3(6), 536. |
|
2056 |
|
Oueslati, S., Cherif, A., & Solaiman, B. A new scheme of image Watermarking based on method Fuzzy C-means. |
|
2057 |
|
Namazi, F., Karami, M. R., & Ghaderi, R. Robust Image Watermarking by Finite Radon, Wavelet and SVD. |
|
2058 |
|
Ntalianis, K., & Tsapatsoulis, N. Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks. |
|
2059 |
|
Kulkarni, A., & Jagtap, S. V. Email encryption based on elliptic curve cryptography for Android mobile devices. |
|
2060 |
|
Nusra, A., & Adiwijaya, u. n. w. penyisipan data pada citra medis menggunakan vector quantization dan pewarnaan graf menggunakan algoritma genetika. |
|
2061 |
|
Kishore, N. (2015). Parllel hashing algorithms for security and Forensic Applicatons. |
|
2062 |
|
Hoelz, B. W., & Ralha, C. G. (2013, March). A framework for semantic annotation of digital evidence. In Proceedings of the 28th Annual ACM Symposium on Applied Computing (pp. 1966-1971). ACM. |
|
2063 |
|
Al-Fedaghi, S., & Al-Babtain, B. (2012). Modeling the forensics process. Int. J. Security Appl, 6(4). |
|
2064 |
|
Tanner, A., Dampier, D., & Thompson, J. (2012, November). On developing a conceptual modeling report management tool for digital forensic investigations. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 445-450). IEEE. |
|
2065 |
|
Buang, M. F. M., & Daud, S. M. (2012, May). A web-based KM system for digital forensics-knowledge sharing capability. In Multimedia Computing and Systems (ICMCS), 2012 International Conference on (pp. 528-533). IEEE. |
|
2066 |
|
Tanner, A., & Duncan, S. On Integrating Mobile Applications into the Digital Forensic Investigative Process. |
|
2067 |
|
Ayokunle, T. B., Ogah, U. S., & Binitie, A. P. (2015). Encryption and Decryption of Messages Using Advanced Encryption Standard and System of Nonlinear Equations. International Journal of Pure and Applied Sciences and Technology, 27(1), 1. |
|
2068 |
|
Aishwarya, J., Palanisamy, V., & Kanagaram, K. (2014). An Extended Version of Four-Square Cipher using 10 X 10 Matrixes. International Journal of Computer Applications, 97(21). |
|
2069 |
|
Jain, R., Jejurkar, R., Chopade, S., Vaidya, S., & Sanap, M. (2014). AES Algorithm Using 512 Bit Key Implementation for Secure Communication. International journal of innovative Research in Computer and Communication Engineering, 2(3). |
|
2070 |
|
Acharya, K., Sajwan, M., & Bhargava, S. (2014). Analysis of Cryptographic Algorithms for Network Security. International Journal of Computer Applications Technology and Research, 3(2), 130-135. |
|
2071 |
|
Shukla, S., & Kumar, D. (2014). Cloud’s Software-Security as a Service (S-SaaS) via Biometrics. |
|
2072 |
|
Kaur, A., & Singh, H. (2014). Security in WLAN-Review of Security and Throughput Tradeoff. |
|
2073 |
|
Rajanbabu, D. T., & Raj, C. (2014). Multi level encryption and decryption tool for secure administrator login over the network. Indian Journal of Science and Technology, 7(4), 8-14. |
|
2074 |
|
Singh, D., & Shukla, S. (2014). Cloud’s SaaS Security by Biometric Concept. International Journal of Computer Science and Engineering. |
|
2075 |
|
Acevedo, E., Martínez, Á., Acevedo, M., & Martínez, F. (2013). A Novel Text Encryption Algorithm. Advances in Soft Computing Techniques, 91. |
|
2076 |
|
Zirra, P. B., Wajiga, G. M., & Boukari, S. (2012). Generating Ciphertext Using Systems of Equations: An Asymmetric Key Approach. Int. J. Pure Appl. Sci. Technol, 8(2), 47-53. |
|
2077 |
|
Golestani, M. R., Khademi, M., & Moeini, A. A New Approach to Segmentation of On-Line Persian Cursive Words. International Journal of Computer Applications Technology and Research, 3(2), 88-92. |
|
2078 |
|
Aishwarya, J., Palanisamy, V., & Kanagaram, K. Comparative Analysis of Extended Version of Four-Square Cipher Using 8 X 8 and 10 X 10 Matrices. |
|
2079 |
|
Chuchuen, C., & Chanvarasuth, P. Relationship between Phishing Techniques and User Personality Model of Bangkok Internet Users. |
|
2080 |
|
Taalohi, M., Langari, N., & Tabatabaee, H. (2015). identifying phishing websites by techniques hyper heuristic and machine learning. Science International, 27(3). |
|
2081 |
|
Abu-Shawar, B., & Al-Sadi, J. Knowledge management view extracted from learning management system used at AOU. |
|
2082 |
|
Hiary, H., & Abu-Shawar, B. JU Computerized Systems and its Impact on E-Learning. |
|
2083 |
|
Castro, g. G., domínguez, e. L., velasquez, y. H., & matla, y. R. Sistema de aprendizaje móvil consciente de contexto. |
|
2084 |
|
Anwar, r. W., sherimon, p. C., & vinu, p. V. A semantic web approach for searching and accessing information in blended learning systems. |
|
2085 |
|
Singh, U., Kumar, V., & Kaur, K. Experimental Implementation of AODV Routing Protocol in Mobile Adhoc Networks. |
|
2086 |
|
Addanki, U. K. Simulation and study of Reacting Routing Protocols in MANETs. |
|
2087 |
|
Sruthi, T. S. SURVEY ON POWER AWARE AND ENERGY EFFICIENT ROUTING PROTOCOL IN MANET. |
|
2088 |
|
Hoc, o. k. p. r. a. pada mobile ad hoc network (manet) menggunakan algoritma semut performance optimization of ad hoc on demand distance vector (aodv) using ant algorithm at mobile ad hoc network. |
|
|
|