Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Science and Security

ISSN: 1985--1553
Publisher: Computer Science Journals


ADD TO MY LIST
 
A New System for Clustering and Classification of Intrusion Detection System Alerts Using Self-Organizing Maps PDF available

Author(s): Amir Azimi Alasti Ahrabi, Ahmad Habibizad Navin, Hadi Bahrbegi, Mir Kamal Mirnia, Mehdi Bahrbegi, Elnaz Safarzadeh & Ali Ebrahimi
Volume: 4
Issue: 6
Year: 2011
Enhanced Mobile IP Handover Using Link Layer Information PDF available

Author(s): Mohamed Alnas & Mahmud Mansour
Volume: 4
Issue: 6
Year: 2011
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distributed Wireless Sensor Networks PDF available

Author(s): Muktikanta Sa, Manas Ranjan Nayak & Amiya Kumar Rath
Volume: 4
Issue: 6
Year: 2011
Performance Comparison of Automatic Speaker Recognition using Vector Quantization by LBG KFCG and KMCG PDF available

Author(s): Dr. H B Kekre, Vaishali Kulkarni
Volume: 4
Issue: 6
Year: 2011
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding PDF available

Author(s): Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar
Volume: 4
Issue: 6
Year: 2011
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method

Author(s): Asfandyar Khan | Nurul Hasan | Azween Abdullah
Volume: 3
Issue: 6
Year: 2010
Implementation of Agent Based Dynamic Distributed Service PDF available

Author(s): A.Damodaram | Ravi Prakash Reddy
Volume: 3
Issue: 6
Year: 2010
A Parallel Framework for Multilayer Perceptron for Human Face Recognition PDF available

Author(s): Debotosh Bhattacharjee | Dipak Kumar Basu | Mahantapas Kundu | Mita Nasipuri | Mrinal Kanti Bhowmik
Volume: 3
Issue: 6
Year: 2010
Hybrid Compression Encryption Technique for Securing SMS

Author(s): Ahmed M Mahfouz | Awny A. Ahmed | Bahgat A. Abdel-latef | Tarek
Volume: 3
Issue: 6
Year: 2010
Knowledge Discovery Through Data Visualization Of Drive Test Data PDF available

Author(s): Abhijit S. Pandya | Robert Stone | Saeed Rajput | Sam Hsu | Shalini Saxena
Volume: 3
Issue: 6
Year: 2010
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy Prevention PDF available

Author(s): S. Zeeshan Hussain | Vineet Kumar Sharma | S.A.M. Rizvi
Volume: 3
Issue: 6
Year: 2010
A Wavelet - Based Object Watermarking System for MPEG4 Video PDF available

Author(s): A.Essaouabi | E.Ibnelhaj | F.Regragui
Volume: 3
Issue: 6
Year: 2010
A Genetic Algorithm for Reliability Evaluation of a Stochastic- Flow Network With Node Failure PDF available

Author(s): A. Younes & M. R. Hassan
Volume: 4
Issue: 6
Year: 2011
A Novel Method for Quantitative Assessment of Software Quality PDF available

Author(s): C. V. Srikrishna | Neelam Bawane
Volume: 3
Issue: 6
Year: 2010
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network PDF available

Author(s): Virendra Singh Kushwah & Gaurav Sharma
Volume: 4
Issue: 6
Year: 2011
DDoS Protections for SMTP Servers PDF available

Author(s): Michael Still & Eric C. McCreath
Volume: 4
Issue: 6
Year: 2011
A Security Analysis Framework Powered by an Expert System PDF available

Author(s): Maher Mohamed Gamal, Dr. Bahaa Hasan & Dr. Abdel Fatah Hegazy
Volume: 4
Issue: 6
Year: 2011
Anomaly Detection of IP Header Threats PDF available

Author(s): S.H.C. Haris, Ghossoon M. Waleed, R.B. Ahmad & M.A.H.A. Ghani
Volume: 4
Issue: 6
Year: 2011
A Havoc Proof for Secure and Robust Audio Watermarking PDF available

Author(s): K.Vaitheki
Volume: 3
Issue: 6
Year: 2010
Hierarchical Non-blocking Coordinated Checkpointing Algorithms for Mobile Distributed Computing PDF available

Author(s): Parveen Kumar | R.K. Chauhan | Surender
Volume: 3
Issue: 6
Year: 2010
High Capacity and Security Steganography Using Discrete Wavelet Transform PDF available

Author(s): H S Manjunatha Reddy | K B Raja
Volume: 3
Issue: 6
Year: 2010
On the Usage of Chained Codes in Cryptography PDF available

Author(s): Ammar Bouallegue | Omessaad Hamdi - France | Sami Harari
Volume: 3
Issue: 6
Year: 2010
A lexisearch Algorithm for the Bottleneck Traveling Salesman Problem PDF available

Author(s): Zakir H. Ahmed
Volume: 3
Issue: 6
Year: 2010
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party PDF available

Author(s): Abhishek Dwivedi | Ajay Sharma | Awakash Mishra | Deo Brat Ojha | Ramveer Singh | Shree Garg
Volume: 3
Issue: 6
Year: 2010
Dynamic Audio-Visual Client Recognition modelling PDF available

Author(s): Tijjani Adam Shuwa, U. Hashim
Volume: 5
Issue: 5
Year: 2011
Evaluation of Logistic Regression and Neural Network Model With Sensitivity Analysis on Medical Datasets PDF available

Author(s): Raghavendra B.K. & S.K. Srivatsa
Volume: 5
Issue: 5
Year: 2011
Detection of Botnets using Honeypots and P2P Botnets PDF available

Author(s): Rajab Challoo & Raghavendra Kotapalli
Volume: 5
Issue: 5
Year: 2011
Maintenance of Network Connectivity Across Process Migration PDF available

Author(s): Mehdi Bahrbegi, Hadi Bahrbegi, Amir Azimi Alasti Ahrabi & Elnaz Safarzadeh
Volume: 5
Issue: 5
Year: 2011
Phishing Website Detection Using Particle Swarm Optimization PDF available

Author(s): Radha Damodaram & Dr.M.L.Valarmathi
Volume: 5
Issue: 5
Year: 2011
A Novel Steganography Technique that Embeds Security along with Compression PDF available

Author(s): Anuradha, Nidhi & Rimple
Volume: 5
Issue: 5
Year: 2011
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding PDF available

Author(s): P.Nithyanandam, T.Ravichandran, N.M.Santron, E. Priyadharshini
Volume: 5
Issue: 5
Year: 2011
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks PDF available

Author(s): Manal AL-Bzoor, Laiali Almazaydeh, Syed S Rizvi
Volume: 5
Issue: 5
Year: 2011
Design and Implementation of EZW & SPIHT Image Coder for Virtual Images PDF available

Author(s): Priyanka Singh & Priti Singh
Volume: 5
Issue: 5
Year: 2011
Non-Specialized File Format Extension PDF available

Author(s): Blake W. Ford & Khosrow Kaikhah
Volume: 5
Issue: 5
Year: 2011
An Approach for Managing Knowledge in Digital Forensics Examinations PDF available

Author(s): April L. Tanne | David A. Dampie
Volume: 4
Issue: 5
Year: 2010
A Proposed Security Model for Web Enabled Business Process Management System PDF available

Author(s): M. S. Kandi | Mohamed Abu El-Soud | A. E. Hassan | Abd elghafar M. Elhady
Volume: 4
Issue: 5
Year: 2010
Motion tracking in MRI by Harmonic State Model: Case of heart left ventricle

Author(s): P. Lionel Evina Ekmobo | Mohammed Oumsis | Mohammed Meknassi
Volume: 3
Issue: 5
Year: 2009
Dynamic Load Balancing Architecture for Distributed VoD using Agent Technology PDF available

Author(s): H S Guruprasad | Dr. H D Maheshappa
Volume: 2
Issue: 5
Year: 2008
Application of new distance matrix to phylogenetic tree construction PDF available

Author(s): P.V.Lakshmi | Allam Appa Rao
Volume: 2
Issue: 5
Year: 2008
DIRECT TRUST ESTIMATED ON DEMAND PROTOCOL FOR SECURED ROUTING IN MOBILE ADHOC NETWORKS PDF available

Author(s): N.Bhalaji | Druhin mukherjee | Nabamalika banerjee | A.Shanmugam
Volume: 2
Issue: 5
Year: 2008
A Novel Score-Aware Routing Algorithm In Wireless Sensor Networks PDF available

Author(s): Amir Masoud Rahmani | Arash Nasiri Eghbali | Hamid reza Hassaniasl | Mashaallah Abbasi Dezfuli
Volume: 3
Issue: 5
Year: 2009
A Novel Luby-Rackoff Based Cipher in a NewFeistel-Network Based LPRKES for Smart Cards PDF available

Author(s): Ehab Mahmoud Mohamed | Hiroshi Furukawa | Yasien Mahmoud
Volume: 3
Issue: 5
Year: 2009
Key Protection for Private Computing on Public Platforms PDF available

Author(s): Thomas H Morris | V.S.S. Nair
Volume: 3
Issue: 5
Year: 2009
Performance Improvement and Efficient Approach for Mining Periodic Sequential Acess Patterns PDF available

Author(s): D. Vasumathi | Dr. A. Govardhan | K.Venkateswara Rao
Volume: 3
Issue: 5
Year: 2009
Mining Spatial Gene Expression Data Using Association Rules PDF available

Author(s): M.Anandhavalli | M.K.Ghose | K.Gauthaman
Volume: 3
Issue: 5
Year: 2009
Performance Analysis of Mobile Ad-hoc Network using AODV Protocol PDF available

Author(s): Aditya Goel | Ajali Sharma
Volume: 3
Issue: 5
Year: 2009
Testing Various Similarity Metrics and their Permutations with Clustering Approach in Context Free Data Cleaning

Author(s): Sohil Dineshkumar Pandya | Paresh V Virparia
Volume: 3
Issue: 5
Year: 2009
An Efficient Password Security of Multi-Party Key Exchange Protocol Based on ECDLP PDF available

Author(s): Banshidhar Majhi | Jayaprakash Kar
Volume: 3
Issue: 5
Year: 2009
Securing Image Transmission Using in- Compression Encryption Technique PDF available

Author(s): Shaimaa A. El-said | Khalid F. A. Hussein | Mohamed M. Fouad
Volume: 4
Issue: 5
Year: 2010
Share Loss Analysis of Internet Traffic Distribution in Computer Networks PDF available

Author(s): Arvind Kumar Deshmukh | Diwakar Shukla | Sanjay Thakur | Virendra kumar Tiwari
Volume: 3
Issue: 5
Year: 2009
Performance Variation of LMS And Its Different Variants PDF available

Author(s): Sanjeev Dhull | Dr.Sandeep Arya | Dr.O.P Sahu
Volume: 4
Issue: 5
Year: 2010
Robust Image Watermarking Scheme Based on Wavelet Technique PDF available

Author(s): Aree Ali Mohammed, Haval Mohammed Sidqi
Volume: 5
Issue: 4
Year: 2011
Adaptive and Faster Approach to Fingerprint Minutiae Extraction and Validation PDF available

Author(s): Iwasokun G. B., Akinyokun O. C., Alese B. K. & Olabode O.
Volume: 5
Issue: 4
Year: 2011
A proposed Solution: Data Availability and Error Correction in Cloud Computing PDF available

Author(s): Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma
Volume: 5
Issue: 4
Year: 2011
Multi Directional Geographical IP Traceback using Direction Ratio Sampling Algorithm (DRSA)

Author(s): Karthik S | V.P.Arunachalam | T.Ravichandran
Volume: 3
Issue: 4
Year: 2009
Content Based Image Retrieval based on Color, Texture and Shape features using Image and its complement PDF available

Author(s): Jagadeesh Pujari | P. S. Hiremath
Volume: 1
Issue: 4
Year: 2007
Similarity-Based Estimation for Document Summarization using Fuzzy Sets PDF available

Author(s): Masrah Azrifah Azmi Murad | Trevor Martin
Volume: 1
Issue: 4
Year: 2007
A Vertical Search Engine – Based On Domain Classifier PDF available

Author(s): Rajashree Shettar | Rahul Bhuptani
Volume: 2
Issue: 4
Year: 2008
A Context Transfer Approach to Enhance Mobile Multicast PDF available

Author(s): AISHA-HASSAN A. HASHIM | ABDI NASIR AHMED | ABDULRHMAN BIN MAHFOUZ | Sheroz Khan
Volume: 2
Issue: 4
Year: 2008
On Reliability Analysis of Fault-tolerant Multistage Interconnection Networks PDF available

Author(s): Rinkle Aggarwal | Dr. Lakhwinder Kaur
Volume: 2
Issue: 4
Year: 2008
Improved Authentication and Key Agreement Protocol Using Elliptic Curve Cryptography PDF available

Author(s): A. Chandrasekar | V.R. Rajasekar | V. Vasudevan
Volume: 3
Issue: 4
Year: 2009
Discovering Color Styles from Fine Art Images of Impressionism PDF available

Author(s): Man-Kwan Shan
Volume: 3
Issue: 4
Year: 2009
A Noval Security Model for Indic Scripts - A Case Study on Telugu PDF available

Author(s): Bhadri Raju MSVS | Vishnu Vardhan B | Naidu G A | Pratap Reddy L | Vinaya Babu A
Volume: 3
Issue: 4
Year: 2009
CifrarFS – Encrypted File System Using FUSE PDF available

Author(s): Anagha Kulkarni | Vandana Inamdar
Volume: 3
Issue: 4
Year: 2009
RSVP Extended QoS Support for Heterogeneous Two-Tier Personal Communication Systems PDF available

Author(s): Long-Sheng Li | Gwo-Chuan Lee | ilung Pranata - Australia | Wei-Yu Chien
Volume: 3
Issue: 4
Year: 2009
A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback PDF available

Author(s): Karthik.S | Dr.V.P.Arunachalam | Dr.T.Ravichandran
Volume: 3
Issue: 4
Year: 2009
Steganography using Dictionary Sort on Vector Quantized Codebook

Author(s): Kalpana Sagvekar | Sudeep Thepade | Tanuja Sarode | Archana Athawale | H.B.Kekre
Volume: 4
Issue: 4
Year: 2010
A Lower Bound Study on Software Development Effort

Author(s): Lung-Lung Liu
Volume: 4
Issue: 4
Year: 2010
Utilizing AOU’VLE With Other Computerized Systems PDF available

Author(s): Bayan Abu-Shawar
Volume: 1
Issue: 4
Year: 2007
Cutting Edge Practices For Secure Software Engineering

Author(s): Kanchan Hans
Volume: 4
Issue: 4
Year: 2010
Deploying E-Mail as an Official Communication Tool: Technical Prospect

Author(s): wasan shaker awad
Volume: 4
Issue: 4
Year: 2010
Hierarchies in Contextual Role- Based Access Control Model (C-RBAC)

Author(s): Muhammad Nabeel Tahir
Volume: 2
Issue: 4
Year: 2008
Image Steganography Techniques: An Overview PDF available

Author(s): Nagham Hamid | Abid Yahya | R. Badlishah Ahmad | Osamah M. Al-Qershi
Volume: 6
Issue: 3
Year: 2012
Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireless Sensor Networks PDF available

Author(s): David Fotue | Houda Labiod | Thomas Engel
Volume: 6
Issue: 3
Year: 2012
Finding Relationships Between the Our-NIR Cluster Results PDF available

Author(s): N.Sudhakar Reddy & K.V.N.Sunitha
Volume: 5
Issue: 3
Year: 2011
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Projection PDF available

Author(s): Anissa Bouzalmat, Naouar Belghini, Arsalane Zarghili, Jamal Kharroubi & Aicha Majda
Volume: 5
Issue: 3
Year: 2011
Black Box Backup System PDF available

Author(s): iyad Ahmad Aldasouqi, Arafat Awajan
Volume: 5
Issue: 3
Year: 2011
Development of an Efficient Computing Multilingualism Model for Diacritical Marks in Arabic and Hindi PDF available

Author(s): Abu Sarwar Zamani, Nasser Al Arifi, Md. Mobin Akhtar
Volume: 5
Issue: 3
Year: 2011
A Distributed Approach to Defend Web Service from DDoS Attacks PDF available

Author(s): A Distributed Approach to Defend Web Service from DDoS Attacks
Volume: 5
Issue: 3
Year: 2011
Toward a New Algorithm for Hands Free Browsing PDF available

Author(s): Murad Al-Rajab & Haifaa Kattan
Volume: 5
Issue: 3
Year: 2011
Information Security Maturity Model PDF available

Author(s): Information Security Maturity Model
Volume: 5
Issue: 3
Year: 2011
Automatic Detection of Malaria Parasites for Estimating Parasitemia PDF available

Author(s): S. S. Savkare & S. P. Narote
Volume: 5
Issue: 3
Year: 2011
Survey Paper: Cryptography Is The Science Of Information Security PDF available

Author(s): Mohammed AbuTaha, Mousa Farajallah, Radwan Tahboub, Mohammad Odeh
Volume: 5
Issue: 3
Year: 2011
Diffusion of Innovation in Social Networking Sites among University Students PDF available

Author(s): Olusegun Folorunso,Rebecca O. Vincent ,Adebayo Felix Adekoya & Adewale Opeoluwa Ogunde
Volume: 4
Issue: 3
Year: 2010
A Self-Deployment Obstacle Avoidance (SOA) Algorithm for Mobile Sensor Networks PDF available

Author(s): Bryan Sarazin & Syed Rizvi
Volume: 4
Issue: 3
Year: 2010
Online Registration System PDF available

Author(s): Ala'a M. Al-Shaikh
Volume: 4
Issue: 3
Year: 2010
Decimal genetics Algorithms for Null Steering and Sidelobe Cancellation in switch beam smart antenna system. PDF available

Author(s): Mohd Tarmizi Ali | Reza Abdolee | Tharek Abd Rahman
Volume: 1
Issue: 3
Year: 2007
Development of Irregular Routing Algorithms for Parallel Computing Environment. PDF available

Author(s): Dr Yogesh Chaba | Ranjana Gulati
Volume: 1
Issue: 3
Year: 2007
Integrating - VPN and IDS - An approach to Networks Security PDF available

Author(s): Prabha Rani | Yogesh Chaba | Yudhvir Singh
Volume: 1
Issue: 3
Year: 2007
Ant Based Dynamic Source Routing Protocol to Support Multiple Quality of Service (QoS) Metrics in Mobile Ad Hoc Networks PDF available

Author(s): R.Asokan | A.M.Natarajan | C.Venkatesh
Volume: 2
Issue: 3
Year: 2008
Toward Coexistence and Sharing between IMT-Advanced and Existing Fixed Systems PDF available

Author(s): Zaid Ahmed Shamsan | Sharifah Kamilah Syed-Yusof | Tharek Abd. Rahman
Volume: 2
Issue: 3
Year: 2008
A Review of Current Routing Attacks in Mobile Ad Hoc Networks PDF available

Author(s): Rashid Hafeez Khokhar | Md Asri Ngadi | Satria Mandala
Volume: 2
Issue: 3
Year: 2008
Comparative Analysis of Serial Decision Tree Classification Algorithms PDF available

Author(s): Matthew Nwokejizie Anyanwu | Sajjan Shiva
Volume: 3
Issue: 3
Year: 2009
Discovery of Frequent Itemsets Based on Minimum Quantity and Support PDF available

Author(s): Ananthanarayana V S | Preetham Kumar
Volume: 3
Issue: 3
Year: 2009
Managing Software Change Request Process: Temporal Data Approach PDF available

Author(s): Mohd Nordin Abdul Rahman | S. Suhailan
Volume: 3
Issue: 3
Year: 2009
Design of Cryptographically Strong Generator By Transforming Linearly Generated Sequences PDF available

Author(s): Dasgupta Dipankar | Lih-Yuan Deng | Matthew Nwokejizie Anyanwu
Volume: 3
Issue: 3
Year: 2009
Intention-Based Ranking For Surface Realization In Dialogue Systems PDF available

Author(s): Aida Mustapha | MD. Nasir Sulaiman | Mohd. Hasan Selamat | Ramlan Mahmod
Volume: 3
Issue: 3
Year: 2009
System-Level Modeling of a Network-on-Chip PDF available

Author(s): Ankur Agarwal
Volume: 3
Issue: 3
Year: 2009
Improving Seismic Monitoring System for Small to Intermediate Earthquake Detection PDF available

Author(s): V. Joevivek, N. Chandrasekar & Y.Srinivas
Volume: 4
Issue: 3
Year: 2010
Text to Speech Synthesis with Prosody feature: Implementation of Emotion in Speech Output using Forward Parsing PDF available

Author(s): M.B.Chandak, Dr.R.V.Dharaskar & Dr.V.M.Thakre
Volume: 4
Issue: 3
Year: 2010
New trust based security method for mobile ad-hoc networks PDF available

Author(s): Renu Mishra, Inderpreet Kaur & Sanjeev sharma
Volume: 4
Issue: 3
Year: 2010
A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS PDF available

Author(s): G.S. Mamatha & S.C. Sharma
Volume: 4
Issue: 3
Year: 2010
Different Types of Attacks on Integrated MANET-Internet Communication PDF available

Author(s): Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay
Volume: 4
Issue: 3
Year: 2010
Design Network Intrusion Detection System using hybrid Fuzzy-Neural Network PDF available

Author(s): muna mhammad taher jawhar & Monica Mehrotra
Volume: 4
Issue: 3
Year: 2010
Hello Flood Counter Measure for Wireless Sensor Networks PDF available

Author(s): Dr. Mohamed Osama Khozium
Volume: 2
Issue: 3
Year: 2008
Component Selection Efforts Estimation– A Fuzzy Logic Based Approach PDF available

Author(s): Arun Sharma | Ashish Seth | Kirti Seth
Volume: 3
Issue: 3
Year: 2009
TOWARD THE RECOGNITION OF USER ACTIVITY BASED ON USER LOCATION IN UBIQUITOUS COMPUTING ENVIRONMENTS PDF available

Author(s): Teddy Mantoro | Media A. Ayu
Volume: 2
Issue: 3
Year: 2008
Mining Regular Patterns in Data Streams Using Vertical Format PDF available

Author(s): G. Vijay Kumar | M. Sreedevi | NVS Pavan Kumar
Volume: 6
Issue: 2
Year: 2012
A New Steganographic Method for Embedded Image In Audio File PDF available

Author(s): Dalal N. Hmood | Khamael A. Khudhiar | Mohammed S. Altaei
Volume: 6
Issue: 2
Year: 2012
Using Learning Vector Quantization in Alert Management of Intrusion Detection System PDF available

Author(s): Amir Azimi Alasti Ahrabi | Kaveh Feyzi | Zahra Atashbar Orang | Hadi Bahrbegi | Elnaz Safarzadeh
Volume: 6
Issue: 2
Year: 2012
A Comparative Analysis of Feature Selection Methods for Clustering DNA Sequences PDF available

Author(s): B.Umamageswari | B.Karthikeyan | T.Nalini
Volume: 6
Issue: 2
Year: 2012
Fuzzy Optimized Metric for Adaptive Network Routing PDF available

Author(s): Ahmad Khader Haboush
Volume: 6
Issue: 2
Year: 2012
Three Dimensional Database: Artificial Intelligence to eCommerce Web service Agents PDF available

Author(s): R.Vadivel | Dr K. Baskaran
Volume: 5
Issue: 2
Year: 2011
A Novel Approach for Efficient Resource Utilization and Trustworthy Web Service PDF available

Author(s): Marimuthu K | Ganesh Gopal D
Volume: 5
Issue: 2
Year: 2011
Design and Implementation of a Multi-Agent System for the Job Shop Scheduling Problem PDF available

Author(s): Leila Asadzadeh | Kamran Zamanifar
Volume: 5
Issue: 2
Year: 2011
Phishing: A Field Experiment PDF available

Author(s): Danuvasin Charoen, Ph.D.
Volume: 5
Issue: 2
Year: 2011
A Study of Protocols for Grid Computing Environment PDF available

Author(s): Suresh Jaganathan | Srinivasan A | Damodaram A
Volume: 5
Issue: 2
Year: 2011
Cryptographic Algorithms for Secure Data Communication PDF available

Author(s): Zirra Peter Buba | Gregory Maksha Wajiga
Volume: 5
Issue: 2
Year: 2011
Radical Data Compression Algorithm Using Factorization PDF available

Author(s): Zirra Peter Buba | Gregory Maksha Wajiga
Volume: 5
Issue: 2
Year: 2011
Concurrent Matrix Multiplication on Multi-Core Processors PDF available

Author(s): Muhammad Ali Ismail | Dr. S. H. Mirza | Dr. Talat Altaf
Volume: 5
Issue: 2
Year: 2011
A New Function-based Framework for Classification and Evaluation of Mutual Exclusion Algorithms PDF available

Author(s): Leila Omrani | Zahra Rafinezhad | Mohammadreza Keyvanpour
Volume: 5
Issue: 2
Year: 2011
Development of Information Agent Reranking By Using Weights Measurement PDF available

Author(s): Aliaa A.Youssif, Ashraf A. Darwish & Ahmed Roshdy
Volume: 4
Issue: 2
Year: 2010
Comparing The Proof By Knowledge Authentication Techniques PDF available

Author(s): S. Gkarafli & A.A. Economides
Volume: 4
Issue: 2
Year: 2010
FPGA Prototype of Robust Image Watermarking For JPEG 2000 With Dual Detection PDF available

Author(s): Pankaj U.Lande, Sanjay N. Talbar & G.N. Shinde
Volume: 4
Issue: 2
Year: 2010
Heuristics Based Genetic Algorithm for Scheduling Static Tasks in Homogeneous Parallel System PDF available

Author(s): Kamaljit Kaur, Amit Chhabra & Gurvinder Singh
Volume: 4
Issue: 2
Year: 2010
Multilevel Access Control in a MANET for a Defense Messaging system using Elliptic Curve Cryptography PDF available

Author(s): J.Nafeesa Begum, K.Kumar, Dr.V.Sumathy
Volume: 4
Issue: 2
Year: 2010
Document Topic Generation in Text Mining by Using Cluster Analysis with EROCK PDF available

Author(s): Rizwan Ahmad, Dr. Aasia Khanum
Volume: 4
Issue: 2
Year: 2010
A Novel Data Mining Algorithm for Semantic Web Based Data Cloud PDF available

Author(s): Kanhaiya Lal, N.C.Mahanti
Volume: 4
Issue: 2
Year: 2010
Managing Component-Based Systems With Reusable Components PDF available

Author(s): Arun Sharma | Rajesh Kumar | P S Grover
Volume: 1
Issue: 2
Year: 2007
Mathematical Morphology Approach for Genuine Fingerprint Feature Extraction PDF available

Author(s): Vikas Humbe | S. S. Gornale | Ramesh Manza | K. V. Kale
Volume: 1
Issue: 2
Year: 2007
New Particle Swarm Optimizer with Sigmoid Increasing Inertia Weight PDF available

Author(s): Reza Firsandaya Malik | Tharek Abdul Rahman | Siti Zaiton Mohd. Hashim | Razali Ngah
Volume: 1
Issue: 2
Year: 2007
Analysis of parameter for Local Colour Scale in Ion Trajectories PDF available

Author(s): J. M. Sharif | M. S. A. Latiff | M. A. Ngadi
Volume: 1
Issue: 2
Year: 2007
An Evaluation of Maintainability of Aspect-Oriented Systems: a Practical Approach PDF available

Author(s): Avadhesh Kumar | Rajesh Kumar | P.S. Grover
Volume: 1
Issue: 2
Year: 2007
Adaptive Approaches to Context Aware Mobile Learning Applications PDF available

Author(s): P. Govindarajulu | Uday Bhaskar Nagella
Volume: 2
Issue: 2
Year: 2008
Enhanced Intelligent Risk Divination Using Added Quality Attributes Injected ATAM and Design Patterns PDF available

Author(s): N.Sankar Ram | Paul Rodrigues
Volume: 2
Issue: 2
Year: 2008
Towards a Flow-based Internet Traffic Classification for Bandwidth Optimization PDF available

Author(s): Abuagla Babiker Mohd | Dr. Sulaiman bin Mohd Nor
Volume: 3
Issue: 2
Year: 2009
Deriving Value in Digital Media Networks PDF available

Author(s): Miguel Morales-Arroyo | Ravi S. Sharma
Volume: 3
Issue: 2
Year: 2009
Data Quality Mining using Genetic Algorithm PDF available

Author(s): Sufal Das | Sufal Das
Volume: 3
Issue: 2
Year: 2009
A Binary Replication Strategy for Large-scale Mobile Environments PDF available

Author(s): Ashraf A Fadelelmoula | P.D.D.Dominic | Azween Abdullah | Hamidah Ibrahim
Volume: 3
Issue: 2
Year: 2009
Embedding Software Engineering Disciplines in Entry-Level Programming PDF available

Author(s): Lung-Lung Liu
Volume: 3
Issue: 2
Year: 2009
Behavior Based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET PDF available

Author(s): T.V.P.Sundararajan | Dr. A.Shanmugam
Volume: 3
Issue: 2
Year: 2009
Knowledge Discovery from Students’ Result Repository: Association Rule Mining Approach PDF available

Author(s): Oladipupo O.O. & Oyelade O.J
Volume: 4
Issue: 2
Year: 2010
Parallel Computing in Chemical Reaction Metaphor with Tuple Space PDF available

Author(s): Hong Lin, Jeremy Kemp, Wilfredo Molina
Volume: 4
Issue: 2
Year: 2010
Implementation of Back-Propagation Algorithm For Renal Datamining PDF available

Author(s): P.Thrimurthy | S Sai | S.Purushothaman
Volume: 2
Issue: 2
Year: 2008
The Time Efficient Security for Broadcast Networks PDF available

Author(s): Kamaksi Prasad V2 | N H Ayachit1 | Santosh L Deshpande1
Volume: 2
Issue: 2
Year: 2008
Delegation in Role Based Access Control Model for Workflow Systems PDF available

Author(s): P R Rao | Prasanna H Bammigatti
Volume: 2
Issue: 2
Year: 2008
Modified One Time Pad Data Security Scheme: Random Key Generation Approach PDF available

Author(s): Sharad Patil | Manoj Devare | Ajay Kumar
Volume: 3
Issue: 2
Year: 2009
Analysis of Natural Language Steganography PDF available

Author(s): Shaifizat Mansor | Roshidi Din | Azman Samsudin
Volume: 3
Issue: 2
Year: 2009
Congestion and Flow Control in Homogeneous and Heterogeneous Networks: Discrete Event Simulation Model PDF available

Author(s): Manoj Devare | Ajay Kumar
Volume: 1
Issue: 2
Year: 2007
Quality and Distortion Evaluation of Audio Signal by Spectrum PDF available

Author(s): Er. Niranjan Singh | Dr. Bhupendra Verma
Volume: 6
Issue: 1
Year: 2012
New Proposed Classic Cluster Layer Architecture for Mobile Adhoc Network (cclam) PDF available

Author(s): Kuldeep Sharma | Nikhil Khandelwal | Sanjeev Kumar Singh
Volume: 6
Issue: 1
Year: 2012
Audio Steganography Coding Using the Discrete Wavelet Transforms PDF available

Author(s): Siwar Rekik | Driss Guerchi | Habib Hamam | Sid-Ahmed Selouani
Volume: 6
Issue: 1
Year: 2012
A Micro-Mobility Management Scheme for Handover and Roaming PDF available

Author(s): Debabala Swain | Siba Prasada Panigrahi | Prasanta Kumar Patra
Volume: 6
Issue: 1
Year: 2012
Algorithem and Programme for Computation of Forces Acting on Line Supports PDF available

Author(s): Abdulaziz Salem Bahaidara
Volume: 6
Issue: 1
Year: 2012
Semantic Massage Addressing based on Social Cloud Actor's Interests PDF available

Author(s): Reem M. Bahgat | Akram I. Salah | Hamada I. Abdul Wakeil
Volume: 6
Issue: 1
Year: 2012
Recourse Management Using a Fair Share Scheduler PDF available

Author(s): Suja Cherukullapurath Mana
Volume: 6
Issue: 1
Year: 2012
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System PDF available

Author(s): Razi Hosseinkhani | H. Haj Seyyed Javadi
Volume: 6
Issue: 1
Year: 2012
Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages PDF available

Author(s): Mallikka Rajalingam | Saleh Ali Alomari | Putra Sumari
Volume: 6
Issue: 1
Year: 2012
Diacritic Oriented Arabic Information Retrieval System PDF available

Author(s): Khalid Saleh Aloufi
Volume: 5
Issue: 1
Year: 2011
Systematic Digital Forensic Investigation Model PDF available

Author(s): Systematic Digital Forensic Investigation Model
Volume: 5
Issue: 1
Year: 2011
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings PDF available

Author(s): B.Umaprasada Rao & P.Vasudeva Reddy
Volume: 5
Issue: 1
Year: 2011
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile Agents PDF available

Author(s): Nirmala C R & V.Ramaswamy
Volume: 5
Issue: 1
Year: 2011
Security Model for Hierarchical Clustered Wireless Sensor Networks PDF available

Author(s): Kalpana Sharma, S. K. Ghosh, M.K. Ghose
Volume: 5
Issue: 1
Year: 2011
Authentication and Authorization Models PDF available

Author(s): More V.N
Volume: 5
Issue: 1
Year: 2011
A Novel Mathematical Based Method for Generating Virtual Samples from a Frontal 2D Face Image for Single Training Sample Face Recognition PDF available

Author(s): Reza Ebrahimpour, Masoom Nazari, Mehdi Azizi, Mahdieh Rezvan
Volume: 5
Issue: 1
Year: 2011
Image Recognition With the Help of Auto-Associative Neural Network PDF available

Author(s): Moumi Pandit, Mousumi Gupta
Volume: 5
Issue: 1
Year: 2011
Car-Following Parameters by Means of Cellular Automata in the Case of Evacuation PDF available

Author(s): Kohei Arai, Tri Harsono & Achmad Basuki
Volume: 5
Issue: 1
Year: 2011
Development of Predictor for Sequence Derived Features From Amino Acid Sequence Using Associate Rule Mining PDF available

Author(s): Manpreet Singh, Gurvinder Singh
Volume: 5
Issue: 1
Year: 2011
Stream Processing Environmental Applications in Jordan Valley PDF available

Author(s): Iyad Ahmad Aldasouqi, Jalal Atoum
Volume: 5
Issue: 1
Year: 2011
Recognition of Non-Compound Handwritten Devnagari Characters using a Combination of MLP and Minimum Edit Distance PDF available

Author(s): S. Arora, D. Bhattacharjee, M. Nasipuri, D. K. Basu & M. Kundu
Volume: 4
Issue: 1
Year: 2010
On the use of continued fractions for electronic cash PDF available

Author(s): Amadou Moctar Kane
Volume: 4
Issue: 1
Year: 2010
Texting satisfaction: does age and gender make a difference? PDF available

Author(s): Vimala Balakrishnan | Paul H. P. Yeow
Volume: 1
Issue: 1
Year: 2007
A REVIEW OF STUDIES ON MACHINE LEARNING TECHNIQUES PDF available

Author(s): Yogesh Singh | Pradeep Kumar Bhatia | Omprakash Sangwan
Volume: 1
Issue: 1
Year: 2007
Morphological Reconstruction for Word Level Script Identification PDF available

Author(s): B.V.Dhandra | Mallikarjun Hangarge
Volume: 1
Issue: 1
Year: 2007
Active Contours without Edges and Curvature Analysis for Endoscopic Image Classification PDF available

Author(s): B. V. Dhandra | Ravindra Hegadi
Volume: 1
Issue: 1
Year: 2007
Analysis & Integrated Modeling of the Performance Evaluation Techniques for Evaluating Parallel Systems PDF available

Author(s): Amit Chhabra | Gurvinder Singh
Volume: 1
Issue: 1
Year: 2007
IMPLEMENTATION OF ECHOSTATE NETWORK IN NIDS PDF available

Author(s): Meera Gandhi | S.K.Srivatsa
Volume: 2
Issue: 1
Year: 2008
RB-GDM: A Role-Based Grid Delegation Model PDF available

Author(s): G Geethakumari | Dr Atul Negi | Dr V N Sastry
Volume: 2
Issue: 1
Year: 2008
Detecting and preventing attacks using network intrusion detection systems PDF available

Author(s): MeeraGandhi | K.Srivatsa
Volume: 2
Issue: 1
Year: 2008
GPS-less Localization Protocol for Underwater Acoustic Networks PDF available

Author(s): Al-Khalid Othman
Volume: 2
Issue: 1
Year: 2008
Segmentation of Malay Syllables in Connected Digit Speech Using Statistical Approach PDF available

Author(s): M-S Salam | Dzulkifli Mohamad | S-H Salleh
Volume: 2
Issue: 1
Year: 2008
A Survey on MANET Intrusion Detection PDF available

Author(s): Satria Mandala | Md. Asri Ngadi | A. Hanan Abdullah
Volume: 2
Issue: 1
Year: 2008
Asking Users: A Continuous Evaluation on Systems in a Controlled Environment PDF available

Author(s): Dayang Rohaya Awang Rambli | Suziah Sulaiman | Wan Fatimah Wan Ahmad
Volume: 3
Issue: 1
Year: 2009
MMI Diversity Based Text Summarization PDF available

Author(s): Ladda Suanmali | Mohammed Salem Binwahlan | Naomie Salim
Volume: 3
Issue: 1
Year: 2009
A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network PDF available

Author(s): Pankaj Kumar Sehgal | Rajender Nath
Volume: 3
Issue: 1
Year: 2009
Integration of Least Recently Used Algorithm and Neuro-Fuzzy System into Client-side Web Caching PDF available

Author(s): Siti Mariyam Shamsuddin | Waleed Ali Ahmed
Volume: 3
Issue: 1
Year: 2009
Cache Coherency in Distriuted File System

Author(s): Anagha Kulkarni
Volume: 4
Issue: 1
Year: 2010
An ID-based Blind Signature Scheme from Bilinear Pairings

Author(s): B.Umaprasada Rao | K.A.Ajmath
Volume: 4
Issue: 1
Year: 2010
Development of Expert Search Engine for Web Environment

Author(s): Laxmi Ahuja | Dr Ela Kumar
Volume: 4
Issue: 1
Year: 2010
Detecting and Localizing Wireless Network Attacks Techniques

Author(s): Iyad Aldasouqi | Walid Salameh
Volume: 4
Issue: 1
Year: 2010
Verifying ODP Computational Behavioral Specification by using B-Method

Author(s): Jalal Laassiri | Saïd El Hajji | Mohamed Bouhdadi
Volume: 4
Issue: 1
Year: 2010
An Overview of Registration Based and Registration Free Methods for Cancelable Fingerprint Template

Author(s): Radhika Bhagwat | Anagha Kulkarni
Volume: 4
Issue: 1
Year: 2010
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES

Author(s): Ehab Mahmoud Mohamed | Yasien Mahmoud | Hiroshi Furukawa
Volume: 4
Issue: 1
Year: 2010
Implementation of Radial Basis Function Neural Network for Image Steganalysis PDF available

Author(s): Sambasiva Rao Baragada | S. Ramakrishna | M. S. Rao | S. Purushothaman
Volume: 2
Issue: 1
Year: 2008
Exploring Knowledge for a Common Man through Mobile Services and Knowledge Discovery in Databases PDF available

Author(s): Mayank Dave | S. B. Singh | Sanjeev Manchanda
Volume: 3
Issue: 1
Year: 2009
An Ant Algorithm for Solving QoS Multicast Routing Problem PDF available

Author(s): Ahmed Younes Hamed
Volume: 5
Issue: 1
Year: 2011
Information Technology (IT) Security Framework for Kenyan Small and Medium Enterprises (SMEs) PDF available

Author(s): Michael Kimwele, Waweru Mwangi, Stephen Kimani
Volume: 5
Issue: 1
Year: 2011
A REVIEW PAPER ON AD HOC NETWORK SECURITY PDF available

Author(s): Karan Singh | Rama Shankar Yadav | Ranvijay
Volume: 1
Issue: 1
Year: 2007
Simple Encryption/Decryption Application PDF available

Author(s): Majdi Al-qdah | Lin Yi Hui
Volume: 1
Issue: 1
Year: 2007
A Novel Secure Key Agreement Protocol using Trusted Third Party PDF available

Author(s): Sairam Kulkarni | Debashih Jena | Sanjay Kumar Jena
Volume: 1
Issue: 1
Year: 2007
Secure E-Commerce Protocol PDF available

Author(s): Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin
Volume: 5
Issue: 1
Year: 2011
Testing of Contextual Role-Based Access Control Model (C-RBAC)

Author(s): Muhammad Nabeel Tahir
Volume: 3
Issue: 1
Year: 2009
Estimation of Ready Queue Processing Time Under Systematic Lottery Scheduling Scheme

Author(s): Anjali Jain | D. Shukla
Volume: 4
Issue: 1
Year: 2010
Save time & money - Smart Internet Solutions      Why do you need a reservation system?