Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 408
Issue Date | Title | Author(s) |
2015-05 | Preventing Code Injection Attack by Inheritance in Access Specifiers Model to Secure Data in Object Oriented Databases | Hardeep, Singh; Roshan, Srivastava |
2015-05 | Multi-tier Graphical Password Authentication for Foolproof Login in Cloud Applications | Ataullah, Md. |
2015-05 | Using Dempster Shafer Theory to Evaluate the Relative Performance of Securities and Sector Wise Indices | Komal, Walia; Virrat, Devaser |
2015-04 | Gesture Recognition for Intruder Detection | Sagar, Shashwat; Kumar, Mohinder |
2015-05 | Fuzzy Based Data Mining Approach to Identify Structural Patterns in Proteins | Sharma, Shivika; Kaur, Avinash |
2015-05 | Improving Wireless Security with Enhancement in WPA2 Protocol | Rawat, Suman; Md. Ataullah |
2015-05 | Increasing the Security of Wireless Network against Mac Address Spoofed-Attack | Joshi, Aarti; Md. Ataullah |
2015-04 | Reframing of English Sentences Using NLP | Kumar, Vikas; Agrawal, Prateek |
2015-05 | A Heusirtic Approach to Mine Software Revision Histories for Quality Driven Software Development | Soni, Meghna; Singh, Harshpreet |
2015-05 | Gesture Recognition by Evaluating Flux Points When Integrating With EM Waves | Singh, Karandeep; Kaur, Sandeep |
2015-05 | Enhanced-Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing | Bharadwaj, Anupam; Sharma, Shabnam |
2015-05 | Smarter method for user authentication in mobile system | Verma, Malika; Sood, Monica |
2015-05 | Step Verification for Detection of Black Hole Attack in MANET | Neha; Sharma, Manmohan |
2015-04 | Object Based Accountability Framework For Information Sharing in Cloud Computing | Singh, Pradeep; Singh, Parminder |
2015-04 | Studies on the medicinal properties of Alpinia Galanga | Sharma, Shraddha; Malik, Tabarak |
2015-05 | An Efficient and Optimized Technique for Obstacle Avoidance in Realistic Environment | Shah, Hannan Syed; Himanshu |
2015-05 | An Effective Approach for Improving Jamming Technique by Employing PDR | Sharma, Shubham; Sharma, Himanshu |
2015-05 | An Enhanced approach to SSL Server Load Management based on Server Health In TLS (Transport Layer security) | Gupta, Dipesh; Singh, Hardeep |
2015-05 | Enhanced two-step authentication scheme using TLS for secure seed exchange In TLS (Transport Layer security) | Singh, Sandeep; Ravishanker |
2015-05 | Enhancing the Clustering Technique for Uncertain Data in Data Mining | Kumar, Avinash; Mathur, Robin Prakash |
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 408