Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 408
| Issue Date | Title | Author(s) |
| 2015-05 | Preventing Code Injection Attack by Inheritance in Access Specifiers Model to Secure Data in Object Oriented Databases | Hardeep, Singh; Roshan, Srivastava |
| 2015-05 | Multi-tier Graphical Password Authentication for Foolproof Login in Cloud Applications | Ataullah, Md. |
| 2015-05 | Using Dempster Shafer Theory to Evaluate the Relative Performance of Securities and Sector Wise Indices | Komal, Walia; Virrat, Devaser |
| 2015-04 | Gesture Recognition for Intruder Detection | Sagar, Shashwat; Kumar, Mohinder |
| 2015-05 | Fuzzy Based Data Mining Approach to Identify Structural Patterns in Proteins | Sharma, Shivika; Kaur, Avinash |
| 2015-05 | Improving Wireless Security with Enhancement in WPA2 Protocol | Rawat, Suman; Md. Ataullah |
| 2015-05 | Increasing the Security of Wireless Network against Mac Address Spoofed-Attack | Joshi, Aarti; Md. Ataullah |
| 2015-04 | Reframing of English Sentences Using NLP | Kumar, Vikas; Agrawal, Prateek |
| 2015-05 | A Heusirtic Approach to Mine Software Revision Histories for Quality Driven Software Development | Soni, Meghna; Singh, Harshpreet |
| 2015-05 | Gesture Recognition by Evaluating Flux Points When Integrating With EM Waves | Singh, Karandeep; Kaur, Sandeep |
| 2015-05 | Enhanced-Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing | Bharadwaj, Anupam; Sharma, Shabnam |
| 2015-05 | Smarter method for user authentication in mobile system | Verma, Malika; Sood, Monica |
| 2015-05 | Step Verification for Detection of Black Hole Attack in MANET | Neha; Sharma, Manmohan |
| 2015-04 | Object Based Accountability Framework For Information Sharing in Cloud Computing | Singh, Pradeep; Singh, Parminder |
| 2015-04 | Studies on the medicinal properties of Alpinia Galanga | Sharma, Shraddha; Malik, Tabarak |
| 2015-05 | An Efficient and Optimized Technique for Obstacle Avoidance in Realistic Environment | Shah, Hannan Syed; Himanshu |
| 2015-05 | An Effective Approach for Improving Jamming Technique by Employing PDR | Sharma, Shubham; Sharma, Himanshu |
| 2015-05 | An Enhanced approach to SSL Server Load Management based on Server Health In TLS (Transport Layer security) | Gupta, Dipesh; Singh, Hardeep |
| 2015-05 | Enhanced two-step authentication scheme using TLS for secure seed exchange In TLS (Transport Layer security) | Singh, Sandeep; Ravishanker |
| 2015-05 | Enhancing the Clustering Technique for Uncertain Data in Data Mining | Kumar, Avinash; Mathur, Robin Prakash |
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 408