Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
April 30, 2024

NOTIFICATION
May 31, 2024

PUBLICATION
June 30, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.691

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

CITATION REPORT FOR IJCSS

Below calculations are based on citations that are extracted through Google Scholar until December 31, 2020.


Total Citations = 2088
Self Citations = 5
Total Publications = 366


Citation Impact
(Total Citations - Self Citations) / Total Publications

Citation Impact
(2088 - 5) / 366 = 5.691

 
SR
M-CODE
CITATION
1
Al-Hawari, F., Alufeishat, A., Alshawabkeh, M., Barham, H., & Habahbeh, M. (2017). The software engineering of a three-tier web-based student information system (MyGJU). Computer Applications in Engineering Education, 25(2), 242-263.
2
Al-Hawari, F. H. (2017). MyGJU Student View and its Online and Preventive Registration Flow. International Journal of Applied Engineering Research, 12(1), 119-133.
3
Thompson, R. C. (2017). Determining critical success factors for implementation of on-line registration systems (Doctoral dissertation).
4
Agwa-Ejon, J. F., & Pradhan, A. (2017, July). Technology Connectivity: A Tool for the Selection, Recruitment and Enrolment of Potential Students in South African Universities. In Management of Engineering and Technology (PICMET), 2017 Portland International Conference on (pp. 1-8). IEEE.
5
Wahaba, N. A., Marimuthub, R., Othmana, J., & SaifulNizamWarrisa, C. S. P. (2017). Evaluating the Usability of COREs-an Online Conference Registration System. DEPARTMENT OF COMPUTER AND MATHEMATICAL SCIENCES UNIVERSITI TEKNOLOGI MARA CAWANGAN PULAU PINANG PENANG, MALAYSIA, 38.
6
Jabbar, M. A., Deekshatulu, B. L., & Chandra, P. (2016). A Novel Algorithm for Utility-Frequent Itemset Mining in Market Basket Analysis. In Innovations in Bio-Inspired Computing and Applications (pp. 337-345). Springer International Publishing.
7
Renza , D., Ballesteros , D. M., & Rincon, R. (2016 ) . Concealment method for steganography image pixel grayscale on color images . Engineering and Science , 12 ( 23) , 145-162.
8
Stephanie, F. L., & Sharma, R. S. (2016). Health on a Cloud: Modeling Digital Flows in an E-health Ecosystem. Journal of Advances in Management Sciences & Information Systems, 2, 1-20.
9
Pillai, J. S., & Padma, T. (2016). The Analysis of PQ Sequences Generated from Continued Fractions for Use as Pseudorandom Sequences in Cryptographic Applications. In Artificial Intelligence and Evolutionary Computations in Engineering Systems (pp. 633-644). Springer India.
10
Singh, K. (2016). Image Steganography Scheme Using Parent Child Relationship in Wavelet Domain. British Journal of Applied Science & Technology, 14(4), 1.
11
Barve, S., Desai, S., & Sardinha, R. (2016).Query-Based Extractive Text Summarization for Sanskrit. In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 (pp. 559-568). Springer India.
12
Shanmuganathan, S. (2016). A Hybrid Artificial Neural Network (ANN) Approach to Spatial and Non-spatial Attribute Data Mining: A Case Study Experience. In Artificial Neural Network Modelling (pp. 443-472). Springer International Publishing.
13
Dhveya, R., & Amudha, T. (2016). Role of Bio-Inspired Optimization in Disaster Operations Management Research. In Innovations in Bio-Inspired Computing and Applications (pp. 565-575). Springer International Publishing.
14
Iwasokun, G. B., & Akinyokun, O. C. Singular-minutiae points relationship-based approach to fingerprint matching.
15
Jamont, J. P. (2016). Démarche, modèles et outils multi-agents pour l'ingénierie des collectifs cyber-physiques (Doctoral dissertation, Université Grenoble Alpes).
16
Adewumi, A. O., & Arasomwan, M. A. (2016). On the performance of particle swarm optimisation with (out) some control parameters for global optimisation. International Journal of Bio-Inspired Computation, 8(1), 14-32.
17
Gkartzonikas , A . , & Theoharatos , D . ( 2016 ) . Discovery Framework Information : particle swarm optimization and optimum stop theory.
18
Viola, A. V., Ese, O. D., & Charles, S. O. A Proposed Hybrid Component Complexity Metrics For Component Based Software Development.
19
Rathore, M. M., Ahmad, A., & Paul, A. (2016). Real time intrusion detection system for ultra-high-speed big data environments. The Journal of Supercomputing, 1-22.
20
Ruuhwan, R., Riadi, I., & Prayudi, Y. (2016). Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone. Jurnal Edukasi dan Penelitian Informatika (JEPIN), 2(1).
21
Al-Fayoumi, A., & Hassan, M. (2016). Interactive Visual Search System Based onMachine Learning Algorithm. International Arab Journal of Information Technology (IAJIT), 13.
22
Tarek, M., Ouda, O., & Hamza, T. (2016). Robust cancellable biometrics scheme based on neural networks. IET Biometrics.
23
Al-Dmour, H., & Al-Ani, A. (2016). Quality optimized medical image information hiding algorithm that employs edge detection and data coding. Computer Methods and Programs in Biomedicine, 127, 24-43.
24
Jahantigh , F Firuzi , due to race , R. , Jahantigh , & M. Firuzi . (2016 ) . Identify , evaluate and rank the risk factors Weight & # 1705 ... Journal of Mazandaran University of Medical Sciences (JMUMS), 25 (133).
25
Rashid, F., Miri, A., & Woungang, I. (2016). Secure image deduplication through image compression. Journal of Information Security and Applications.
26
Md Yunus, N. A., Othman, M., Mohd Hanapi, Z., & Lun, K. Y. (2016). Reliability Review of Interconnection Networks. IETE Technical Review, 1-11.
27
Khanna, N. (2016). Mitigation of Collaborative Blackhole Attack using TRACEROUTE Mechanism with Enhancement in AODV Routing Protocol.
28
Jung, S., & Kumar, R. (2016). Security of Routing Protocols in MANETs: A Survey. Global Sci-Tech, 8(1), 22-36.
29
Pop, F., Tutueanu, R. I., Barbieru, C., Vasile, M. A., & Kolodziej, J. (2016). Adaptive Resource Allocation in Cloud Computing Based on Agreement Protocols. In Intelligent Agents in Data-intensive Computing (pp. 193-213). Springer International Publishing.
30
Anju, P. S., Kuriakose, B., & Paul, V. A Survey On Steganographic Methods Used in Information Hiding.
31
Mubeen, S., Srinath, N. K., & Subramanya, K. N. (2016). Double Securing from Hackers in B2B E-commerce.
32
Opoku-Ansah, J., Eghan, M. J., Anderson, B., Boampong, J. N., & Buah-Bassuah, P. K. (2016). Laser-Induced Autofluorescence Technique for Plasmodium falciparum Parasite Density Estimation. Applied Physics Research, 8(2), 43.
33
Ramesh, M. R., & Reddy, C. S. (2016). a survey on security requirement elicitation methods: classification, merits and demerits. International Journal of Applied Engineering Research, 11(1), 64-70.
34
Bistouni, F., & Jahanshahi, M. (2015). Pars network: a multistage interconnection network with fault-tolerance capability. Journal of Parallel and Distributed Computing, 75, 168-183.
35
Li, D., & Wang, Y. (2015). The Image Retrieval Based on the Hybrid Algorithm of the Primary Color and Color Layout Descriptor.
36
Anchor , & Abdul race. ( 2015). Identify phishing in online banking site using the optimization algorithm inclined plates . Journal of electronic and cyber defense , 3 ( ??1 ).
37
Uzunov, A. V., Falkner, K., & Fernandez, E. B. (2015). A comprehensive pattern-oriented approach to engineering security methodologies. Information and Software Technology, 57, 217-247.
38
Veshkurtsev ,JM model management and monitoring of network elements Telecommunication network using theory of fuzzy sets.
39
Nayebi, F., Abran, A., & Desharnais, J. M. (2015). Automated selection of a software effort estimation model based on accuracy and uncertainty. Artificial Intelligence Research, 4(2), p45.
40
Tripathy, A., Agrawal, A., & Rath, S. K. (2015). Classi?cation of Sentimental Reviews Using Machine Learning Techniques. Procedia Computer Science, 57, 821-829.
41
Bhatia, S., & Attri, V. K. Estimation of Software Development Effort with Machine Learning Approaches: A Review.
42
Tripathya, A., Agrawalb, A., & Rathc, S. K. Classification of Sentimental Reviews Using Machine Learning Techniques.
43
Chen, N. (2015). Research on Detection of Business Constraints based on AOP. International Journal of u-and e-Service, Science and Technology, 8(2), 243-250.
44
An, B., Qu, T., & Qi, H. (2015). Chinese MOOC Search Engine. In Intelligent Computation in Big Data Era (pp. 453-458). Springer Berlin Heidelberg.
45
Kapur, R. K., & Khatri, S. K. (2015, March). Analysis of attacks on routing protocols in MANETs. In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in (pp. 791-798). IEEE.
46
Al-Saeedan, W., & Menai, M. E. B. (2015). Swarm intelligence for natural language processing. International Journal of Artificial Intelligence and Soft Computing, 5(2), 117-150.
47
Alguliyev, R. M., Aliguliyev, R. M., & Isazade, N. R. (2015). an unsupervised approach to generating generic summaries of documents. Applied Soft Computing.
48
Mohamed, K., Pauzi, M. N. M., Ali, F. H. H. M., & Ariffin, S. (2015, August). Linearity Test Framework for S-Box in Block Cipher. In IT Convergence and Security (ICITCS), 2015 5th International Conference on (pp. 1-5). IEEE.
49
McIntosh, H. (2015). Vevo and the Business of Online Music Video Distribution. Popular Music and Society, (ahead-of-print), 1-14.
50
Fatima, M., Ahmad, S. F., & Hasan, M. (2015). Fuzzy Based Software Cost Estimation Methods: A Comparative Study. International Journal for Innovative Research in Science and Technology, 1(7), 287-290.
51
Iraji, M. S. (2015). Fuzzy Agent Oriented Software Effort Estimate with COCOMO.
52
Mohammadpoor, M., & Mehdizadeh, A. An Efficient ECC-based Authentication and Key Agreement Protocol.
53
Verma, K., Shukla, D., & Gangele, S. (2015). Approximating the Probability of Traffic Sharing by Numerical Analysis Techniques between Two Operators in a Computer Network. Open Journal of Computer Science and Information Technology, 3(1), 026-039.
54
Persson, J., & Lundbladh, M. (2015). Våga vara dig själv: Att fo¨rsta° och skapa en illusion av ljus med digitala medier.
55
Olaniyi, O. M., Arulogun, O. T., Omidiora, O. E., & Okediran, O. O. (2015). Implementing generic security requirements in e–voting using modified stegano–cryptographic approach. International Journal of Information and Computer Security, 7(1), 64-90.
56
Omotosho, A., Adegbola, O., Mikail, O. O., & Emuoyibofarhe, J. (2015). A Secure Electronic Prescription System Using Steganography with Encryption Key Implementation. arXiv preprint arXiv:1502.01264.
57
Sathisha, N., Babu, K. S., Raja, K. B., & Venugopal, K. R. (2015). Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT. International Journal of Image Processing (IJIP), 9(2), 41.
58
Patil, P. (2015). encryption for secure sms transmission. Compusoft, 4(6), 1876.
59
Jasuja, B., & Pandya, A. (2015). Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding. International Journal of Computer Applications, 116(21).
60
Kumar, V., & Purusotham, S. (2015). A Lexi-Search Approach of Variant Vehicle Routing Problem. International Journal of Advanced Research in Computer Science, 6(1).
61
Babu, K. S. international journal of engineering sciences & research technology a data guided lexi-serach approach for time dependent travelling salemsman problem.
62
Kundaikar, T. C., & Laxminarayana, J. A. (2015). Efficient Recognition of Devanagari Handwritten Text. In Computational Intelligence in Data Mining-Volume 2 (pp. 81-88). Springer India.
63
Kulkarni, P. P., Patil, S., & Dhanokar, G. (2015). Marathi And Sanskrit Word Identification By Using Genetic Algorithm.
64
Singh, P., Verma, A., & Chaudhari, N. S. (2015). On the Performance Improvement of Devanagari Handwritten Character Recognition. Applied Computational Intelligence and Soft Computing, 2015.
65
Jayakumar, A., Babu, G. S., Raman, R., & Nedungadi, P. (2015, October). Integrating Writing Direction and Handwriting Letter Recognition in Touch-Enabled Devices. In Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015 (Vol. 2, p. 393). Springer.
66
Joshi, D., & Pansare, S. (2015, February). Combination of Multiple Image Features along with KNN Classifier for Classification of Marathi Barakhadi. In Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on (pp. 607-610). IEEE.
67
Dhaka, V. P., & Sharma, M. K. An efficient segmentation technique for Devanagari offline handwritten scripts using the Feedforward Neural Network. Neural Computing and Applications, 1-13.
68
Kabir, K. L., Shafin, M. K., Anannya, T. T., Debnath, D., Kabir, M. R., Islam, M. A., & Sarwar, H. Projection-Based Features: A Superior Domain for Handwritten Bangla Basic Characters Recognition.
69
Ajmire, P. E., Dharaskar, R. V., & Thakare, V. M. Feature Extraction and recognition of Modifiers in Handwritten Marathi (Devanagari) Text.
70
Shing, L., Astacio, J., Figueroa, A., & Shing, C. C. (2015, August). Vulnerabilities of radio frequencies. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on (pp. 2682-2686). IEEE.
71
Kannan, D., & Gobi, M. (2015). An extensive research on robust digital image watermarking techniques: a review. International Journal of Signal and Imaging Systems Engineering, 8(1-2), 89-104.
72
Roy, A. J., & Student, F. Y. U. Emotional Text to Speech Synthesis in Indian Language.
73
Anil, M. C., & Shirbahadurkar, S. D. Expressive Speech Synthesis using Prosodic Modification for Marathi Language.
74
Shrivastava, S., Agrawal, C., & Jain, A. (2015). An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET. arXiv preprint arXiv:1502.04801.
75
Maheswari, R., MCA, M. S. R., & PHIL, M. (2015, March). A Review on Types of Jamming Attack In Mobile Ad-Hoc Network. In Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications.
76
Pandhare, S. S., & Jawandiya, P. M. (2015, March). Security Goals and Attacks in Mobile Ad Hoc Networks: An exclusive survey. In National Conference “CONVERGENCE (Vol. 2015, p. 28).
77
Filipek, J., & Hudec, L. (2015, January). Distributed firewall in Mobile Ad Hoc Networks. In Applied Machine Intelligence and Informatics (SAMI), 2015 IEEE 13th International Symposium on (pp. 233-238). IEEE.
78
Mohammed, A., Sofiane, B. H., & kamel Mohamed, F. (2015). A Cross Layer for Detection and Ignoring Black Hole Attack in MANET.
79
Mittal, V. (2015). Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach. Prevention, 4(5).
80
Paliwal, G., Mudgal, A. P., & Taterh, S. (2015, January). A Study on Various Attacks of TCP/IP and Security Challenges in MANET Layer Architecture. In Proceedings of Fourth International Conference on Soft Computing for Problem Solving (pp. 191-203). Springer India.
81
Dorri, A., Kamel, S. R., & Kheirkhah, E. (2015). Security challenges in mobile ad hoc networks: a survey. arXiv preprint arXiv:1503.03233.
82
Singh, J., Singh, A., & Shree, M. R. (2015). An Assessment of Frequently Adopted Security Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective. Journal of Wireless Network and Microsystems, 4(1-2).
83
Suja, K. R., & Raglend, J. (2015). Cuckoo search (CS)-NFC-based UPQC for compensating voltage sag of nonlinear load. Journal of Experimental & Theoretical Artificial Intelligence, (ahead-of-print), 1-18.
84
Priest, B. W., Vuksani, E., Wagner, N., Tello, B., Carter, K. M., & Streilein, W. W. (2015, April). Agent-based simulation in support of moving target cyber defense technology development and evaluation. In Proceedings of the 18th Symposium on Communications & Networking (pp. 16-23). Society for Computer Simulation International.
85
Wagner, N., Lippmann, R., Winterrose, M., Riordan, J., Yu, T., & Streilein, W. W. (2015, April).Agent-based simulation for assessing network security risk due to unauthorized hardware. In Proceedings of the Symposium on Agent-Directed Simulation (pp. 18-26). Society for Computer Simulation International.
86
Singh, Y., & Chugh, U. Clustering, Information Fusion and Event Detection in Wireless Sensor Networks: A Review.
87
Houngbo, P. J., & Hounsou, J. T. (2015). Measuring Information Security: Understanding And Selecting Appropriate Metrics. International Journal of Computer Science and Security (IJCSS), 9(2), 108.
88
Rani, C., & Goel, S. CSAAES: An Expert System for Cyber Security Attack Awareness.
89
Rasheed, Z. A. S. (2015). ’Steganography Technique for Binary Text Image. International Journal of Science and Research (IJSR) ISSN (Online), 2319-7064.
90
Rubab, S., & Javed, Y. (2015). Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption. International Journal of Computer Network and Information Security (IJCNIS), 7(2), 15.
91
Sahu, P., & Chourasia, B. (2015). State of the Art in Modern Steganography-A review. International Journal of Advanced Electronics and Communication Systems, 4(1).
92
Houngbo, P. J., & Hounsou, J. T. (2015). Measuring Information Security: Understanding And Selecting Appropriate Metrics. International Journal of Computer Science and Security (IJCSS), 9(2), 108.
93
Sen, P., Ahmed, R. A., & Islam, M. R. (2015). A Study on E-Commerce Security Issues and Solutions.
94
Aigbe, P., & Onibere, A. (2015). An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System. International Journal of Computer Applications, 122(18).
95
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handling in the cloud. Computers & Security, 49, 45-69.
96
Amann, P., & James, J. I. (2015). Designing robustness and resilience in digital investigation laboratories. Digital Investigation, 12, S111-S120.
97
Agarwal, R., & Kothari, S. (2015). Review of Digital Forensic Investigation Frameworks. In Information Science and Applications (pp. 561-571). Springer Berlin Heidelberg.
98
Jafari, F., & Satti, R. S. (2015). Comparative Analysis of Digital Forensic Models. Journal of Advances in Computer Networks, 3(1).
99
Satti, R. S., & Jafari, F. (2015). Domain Specific Cyber Forensic Investigation Process Model. Journal of Advances in Computer Networks, 3(1).
100
Jiang, J. G., Yang, B., Lin, S., Zhang, M. X., & Liu, K. Y. (2015, April). A Practical Approach for Digital Forensic Triage. In Applied Mechanics and Materials (Vol. 742, pp. 437-444).
101
Prayudi, Y., & Sn, A. (2015). Digital Chain of Custody: State of the Art. International Journal of Computer Applications, 114(5), 1-9.
102
Satti, R. S., & Jafari, F. (2015). Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes.
103
Saleem, S. (2015). Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics.
104
Mushtaque, K., Ahsan, K., & Umer, A. (2015). DIGITAL FORENSIC INVESTIGATION MODELS: AN EVOLUTION STUDY. JISTEM-Journal of Information Systems and Technology Management, 12(2), 233-243.
105
Mushtaque, K., Ahsan, K., & Umer, A. (2015).Digital Forensic investigation models:an evolution study. JISTEM-Journal of Information Systems and Technology Management, 12(2), 233-243.
106
Kurniati, F. T., Santoso, A. J., & Suyoto, S. (2015).printer forensik untuk identifikasi dokumen cetak. semnasteknomedia online, 3(1), 5-10.
107
Prayudi, Y., & Ashari, A. A Study on Secure Communication for Digital Forensics Environment.
108
KHAWASE, M. D. S.,deshmukh, m., kuche, s., & mahalle, a. international journal of pure and applied research in engineering and technology.
109
Swamy, V., Sampath, S., Nanjesh, B. R., & Sagar, B. B. (2015). Development of Common Parallel Programming Platform for MPI and PVM. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 95-103). Springer India.
110
Yadav, M. R., & Gill, N. S. (2015). Improvement in Performance of RSA Algorithm Using SLSB.
111
Bhanot, R., & Hans, R. (2015). A Review and Comparative Analysis of Various Encryption Algorithms. International Journal of Security & Its Applications, 9(4).
112
Farajallah, M. (2015). Chaos-based crypto and joint crypto-compression systems for images and videos (Doctoral dissertation, UNIVERSITE DE NANTES).
113
Ayokunle, T. B., Ogah, U. S., & Binitie, A. P. (2015). Encryption and Decryption of Messages Using Advanced Encryption Standard and System of Nonlinear Equations. International Journal of Pure and Applied Sciences and Technology, 27(1), 1.
114
Kulkarni, s. international journal of pure and applied research in engineering and technology.
115
Razzak, I. (2015). Malarial Parasite Classification using Recurrent Neural Network. International Journal of Image Processing (IJIP), 9(2), 69.
116
DAS, D., Mukherjee, R., & Chakraborty, C. (2015). Computational microscopic imaging for malaria parasite detection: a systematic review. Journal of microscopy.
117
Razzak, M. I. (2015). Automatic Detection and Classification of Malarial Parasite. International Journal of Biometrics and Bioinformatics (IJBB), 9(1), 1.
118
Savkare, S. S., & Narote, S. P. (2015, January). Automated system for malaria parasite identification. In Communication, Information & Computing Technology (ICCICT), 2015 International Conference on (pp. 1-4). IEEE.
119
Chayadevi, M. L., & Raju, G. T. (2015). Automated Colour Segmentation of Malaria Parasite with Fuzzy and Fractal Methods. In Computational Intelligence in Data Mining-Volume 3 (pp. 53-63). Springer India.
120
Hutagalung, B. T., & Syahputra, A. watermarking citra digital dengan information dispersal algorithm (ida) dan algoritma huffman.
121
Alabaichi, A. M. (2015). A Dynamic 3D S-Box based on Cylindrical Coordinate System for Blowfish Algorithm. Indian Journal of Science and Technology, 8(30).
122
Alabaichi, A., & Salih, A. I. (2015, October). Enhance security of advance encryption standard algorithm based on key-dependent S-box. In Digital Information Processing and Communications (ICDIPC), 2015 Fifth International Conference on (pp. 44-53). IEEE.
123
Pourahmad, S., Azad, M., & Paydar, S. (2015). Diagnosis of Malignancy in Thyroid Tumors by Multi-Layer Perceptron Neural Networks With Different Batch Learning Algorithms. Global Journal of Health Science, 7(6), p46.
124
Jasim, O. K., Abbas, S., Horbaty, E. S. M., & Salem, A. B. M. (2015). Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm. arXiv preprint arXiv:1503.04796.
125
Kazlauskas, K., Vaicekauskas, G., & Smaliukas, R. (2015). An Algorithm for Key-Dependent S-Box Generation in Block Cipher System. INFORMATICA, 26(1), 51-65.
126
Shing, L. P., Shing, L. H., Shing, M. L., & Shing, C. C. (2015). modeling data integrity under stochastic linear constraints. International Journal of Electronic Commerce Studies, 6(2), 233-242.
127
Kariuki, P. (2015). generic process model for android smartphones live memory forensics (Doctoral dissertation).
128
Jeon, S., Fujita, H., & Toshiyoshi, H. (2015). A MEMS-based interactive laser scanning display with a collocated laser range finder. IEICE Electronics Express, 12(10), 20150072-20150072.
129
Fister, I., Ljubic, K., Suganthan, P. N., & Perc, M. (2015). Computational intelligence in sports: Challenges and opportunities within a new research domain. Applied Mathematics and Computation, 262, 178-186.
130
Korhonen, H. (2015). Improving Transparency in Demand-Supply Chain With Visual Business Intelligence Tools.
131
Alhirz, H., & Sajeev, A. S. M. (2015). Do cultural dimensions differentiate ERP acceptance? A study in the context of Saudi Arabia. Information Technology & People, 28(1), 163-194.
132
Almishal, A., & Alsaud, M. A. (2015). Implementing ERP Systems in Government: Case Study of Saudi Organization. Lecture Notes on Software Engineering, 3(2), 120.
133
Hammad, J. (2015). A Comparative Study between Various Sorting Algorithms. IJCSNS, 15(3), 11.
134
Bjeljac, P., Zecevic, I., & Perisic, B. (2015, May). Integrating Learning Management System and Faculty Information System-service oriented approach. In Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2015 38th International Convention on (pp. 773-777). IEEE.
135
Kavila, S. D., & Radhika, Y. (2015).Extractive Text Summarization Using Modified Weighing and Sentence Symmetric Feature Methods.
136
Loto, m., & durán, e. B. (2015). Diseño de una aplicación móvil personalizada de apoyo al aprendizaje de redes de computadoras. In x congreso sobre tecnología en educación & educación en tecnología (te & et)(corrientes, 2015).
137
Koondhar, m. Y., rind, m. M., chandio, f. H., & shah, a. (2015). Pervasive learning environment with emerging technologies and learning transformation. In international multi-topic conference.
138
Mohy, N. N., Mokhtar, H. M., & El-Sharkawi, M. E. (2015, July).Delegation enabled provenance-based access control model. In Science and Information Conference (SAI), 2015 (pp. 1374-1379). IEEE.
139
Dewi, D. (2015).Identifikasi goresan dasar mandarin dengan metode multilayer perceptron.CSRID Journal, 7(1), 12-23.
140
Yadav, M., & Dhankhar, A. (2015). A-Review on Image Steganography. International Journal for Innovative Research in Science and Technology, 2(2), 243-248.
141
Yahlali, M., & Chouarfia, A. (2015). Towards a software component assembly evaluation. Software, IET, 9(1), 1-6.
142
Aigbe, P., & Onibere, A. (2015).An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System. International Journal of Computer Applications, 122(18).
143
Alhazmi, O. H. Evaluating Disaster Recovery Plans Using Computer Aided Disaster Recovery Tools.
144
Das, S., & Ghosh, R. (2015). Study of randomness in AES ciphertexts produced by various types of dynamic S-boxes. International Journal of Information and Communication Technology, 7(6), 537-561.
145
Kaur, P. J., Kaul, V., Bharadi, V. A., & Narayankhedkar, S. K. Article: Development of Security Enhancement Techniques for 3G/4G Networks}. In IJAIS Proceedings on International Conference and Workshop on Communication, Computing and Virtualization} (pp. 41-46).
146
Kalaiselvi, K., & Mangalam, H. (2015). Power efficient and high performance VLSI architecture for AES algorithm. Journal of Electrical Systems and Information Technology.
147
Vaicekauskas, G. BLOKINIŲ ŠIFRŲ ANALIZĖ IR KOKYBĖS PAGERINIMAS.
148
Ahamed, S. K., Naidu, M. M., & Reddy, C. S. R. (2015). MOST INFLUENTIAL OBSERVATIONS-SUPER EFFICIENCY. International Journal on Computer Science and Engineering, 7(9), 82.
149
Ibrahim, M. H. AATCT: Anonymously Authenticated Transmission on the Cloud with Traceability. International Journal of Advanced Computer Science & Applications, 1(6), 251-259.
150
Pan Lan Lan Yuchi school Biao , Huan Lei , institutions, & statistics . (2015 ) . A rapid assessment authoritative DNS DDoS attacks impact on the way services Computer Application Research , 32 ( 11 ) , 3456-3459
151
Nagarajan, P., & Perumal, G. (2015). Detection of Denial of Service Attack in Cloud using Fuzzy Time Series Analysis and EM Algorithm. International Journal of Advancements in Computing Technology, 7(5), 25.
152
KARIMIZADEH, M. M., RAFEAZADEH, E., AMIRI, P., & KHOLGHNIK, D. (2015). Enhancing and Optimization Sorting Algorithms: An Empirical Study. Cumhuriyet Science Journal, 36(6), 254-266.
153
Faujdar, N., & Ghrera, S. P. (2015, April). Analysis and Testing of Sorting Algorithms on a Standard Dataset. In Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on (pp. 962-967). IEEE.
154
Biedermann, S. (2015). Transparent Security Services for an Infrastructure-as-a-Service Cloud.
155
Redundancy, m. (2015). selection of robust feature subsets for phish webpage prediction using maximum relevance and minimum redundancy criterion. journal of theoretical and applied information technology, 81(2).
156
Yaramasa, T., & Kishore, G. K. (2015, January). Enhanced Privacy and Surveillance for Online Social Networks. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 189-196). Springer International Publishing.
157
Khalane, V. P., & Bhadade, U. S. A Review on Encryption Techniques in Signal Processing.
158
Khan, M., Jamil, A., Haleem, F., Zahoor, J., Muhammad, S., & Sung Wook, B. (2015). A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. KSII Transactions on Internet and Information Systems (TIIS), 9(5), 1938-1962.
159
Muhammad, K., Ahmad, J., Sajjad, M., & Zubair, M. (2015). Secure Image Steganography using Cryptography and Image Transposition. arXiv preprint arXiv:1510.04413.
160
Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., & Baik, S. W. (2015). A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications, 1-27.
161
Al-Dmour, H., & Al-Ani, A. (2015, November). A Medical Image Steganography Method Based on Integer Wavelet Transform and Overlapping Edge Detection. In Neural Information Processing (pp. 436-444). Springer International Publishing.
162
Olaniyi, O. M., Arulogun, O. T., Omidiora, O. E., & Okediran, O. O. (2015). Implementing generic security requirements in e–voting using modified stegano–cryptographic approach. International Journal of Information and Computer Security, 7(1), 64-90.
163
Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., & Okediran, O. O. (2015). Enhanced Stegano-Cryptographic Model for Secure Electronic Voting. Journal of Information Engineering and Applications, 5(4), 1-15.
164
Badhan, S., & Juneja, M. (2015). A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks. In Intelligent Computing, Communication and Devices (pp. 183-190). Springer India.
165
Mehndiratta, A. (2015). Data Hiding System Using Cryptography & Steganography: A Comprehensive Modern Investigation.
166
Wahab, O. F. A., Badawy, M. B., Elshakankiry, O. A., & El-sayed, H. S. (2015). Utilizations of Reversible Lossless Data Hiding Techniques in Video Sequences. Int. J. Com. Net. Teach, 3(1).
167
Din, R., Yusof, S. A. M., Amphawan, A., Hussain, H. S., Yaacob, H., Jamaludin, N., & Samsudin, A. (2015). Performance Analysis on Text Steganalysis Method Using A Computational Intelligence Approach. Proceeding of the Electrical Engineering Computer Science and Informatics, 2(1).
168
Azizifard, A., Qermezkon, M., & Farshidi, R. Information Steganography within 3D Images Using Residue Number System.
169
Deepa, S., & Umarani, R. (2015). A Prototype for Secure Information using Video Steganography. image, 4(8).
170
Liu, L., Chang, C. C., & Wang, A. (2015). Reversible data hiding scheme based on histogram shifting of n-bit planes. Multimedia Tools and Applications, 1-16.
171
Ahmad, M., Jung, L. T., & Bhuiyan, M. A. A. (2015). On Fuzzy Semantic Similarity Measure for DNA Coding. Computers in Biology and Medicine.
172
Anvary, M. D., Feshki, M. G., & Ahrabi, A. A. A. (2015). Efficient Security Alert Management System. International Journal of Computer Science and Security (IJCSS), 9(4), 218.
173
Feshki, M. G., Sojoodi, O., & Anvary, M. D. (2015). Managing Intrusion Detection Alerts Using Support Vector Machines. International Journal of Computer Science and Security (IJCSS), 9(5), 266.
174
Rai, P. K., & Singh, P. (2015). Studies and Analysis of Popular Database Models.
175
Khadka, I. The accuracy of location services and the potential impact on the admissibility of GPS Based evidence in court cases.
176
Chuchuen, C., & Chanvarasuth, P. (2015). Relationship between Phishing Techniques and User Personality Model of Bangkok Internet Users.
177
Jain, A., & Buksh, B. Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques.
178
Babatunde, I. G. (2015). Fingerprint Matching Using Minutiae-Singular Points Network. International Journal of Signal Processing, Image Processing and Pattern Recognition, 8(2), 375-388.
179
Narayanan, R. C. Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Recognition Biometric System.
180
Patel, A. (2015). Risk based prioritization of Asthma Burden Using Artificial Neuro Fuzzy Inference System.
181
Chowdhury, C. R., & Saha, B. (2015). Efficient Fingerprint Matching Based Upon Minutiae Extraction. International Journal of Advanced Computer Research, 5(21), 347.
182
Ahmad, F., Darbari, M., & Asthana, R. (2015). Different Approaches of Soft Computing Techniques (Inference System) which are used in Clinical Decision Support System for Risk based Prioritization. Asian Journal of Computer and Information Systems, 3(1).
183
Iwasokun, G. B., Udoh, S. S., & Akinyokun, O. K. (2015). Multi-Modal Biometrics: Applications, Strategies and Operations. Global Journal of Computer Science and Technology, 15(2).
184
Owusu, E., Gavua, E. K., & Zhan, Y. Z. (2015). Facial Expression Recognition–A Comprehensive Review. The Fourth Edition of the International Journal of Technology and Management Research, 1(4), 29-46.
185
Tamimi, A. A., AL-Allaf, O. N., & Alia, M. A. (2015). Real-Time Group Face-Detection for an Intelligent Class-Attendance System.
186
Anissa, B., Naouar, B., Arsalane, Z., & Jamal, K. (2015, March). Face recognition:Compar ative study between linear and non linear dimensionality reduction methods. In Electrical and Information Technologies (ICEIT), 2015 International Conference on (pp. 224-228). IEEE.
187
Vijayalakshmi, V., Sharmila, R., & Shalini, R. (2015, March). Hierarchical key management scheme using Hyper Elliptic Curve Cryptography in Wireless Sensor Networks. In Signal Processing, Communication and Networking (ICSCN), 2015 3rd International Conference on (pp. 1-5). IEEE.
188
Tomar, G. S., Kevre, P., & Shrivastava, L. Energy model based Performance Analysis of cluster based wireless sensor network.
189
Ye, F., Qian, Y., & Hu, R. Q. (2015). HIBaSS: hierarchical identity-based signature scheme for AMI downlink transmission. Security and Communication Networks.
190
Aboud, S., & Al-fayoumi, M. (2012). proxy signature scheme for warrant partial delegation. In The International Conference on Computing, Networking and Digital Technologies (ICCNDT2012) (pp. 107-113). The Society of Digital Information and Wireless Communication.
191
Jain, M., & Tripathi, K. C. Auto Associative Neural Networks for Nonlinear Principal Components Analysis of Sea Surface Temperature Anomalies in Indian Ocean.
192
Fayed, S., Youssef, S. M., El-Helw, A., Patwary, M., & Moniri, M. (2015). Adaptive compressive sensing for target tracking within wireless visual sensor networks-based surveillance applications. Multimedia Tools and Applications, 1-25.
193
Kishore, N. (2015). Parllel hashing algorithms for security and Forensic Applicatons.
194
Fasola, O. S. (2015). Perceptions and acceptance of librarians towards using Facebook and Twitter to promote library services in Oyo State, Nigeria. The Electronic Library, 33(5), 870-882.
195
Claybaugh, C. C., Haried, P., & Yu, W. B. (2015). Diffusion of a Professional Social Network: Business School Graduates in Focus. International Journal of Human Capital and Information Technology Professionals (IJHCITP), 6(4), 80-96.
196
Caldwell, J. M. (2015). Going where students are: comparing faculty and student uses and perceptions of social networking in higher education.
197
Borena, B., Belanger, F., & Egigu, D. (2015, January). Information Privacy Protection Practices in Africa: A Review Through the Lens of Critical Social Theory. In System Sciences (HICSS), 2015 48th Hawaii International Conference on (pp. 3490-3497). IEEE.
198
Larsen, E. S. H., & Seim, G. G. (2015). Entering a Developing Country with a Solar Cooker: Strategies for Start-ups.
199
Jhaveri, R. H., & Patel, N. M. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks, 1-18.
200
Mahajan, N., Bedi, R., & Gupta, S. K. Defending Against Byzantine and Resource Consumption Attacks by Malicious Nodes in MANETs.
201
Mittal, V. (2015). Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach. Prevention, 4(5).
202
Yadav, N. A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks.
203
Sharma, M., & Singla, R. Impact of Jamming Attack in Performance of Mobile Ad hoc Networks.
204
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1.
205
Caselli, M., Zambon, E., & Kargl, F. (2015, April). Sequence-aware Intrusion Detection in Industrial Control Systems. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (pp. 13-24). ACM.
206
Feshki, M. G., Sojoodi, O., & Anvary, M. D. (2015). Managing Intrusion Detection Alerts Using Support Vector Machines. International Journal of Computer Science and Security (IJCSS), 9(5), 266.
207
Anvary, M. D., Feshki, M. G., & Ahrabi, A. A. A. (2015). Efficient Security Alert Management System. International Journal of Computer Science and Security (IJCSS), 9(4), 218.
208
Gunduz, S., Arslan, B., & Demirci, M. (2015, December).A Review of Machine Learning Solutions to Denial-of-Services Attacks in Wireless Sensor Networks. In 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA) (pp. 150-155). IEEE.
209
Chaudhry, M. T., & Sher, M. Secure Group Based Biometric Authentication Approach for Mobile Ad hoc Networks.
210
Padma, T., Pillai, J. S., & Ambili, P. S. Continued Fraction Based Sequences for Content Based Image Authentication.
211
Pillai, J. S., & Padma, T. ParQuoSCI: Pseudorandom Partial Quotient Sequences for Content based Image Authentication.
212
Tazir, M. L., Azouaoui, O., Hazerchi, M., & Brahimi, M. (2015, July). Mobile robot path planning for complex dynamic environments. In Advanced Robotics (ICAR), 2015 International Conference on (pp. 200-206). IEEE.
213
Mobadersany, P., Khanmohammadi, S., & Ghaemi, S. A fuzzy multi-stage path-planning method for a robot in a dynamic environment with unknown moving obstacles. Robotica, 1-17.
214
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1.
215
Anchor, Nafisa, & Abdul race. (2015). Identify phishing websites in internet banking using optimization algorithm inclined pages. Electronic and cyber defense Journal, 3 (1).
216
Idris, M. I. A., Elsid, A. G., & Alhady, M. N. (2015). Enhancement the Ad-hoc On-demand Distance Vector of Network.
217
Elizabeth Jim, L., & Gregory, M. A. (2015, November). State analysis of Mobile Ad Hoc Network nodes. In Telecommunication Networks and Applications Conference (ITNAC), 2015 International (pp. 314-319). IEEE.
218
Yibyeonggwan , and jeongeunhui . (2015) . Efficient wormhole attack detection and removal techniques designed for the safe route on VANET. Security Engineering Research Institute Journal of Security Engineering, 12 (4), 415-426.
219
Bhatta, J., & Pandey, L. P. (2015, December). Performance analysis of various optimization techniques for elliptic curve cryptosystems on resource-constrained devices. In 2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA) (pp. 1-7). IEEE.
220
Zellagui, M., Benabid, R., Boudour, M., & Chaghi, A. (2015). Mixed Integer Optimization of IDMT Overcurrent Relays in the Presence of Wind Energy Farms Using PSO Algorithm. Periodica Polytechnica-Electrical Engineering and Computer Science, 59(1), 7-19.
221
Khurana, M., & Massey, K. (2015). Swarm algorithm with adaptive mutation for airfoil aerodynamic design. Swarm and Evolutionary Computation, 20, 1-13.
222
Neshat, M., & Sepidname, G. (2015). A new hybrid optimization method inspired from swarm intelligence: Fuzzy adaptive swallow swarm optimization algorithm (FASSO). Egyptian Informatics Journal, 16(3), 339-350.
223
Adewumi, A. O., & Arasomwan, M. A. (2015). Improved Particle Swarm Optimizer with Dynamically Adjusted Search Space and Velocity Limits for Global Optimization. International Journal on Artificial Intelligence Tools.
224
Chenshou Wen. (2015) based on the centroid and adaptive inertia weight index improved particle swarm optimization. Computer Engineering and Applications, 51 (5).
225
Chenshou Wen . ( 2015 ) . Based on the centroid and adaptive inertia weight index improved particle swarm algorithm . Journal of Computer Applications , 35 ( 3 ) , 675-679.
226
Kessentini, S., & Barchiesi, D. Particle Swarm Optimization with Adaptive Inertia Weight.Chen, R. M., & Huang, S. C. (2015, August). Particle swarm optimization for scheduling problems by curve controlling based global communication topology. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on (pp. 1716-1720). IEEE.
227
Yang, C. T. (2015). Based on plant location and to adapt to deviate from the value of the governor enhanced particle swarm optimization method . Kung University Thesis Institute of Information Management , 1-60 .
228
Iwasokun, G. B., Udoh, S. S., & Akinyokun, O. K. (2015). Multi-Modal Biometrics: Applications, Strategies and Operations. Global Journal of Computer Science and Technology, 15(2).
229
Mijac, M., & Stapic, Z. (2015, January). Reusability Metrics of Software Components: Survey. In Central European Conference on Information and Intelligent Systems (p. 221). Faculty of Organization and Informatics Varazdin.
230
Mijac, M., & Stapic, Z. (2015, January). Reusability Metrics of Software Components: Survey. In 26th Central European Conference on Information and Intelligent Systems (CECIIS 2015).
231
Mandala, S., Ngadi, M. A., Sharif, J. M., Zahid, M. S. M., & Mohamed, F. (2015). Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks. International Journal of Embedded Systems, 7(3-4), 296-305.
232
Hussain, M. A. (2015). Energy Efficient Intrusion Detection Scheme with Clustering for Wireless Sensor Networks. TELKOMNIKA Indonesian Journal of Electrical Engineering, 15(1), 128-141.
233
masoud Javidi, M., & Aliahmadipour, L. (2015). Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs. Computer Engineering and Applications, 4(1).
234
Samaras, N. S., Kokkinos, K., Chaikalis, C., & Vlachos, V. (2015). On intrusion detection in opportunistic networks. International Journal of Innovation and Regional Development, 6(3), 222-242.
235
Meenatchi, I., & Palanivel, K. An Enhanced Cross layer intrusion detection and adaptive response mechanism for MANETs.
236
EL MOURABIT, Y. O. U. S. E. F., toumanari, a., bouirden, a., & el moussaid, n. a. d. i. a. (2015). a comparative evaluation of intrusion detection techniques in wireless sensor network. journal of theoretical & applied information technology, 76(1).
237
Jacobs, M., Chang, L. C., Pulkkinen, A., & Romano, M. (2015). Automatic analysis of double coronal mass ejections from coronagraph images. Space Weather, 13(11), 761-777.
238
RAVI, M., & basavaprasad, b. a comparative study on segmentation methods for medical imaging.
239
Alimi, I. A., & Aboderin, O. (2015). Enhanced encryption algorithm based on a modified confusion and diffusion scheme. American Journal of Mobile Systems, Applications and Services, 1(1), 20-29.
240
Saqib, Z., Shahid, M. A., & Ashraf, M. U. Encryption and Decryption Using Automata Theory.
241
Gandhi, R. A., & Gosai, A. M. (2015). A Study on Current Scenario of Audio Encryption. International Journal of Computer Applications, 116(7), 13-17.
242
Amounas, f. international journal of engineering sciences & research technology a multi-level approach of elliptic curve cryptosystem for enhanced security of amazigh alphabet using cellular automata.
243
Prasad, M. R. (2015). Improving RGB Data Security with Advance Cryptography Algorithm.
244
Gosai, D. A. M. (2015). International Journal of Computer Applications.
245
Kalidasan, S., & Pandian, P. Available Online through Research Article www. ijptonline. com.
246
Wong, C. H. H. (2015). A study of mobile learning for Guangzhou’s University students.
247
Srivastava, S., & Misra, M. (2015). Tracking technology trajectory through regression modelling: a retrospective techno-analysis. Technology Analysis & Strategic Management, 27(4), 420-436.
248
Sumathi, A., & Sundaram, B. V. (2015). An ANN Approach in Ensuring CIA Triangle using an Energy based Secured Protocol E-AODV for Enhancing the Performance in MANETS. Indian Journal of Science and Technology, 8(34).
249
Das, J., & Das, P. (2015). An Overview of Wireless Ad hoc Networks. International Journal of Advanced Research in Computer Science, 6(1).
250
Naheed, M., Mahmood, H., & Murtza, I. (2015, October). Secure multipath routing using link compromise metric in mobile ad hoc networks. In Electrical Engineering (RAEE), 2015 Symposium on Recent Advances in (pp. 1-5). IEEE.
251
Chauhan, A., Rani, P., & Student, M. T. A Detail Review of Routing Attacks in Mobile Ad Hoc Networks.
252
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1.
253
Jin-peng, Q., Jie, Q., Fang, P., & Tao, G. (2015, July). Multi-channel detection for abrupt change based on the Ternary Search Tree and Kolmogorov statistic method. In Control Conference (CCC), 2015 34th Chinese (pp. 4968-4973). IEEE.
254
Akila, A., & Chandra, E. (2015). Word based tamil speech recognition using temporal feature based segmentation. ictact Journal on Image & Video Processing, 5(4).
255
Ramli, I. (2015). Regular paper Sentence boundary detection without speech recognition: A case of an under-resourced language. J. Electrical Systems, 11(3), 308-318.
256
Das, A. P., & Thampi, S. M. (2015, August). Secure communication in mobile underwater wireless sensor networks. In Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on (pp. 2164-2173). IEEE.
257
Ramezani, H., Fazel, F., Stojanovic, M., & Leus, G. (2015). Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization.
258
Carneiro, J. H. C. C. (2015). localização de emissores acústicos em ambientes submarinos com redes de sensores móveis (doctoral dissertation, universidade federal do rio de janeiro).
259
Dell'Erba, R. (2015). Determination of Spatial Configuration of an Underwater Swarm with Minimum Data. Int J Adv Robot Syst, 12, 97.
260
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1.
261
Emam, M. M., Aly, A. A., & Omara, F. A. A Modified Image Steganography Method based on LSB.
262
Thanekar, S. A. (2015). Eight Pixel Pairs Value Differencing Image Steganography. IJETT, 2(1).
263
Sakthivel, S. M., & Ravi Sankar, A. (2015, February). A VLSI architecture for watermarking of grayscale images using weighted median prediction. In Electronics and Communication Systems (ICECS), 2015 2nd International Conference on (pp. 1128-1131). IEEE.
264
Amsaveni, A., & Vanathi, P. T. (2015). A comprehensive study on image steganography and steganalysis techniques. International Journal of Information and Communication Technology, 7(4-5), 406-424.
265
Deshmukh, M. A. P., & Suralkar, S. R. (2015). Literature Survey-Digital Watermarking on Camera Captured Color Images.
266
Manjula, G. R., & Danti, A. (2015). A novel hash based least significant bit (2-3-3) image steganography in spatial domain. arXiv preprint arXiv:1503.03674.
267
Swain, G., & Lenka, S. K. (2015). A novel steganography technique by mapping words with LSB array. International Journal of Signal and Imaging Systems Engineering, 8(1-2), 115-122.
268
Al-Hada, M., Naser, A. M., & Al-Thamary, M. Hide Image in Image Based on LSB Replacement and Arnold Transform.
269
Tajuddin, T. B., & Manaf, A. A. Forensic Investigation and Analysis on Digital Evidence Discovery through Physical Acquisition on Smartphone.
270
Martin, K. K. (2015). An Investigation of Digital Forensic Models Applicable in the Public Sector (A case of Kenya National Audit Office) (Doctoral dissertation).
271
Lin, T. S., Lin, I. L., & Leu, F. Y. (2015, July). Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015 9th International Conference on (pp. 420-425). IEEE.
272
Rauter, S., Fister, I., & Fister Jr, I. (2015). How to Deal with Sports Activity Datasets for Data Mining and Analysis: Some Tips and Future Challenges. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 7(2), 27-37.
273
Antonio, T., & Paramita, A. S. (2015). Feature Selection Technique Impact for Internet Traffic Classification Using Naïve Bayesian. Jurnal Teknologi, 72(5).
274
Paramita, A. S. (2014). Feature Selection Technique Using Principal Component Analysis For Improving Fuzzy C-Mean Internet Traffic Classification. Australian Basic and Applied Sciences (AJBAS): 2014 International on Engineering Conference on Sciences and Technology Innovation–ISSN: 1997-8178–American-Eurasian Network for Scientific Information (AENS
275
Paramita, A. S. (2016). Principal Feature Selection Impact for Internet Traffic Classification Using Naïve Bayes. In Proceedings of Second International Conference on Electrical Systems, Technology and Information 2015 (ICESTI 2015) (pp. 475-480). Springer Singapore.
276
Mayilvaganan, M., & Geethamani, G. S. A Preliminary Survey on Genetic Algorithm Techniques.
277
Persis, D. J., & Robert, T. P. (2015). Ant Based Multi-objective Routing Optimization in Mobile AD-HOC Network. Indian Journal of Science and Technology, 8(9), 875-888.
278
Joardar, S., Bhattacherjee, V., & Giri, D. (2015). SiCaL: a swarm inspired congestion aware probabilistically load balance routing in MANETs. International Journal of Information and Communication Technology, 7(6), 585-606.
279
Sensarma, D. (2015). AQTR: The Ant Based Qos Aware Improved Temporally Ordered Routing Algorithm for Manets. Available at SSRN 2556278.
280
Karthikeyan, P., & Baskar, S. (2015). Genetic algorithm with ensemble of immigrant strategies for multicast routing in Ad hoc networks. Soft Computing, 19(2), 489-498.
281
Cao, M. S., Pan, L. X., Gao, Y. F., Novák, D., Ding, Z. C., Lehký, D., & Li, X. L. Neural network ensemble-based parameter sensitivity analysis in civil engineering systems. Neural Computing and Applications, 1-8.
282
Ravi, V., Koparkar, S., Raju, N. P., & Sridher, S. (2015). Improving retail banking loans recovery via data mining techniques: a case study from Indian market. International Journal of Electronic Customer Relationship Management, 9(2-3), 189-201.
283
Teshnizi, S. H., & Ayatollahi, S. M. T. (2015). A Comparison of Logistic Regression Model and Artificial Neural Networks in Predicting of Student’s Academic Failure. Acta Informatica Medica, 23(5), 296.
284
Senthilkumar, D., & Paulraj, S. Prediction of Low Birth Weight Infants and Its Risk Factors Using Data Mining Techniques.
285
Jain, N., Sharma, A., & Sharma, A. Nav view search.
286
Yunus, N. A. M., & Othman, M. (2015). Reliability Evaluation for Shuffle Exchange Interconnection Network. Procedia Computer Science, 59, 162-170.
287
Gangele, S., & Dongre, A. (2015). Area Estimation for Web Browsing Performance of Users by Applying Numerical Method. International Journal of Computer Applications, 120(9), 6-11.
288
Patidar, B., & Shivhare, R. R. (2015). Detection of Wormhole Attack using Round Trip Time and Node Workload. International Journal of Computer Applications, 112(11).
289
Ramana, V. V., & Reddy, A. R. M. (2015). Secure routing in MANETs: a bio–inspired approach with honey bees. International Journal of Wireless and Mobile Computing, 8(1), 82-89.
290
Lakshmi, A. A., & Valluvan, K. R. (2015). Support vector machine and fuzzy-based intrusion detection and prevention for attacks in MANETs. International Journal of Mobile Network Design and Innovation, 6(2), 63-72.
291
Schoofs, M. HIV VULNERABILITY FOUND via STOCK MARKET ANALYSIS.
292
Singh, N., & Shrivastava, L. (2015). Impact of Antenna model with the variation of speed for Reactive and Hybrid routing protocols in Mobile Ad-Hoc Networks.
293
Rajkumar, B., & Narsimha, G. (2015). Trust-based light weight authentication routing protocol for MANET. International Journal of Mobile Network Design and Innovation, 6(1), 31-39.
294
Sardana, A., Saini, A., Bedwal, T., & Tayal, R. (2015, March). Black hole attack's effect mobile ad-hoc networks (MANET). In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in (pp. 966-970). IEEE.
295
Xiong, X., Feng, J., & Jiang, L. (2015, October). Automatic digital modulation classification for ORS satellite relay communication. In Wireless Communications & Signal Processing (WCSP), 2015 International Conference on (pp. 1-5). IEEE.
296
Hussain, J., Lalmuanawma, S., & Chhakchhuak, L. (2015). A Novel Network Intrusion Detection System Using Two-Stage Hybrid Classification Technique. IJCCER, 3(2), 16-27.
297
Mansouri, m., golsefid, m. t., & nematbakhsh, n. (2015). a hybrid intrusion detection system based on multilayer artificial neural network and intelligent feature selection. cumhuriyet science journal, 36(3), 2686-2692.
298
JAWANJAL, S. D. INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY.
299
Chaczko, Z., Jacak, W., & Luba, T. (2015). Computational Intelligence and Efficiency in Engineering Systems (Vol. 595). G. Borowik (Ed.). Springer.
300
Dhankar, M. (2015). Network Security-Authentication Methods and Firewall. IITM Journal of Management and IT, 6(1), 73-79.
301
Sekulski, R., & Woda, M. (2015). Authorial, Adaptive Method of Users’ Authentication and Authorization. In Computational Intelligence and Efficiency in Engineering Systems (pp. 171-184). Springer International Publishing.
302
Sekulski, R., & Woda, M. (2015). A Novel Approach to Users Authentication and Authorization. Studia Informatica, 36(2), 5-22.
303
Aujla, S., & Ummat, A. Task scheduling in Cloud Using Hybrid Cuckoo Algorithm. International Journal of Computer Networks and Applications (IJCNA), 2(3), 144-150.
304
Mao, Y., Zhong, H., & Li, X. (2015, August). Hierarchical model-based associate tasks scheduling with the deadline constraints in the cloud. In Information and Automation, 2015 IEEE International Conference on (pp. 268-273). IEEE.
305
Neves, D., Lourenco, N., & Horta, N. (2015, September). Scheduling evaluation tasks for increased efficiency of parallel analog IC synthesis. In Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design (SMACD), 2015 International Conference on (pp. 1-4). IEEE.
306
Pop, F., Dobre, C., Cristea, V., Bessis, N., Xhafa, F., & Barolli, L. (2015). Reputation-guided evolutionary scheduling algorithm for independent tasks in inter-clouds environments. International Journal of Web and Grid Services, 11(1), 4-20.
307
Kalra, M., & Singh, S. (2015). A review of metaheuristic scheduling techniques in cloud computing. Egyptian Informatics Journal, 16(3), 275-295.
308
Hashimi, H., Hafez, A., & Mathkour, H. (2015). Selection criteria for text mining approaches. Computers in Human Behavior, 51, 729-733.
309
El-Said, A. M., ELDESOKY, A., & Arafat, H. A. (2015). An Efficient Approach to Construct Object Model of Static Textual Structure with Dynamic Behavior Based on Q-learning. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 31(4), 1267-1289.
310
Priest, B., Vuksani, E., Wagner, N., Tello, B., Carter, K. M., & Streilein, W. W. Agent-Based Decision Support for Moving Target Technology Deployment.
311
Kaur, R., & Prabha, E. C. a novel technique of image steganography.
312
Ujianto, e., harjoko, a., wardoyo, r., & moesriami, a. (2015). cascaded image steganography to increase robustness againts attack of the stego image. journal of theoretical & applied information technology, 79(3).
313
Saputra, D. E., Supangkat, S. H., & Sutikno, S. (2015, November). Review and classification of electronic cash research. In 2015 International Conference on Information Technology Systems and Innovation (ICITSI) (pp. 1-5). IEEE.
314
ESTEDLAL, M. M. (2015). Introduction and Evaluation of Computer Security Incident Response Team (CSIRT) in Organizations. Cumhuriyet Science Journal, 36(6), 246-253.
315
Je, Y. M., You, Y. Y., & Na, K. S. Information Security Evaluation Using Multi-Attribute Threat Index. Wireless Personal Communications, 1-13.
316
AL-Nasrawi, D. A., Almukhtar, A. F., & AL-Baldawi, W. S. (2015). From Arabic Alphabets to Two Dimension Shapes in Kufic Calligraphy Style Using Grid Board Catalog. Communications in Applied Sciences, 3(2).
317
Montasari, R., Peltola, P., & Evans, D. (2015). Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations. In Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security (pp. 83-95). Springer International Publishing.
318
History Xin Ling, & Zheng Shuli . ( 2015 ) . Research and development of network forensics of network security technology and applications, ( 2 ) , 110-111.
319
Wen Min . ( 2015 ) . Design and implementation of information exchange security suite system. Network Security Technology and Application, ( 2 ) , 114-116.
320
Gaber, A. M., Mazen, S., & Hassanei, E. E. (2015). Framework for Integrating Software Project Tasks and Change Requests. International Journal of Computer Applications, 125(12).
321
Al-Azawi, R. K. (2015). Agent Oriented Software Engineering (AOSE) Approach to Game Development Methodology.
322
Faculty of Computer Science And Information Technology - Universiti Putra Malaysia (UPM)
323
Bistouni, F., & Jahanshahi, M. (2014). Improved extra group network: a new fault-tolerant multistage interconnection network. The Journal of Supercomputing, 69(1), 161-199.
324
Vimina, E. R., & Jacob, K. P. (2014). An Evaluation of Image Matching Algorithms for Region Based Image Retrieval. International Journal of Advancements in Computing Technology, 6(6), 75.
325
Sardar, M., Banerjee, S., Majhi, K., & Majumder, K. (2014). Trust Based Network Layer Attacks Prevention in MANET. In Emerging Trends in Computing and Communication (pp. 193-204). Springer India.
326
Sardar, M., & Majumder, K. (2014). A New Trust Based Secure Routing Scheme in MANET. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 321-328). Springer International Publishing.
327
Hassan, W. A., & Rahman, T. A. (2014). Coexistence model for compatibility between IMT-advanced and other wireless communication services. Wireless Personal Communications, 79(3), 2025-2039.
328
Curilem, M., Vergara, J., San Martin, C., Fuentealba, G., Cardona, C., Huenupan, F., Chacón, M., Khan, M. S., Hussein, W. & Yoma, N. B. (2014). Pattern recognition applied to seismic signals of the Llaima volcano (Chile): An analysis of the events' features. Journal of Volcanology and Geothermal Research, 282, 134-147.
329
Curilem, M., Huenupan, F., San Martin, C., Fuentealba, G., Cardona, C., Franco, L., Acuña, G., Chacón, M., (2014). Feature Analysis for the Classification of Volcanic Seismic Events Using Support Vector Machines. In Nature-Inspired Computation and Machine Learning (pp. 160-171). Springer International Publishing.
330
Chaubey, A., Chelladurai, H., Lamba, S. S., (2014). Condition monitoring of rotating shaft using virtual instrumentation" 5th International & 26th All India Manufacturing Technology, Design and Research Conference (AIMTDR 2014), pp. 557-(1-6). IIT Guwahati, Assam, India.
331
Adly, F., Yoo, P. D., Muhaidat, S., & Al-Hammadi, Y. (2014, May). Machine-Learning-Based Identification of Defect Patterns in Semiconductor Wafer Maps: An Overview and Proposal. In Parallel & Distributed Processing Symposium Workshops (IPDPSW), 2014 IEEE International (pp. 420-429). IEEE.
332
Hussien, N. S., Sulaiman, S., & Shamsuddin, S. M. (2014). A Review of Intelligent Methods for Pre-fetching in Cloud Computing Environment. In Recent Advances on Soft Computing and Data Mining (pp. 647-656). Springer International Publishing.
333
Selvakumar, L., Vivekanandan, K., & Amilan, S. (2014). New Linkage Learning Technique in Genetic Algorithm for Stock Selection Problem. International Journal of Advanced Research in Computer Science, 5(3).
334
Gautam, G., & Yadav, D. (2014, August). Sentiment analysis of twitter data using machine learning approaches and semantic analysis. In Contemporary Computing (IC3), 2014 Seventh International Conference on (pp. 437-442). IEEE.
335
Suresh Joseph, K. (2014). Genetic algorithm based hybrid imputation model for software effort estimation.
336
Khan, R. A. (2014). Machine Learning: Techniques and Application. Artificial Intelligent Systems and Machine Learning, 6(5), 169-175.
337
Spamers, A. J., & Grobler, H. Real-time Face Detection and Tracking from a Non-static Video Camera.
338
Chung, S. H., Robertson, S., Minnaar, A., Cook, M., & Sun, L. (2014, January). Developing a Knowledge Management System Using an Ontological Approach in Global Organization. In ICISO (pp. 340-347).
339
Yuan, Y., Chen, D., Li, Y., Yu, D., Yan, L., & Zhu, Z. (2014). The improved Shark Search Approach for Crawling Large-scale Web Data. International Journal of Multimedia & Ubiquitous Engineering, 9(8).
340
Khanbary, L. M. O., & Vidyarthi, D. P. (2014). Agent-based energy constrained channel allocation in mobile computing using GA. International Journal of Wireless and Mobile Computing, 7(4), 388-399.
341
Gaber, S. M. A., & Sumari, P. (2014). Predictive and content-aware load balancing algorithm for peer-service area based IPTV networks. Multimedia tools and applications, 70(3), 1987-2010.
342
Banafar, H., & Sharma, S. Secure Cloud Environment Using Hidden Markov Model and Rule Based Generation.
343
Sarhan, A., Elmogy, A. M., & Ali, S. M. (2014, December). New Web cache replacement approaches based on internal requests factor. In Computer Engineering & Systems (ICCES), 2014 9th International Conference on (pp. 383-389). IEEE.
344
Venketesh, P. (2014). New approaches in web prefetching to improve content access by end users.
345
Aswini, S., & Sundaram, G. S. (2014). Web cache memory compression for optimizing performance in web browsers.
346
Bhatnagar, U., & Gahlout, A. A Modern Way of Framework Design for the Client Side Web Caching and Prefetching Technique.
347
ShanmugaSundaram, G., & Aswini, S. Web cache memory compression for optimizing the performance in web browsers.
348
Konate, K., & Abdourahime, G. A. Y. E. (2014). Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks. Compusoft, 3(12), 1425.
349
Praveena, M., Thiribhurabhavan, R. M., Bhavadharini, R. M., & Karthik, D. S. (2014). An Enhanced Adaptive Security Protocol For Replica Attacks In Mobile Adhoc Networks. International Journal of software and hardware Research in Engg, 2(5), 79-83.
350
Kadu, A. A., & S Nagdive, A. (2014). “Real-Time 3D Game Using Sixth Sense and Haptic Technology”: A Review. IJRCCT, 3(1), 042-047.
351
Dhule, C., & Nagrare, T. (2014, April). Computer Vision Based Human-Computer Interaction Using Color Detection Techniques. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on (pp. 934-938). IEEE.
352
Bhatia, S. M., & Sharma, A. K. (2014). Fuzzy Quality Function Deployment and Software Engineering-A Literature Review. Software Engineering and Technology, 6(6), 159-168.
353
?icleanu, O. A. (2014). Nonlinear analysis on elliptic curves subspaces with cryptographic applications. Annals of the University of Craiova-Mathematics and Computer Science Series, 41(2), 292-299.
354
Imran, K., Mahfooz, S., Rauf, A., & Khusro, S. (2014). Enhanced Authentication Scheme for Proxy Mobile IPv6. Life Science Journal, 11(3s).
355
Shukla, D., & Verma, K. (2014). Bounded Area Estimation Using Simpson 3/8 Rule in Traffic Sharing Scenario in Computer Network.
356
Gangele, S., Verma, K., & Shukla, D. (2014). Bounded Area Estimation of Internet Traffic Share Curve. International Journal of Computer Science and Business Informatics (IJCSBI), 10(1), 54-67.
357
Tu, M. H. (2014). A method in a meaningful candidate styles mining image library of styles frequently . Sun Yat-sen Institute of Information Engineering Thesis , 1-102.
358
?icleanu, O. A. (2014). Nonlinear analysis on elliptic curves subspaces with cryptographic applications. Annals of the University of Craiova-Mathematics and Computer Science Series, 41(2), 292-299.
359
Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14(6), 10081-10106.
360
Babrahem, A. S., Alharbi, E. T., Alshiky, A. M., Alqurashi, S. S., & Kar, J. (2014). Study of the Security Enhancements in Various E-Mail Systems. Journal of Information Security, 6(01), 1.
361
Zhu, H., Hao, X., & Sun, Y. Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant.
362
Babrahem, A. S., Alharbi, E. T., Alshiky, A. M., Alqurashi, S. S., & Kar, J. Scientific Research Publishing.
363
Varsaki, E. E., Fotopoulos, V., & Skodras, A. N. (2014). A discrete Gould transform data hiding scheme. Mathematical Methods in the Applied Sciences, 37(2), 283-288.
364
Othman, J. A. (2014). Steganographic scheme to avoid statistical Steganalysis. J. Of College Of Education For Women, 25(1).
365
Bagade, A. M. (2014). A High Quality Steganographic Method Using Morphing. Journal of information processing systems, 10(2), 256-270.
366
Azaminezhad, M. S., & Bidgoli, A. M. (2014). A new high capacity steganography based on bit-inverting method in DWT domain. Journal of Advanced Computer Science & Technology, 3(2), 169-178.
367
Mandal, P. C. (2014). A study of Steganography Techniques using Discrete Wavelet Transform. Journal of Global Research in Computer Science, 5(5), 7-14.
368
aldeen najim Alzubaidy, D. (2014). Paper of Nagham. pdf.
369
Usha, B. A., Srinath, N. K., Nanjangud, N. C. A., Deshpande, A. M., & Rebello, A. (2014). A Survey on Secure and High Capacity Image Steganography Techniques. International Journal of Advanced Research in Computer and Communication Engineering, 2(3).
370
Abdullah, K. A., Al-Jawad, N., & Abdulla, A. A. (2014, May). Effect of using different cover image quality to obtain robust selective embedding in steganography. In SPIE Photonics Europe (pp. 913808-913808). International Society for Optics and Photonics.
371
Desmukh, P. R., & Rahangdale, B. (2014). Hash Based Least Significant Bit Technique For Video Steganography. International Journal of Engineering Research and Applications (IJERA), 4(1).
372
Kumar, S., Gupta, A., Chandwani, A., Yadav, G., & Swarnkar, R. (2014, September). RGB image watermarking on video frames using DWT. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 675-680). IEEE.
373
Alam, I., Khusro, S., Rauf, A., & Zaman, Q. (2014). Conducting surveys and data collection: From traditional to mobile and SMS-based surveys. Pakistan Journal of Statistics and Operation Research, 10(2), 169-187.
374
Kale, N. A., Natikar, S. B., & Karande, S. M. (2014). Secured Mobile Messaging for Android application.
375
Aprilianto, M., & Abdurohman, M. (2014, April). Improvement Text Compression Performance Using Combination of Burrows Wheeler Transform, Move to Front, and Huffman Coding Methods. In Journal of Physics: Conference Series (Vol. 495, No. 1, p. 012042). IOP Publishing.
376
Shaker, S. H., Jeiad, H. A., & Hassan, F. A. Propose a Model for Securing SMS.
377
Deshmukh, S. P., & Naware, A. M. Mobile Money: M-payment System for India.
378
LaRusic, J., & Punnen, A. P. (2014). The asymmetric bottleneck traveling salesman problem: Algorithms, complexity and empirical analysis. Computers & Operations Research, 43, 20-35.
379
Ahmed, Z. H. (2014). A data-guided lexisearch algorithm for the quadratic assignment problem. Indian Journal of Science and Technology, 7(4), 480-490.
380
Swiercz, A., Burke, E. K., Cichenski, M., Pawlak, G., Petrovic, S., Zurkowski, T., & Blazewicz, J. (2014). Unified encoding for hyper-heuristics with application to bioinformatics. Central European Journal of Operations Research, 22(3), 567-589.
381
Magare, S. S., Gedam, Y. K., Randhave, D. S., & Deshmukh, R. R. (2014). Character Recognition of Gujarati and Devanagari Script: A Review.
382
Magare, S. S., & Deshmukh, R. R. (2014). Offline Handwritten Sanskrit Character Recognition Using Hough Transform and Euclidean Distance. International Journal of Innovation and Scientific Research ISSN, 2351-8014.
383
Mendapara, M. B., & Goswami, M. M. (2014, March). Stroke identification in Gujarati text using directional feature. In Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on (pp. 1-5). IEEE.
384
El Korbi, I., & Zeadally, S. (2014). Energy-aware sensor node relocation in mobile sensor networks. Ad Hoc Networks, 16, 247-265.
385
Anil, M. C., & Shirbahadurkar, S. D. (2014, February). Speech modification for prosody conversion in expressive Marathi text-to-speech synthesis. In Signal Processing and Integrated Networks (SPIN), 2014 International Conference on (pp. 56-58). IEEE.
386
Banerjee, S., Sardar, M., & Majumder, K. (2014, January). Aodv based black-hole attack mitigation in manet. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 345-352). Springer International Publishing.
387
Gopalakrishnan, S., & Ganeshkumar, P. (2014). Intrusion detection in mobile ad hoc network using secure routing for attacker identification protocol. American Journal of Applied Sciences, 11(8), 1391.
388
Silwal, S., & Sharma, A. (2014). A new Security approach for integrating wireless adhoc network using octant bit computation and routing test. IJSEAT, 2(6), 154-157.
389
Banerjee, S., & Majumder, K. (2014). wormhole attack mitigation in manet: a cluster based avoidance technique. International Journal of Computer Networks & Communications, 6(1), 45.
390
Abomhara, M., & Koien, G. M. (2014, May). Security and privacy in the Internet of Things: Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on (pp. 1-8). IEEE.
391
Garg, G., Kaushal, S., & Sharma, A. (2014). Behavioural Study of Reactive Protocols with Wormhole Attack in Mobile ADHOC Networks. Journal of Emerging Technologies in Web Intelligence, 6(4), 445-455.
392
Sivagurunathan, S., & Prathapchandran, K. (2014, January). Trust and cluster based authentication schemes in mobile Ad Hoc networks—A review. In Power Signals Control and Computations (EPSCICON), 2014 International Conference on (pp. 1-5). IEEE.
393
Tamizarasu, k., kalpana, a., & rajaram, M. (2014). maliciousness in mobile ad hoc networks: a performance evaluation. Journal of Theoretical & Applied Information Technology, 65(3).
394
Patil, K. T., & Patil, M. E. (2014). Study of Attacks in MANET, Attacks on AES, Cryptographically Generated Addresses (CGAs) Methods and Possible Alleviation in IPV6 over MANET Area. International Journal of Computer Applications, 96(1).
395
Kirubakaran, N., & Kathirvel, A. (2014). Performance Improvement of Security Attacks in Wireless Mobile Ad Hoc Networks. Asian Journal of Information Technology, 13(2), 68-76.
396
Dureja, A., & Dahiya, V. (2014). performance evaluation of collaborative attacks in manet.
397
Jasim, S. I. (2014). pcf investigation to improve the performance of tora-based manet against jamming attacks. International Journal of Computer Science and Engineering Survey, 5(3), 17.
398
Guo, C., Xu, H., Ju, L., Jia, Z., & Xu, J. (2014, September). A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on (pp. 156-163). IEEE.
399
Sivagurunathan, S., & Prathapchandran, K. (2014, March). Trust Based Security Schemes in Mobile Ad Hoc Networks-A Review. In Intelligent Computing Applications (ICICA), 2014 International Conference on (pp. 291-295). IEEE.
400
Sardar, M., Banerjee, S., Majhi, K., & Majumder, K. (2014). Trust Based Network Layer Attacks Prevention in MANET. In Emerging Trends in Computing and Communication (pp. 193-204). Springer India.
401
Vaibhav, A. (2014). Security in Monitoring Schemes: A Survey. arXiv preprint arXiv:1411.5213.
402
Samanta, C. K., Hota, M. K., Nayak, S. R., Panigrahi, S. P., & Panigrahi, B. K. (2014). Energy management in hybrid electric vehicles using optimized radial basis function neural network. International Journal of Sustainable Engineering, 7(4), 352-359.
403
Kodali, R. K., & Boppana, L. (2014, September). FPGA implementation of energy efficient multiplication over GF (2 m) for ECC. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 1815-1821). IEEE.
404
Anagreh, M., Samsudin, A., & Omar, M. A. (2014). Parallel Method for Computing Elliptic Curve Scalar Multiplication Based on MOF. International Arab Journal of Information Technology (IAJIT), 11(6).
405
Abdulrazeg, A. A., Norwawi, N. M., & Basir, N. (2014, October). Extending V-model practices to support SRE to build secure web application. In Advanced Computer Science and Information Systems (ICACSIS), 2014 International Conference on (pp. 213-218). IEEE.
406
Chawla, D., & Kaur, M. (2014). System & Web based Modeling for Secure Software Development. International Journal of Computer Technology and Applications, 5(1), 257.
407
Moedjiono, s., rifai, a., & mantoro, t. (2014). a robust steganography approach with high embedding capacity using unique value embedding and codebook. Journal of Theoretical & Applied Information Technology, 66(1).
408
Doshi, J. C., Christian, M., & Trivedi, B. H. (2014). SQL FILTER–SQL Injection prevention and logging using dynamic network filter. In Security in Computing and Communications (pp. 400-406). Springer Berlin Heidelberg.
409
Manimegalai, R. (2014). Efficient joint compression and encryption techniques for video data.
410
Kansal, A., & Singh, Y. Survey on Machine Learning Techniques for Event Detection in Wireless Sensor Networks.
411
Medany, I., Shazly, M., & El-Sherbiny, M. G. (2014). Expert-Based-Computer Aided Design and Component Selection for Dust Collection Systems. International Journal of Scientific Research in Environmental Sciences, 2(1), 14.
412
Mehrasa, M., Zaker, S. R., Larki, B., Mehmandoust, M., Baghshahi, H., Sekhavati, M. H., & Gavanji, S. (2014). Computational Prediction and Analysis of Interaction of Silver Nitrate with Peptidoglycan-Associated lipoprotein (Pal). International Journal of Scientific Research in Environmental Sciences, 2(1), 8.
413
Kotenko, I., & Chechulin, A. Fast Network Attack Modeling and Security Evaluation based on Attack Graphs. Journal of Cyber Security, 3(1), 27-46.
414
Parul, M., & Rohil, H. (2014). Optimized Image Steganography using Discrete Wavelet Transform (DWT). International Journal of Recent Development in Engineering and Technology (IJRDET), 2(2), 75-81.
415
Nag, A., Singh, J. P., Biswas, S., Sarkar, D., & Sarkar, P. P. (2014). A Huffman Code Based Image Steganography Technique. In Applied Algorithms (pp. 257-265). Springer International Publishing.
416
Zan, M. M., & Aye, N. (2014). Implementation of Secure Steganography System Based on DWT in RGB Color Channel. IJCCER, 2(3), 114-118.
417
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication.
418
Azaminezhad, M. S., & Bidgoli, A. M. (2014). A new high capacity steganography based on bit-inverting method in DWT domain. Journal of Advanced Computer Science & Technology, 3(2), 169-178.
419
Mandal, P. C. (2014). A study of Steganography Techniques using Discrete Wavelet Transform. Journal of Global Research in Computer Science, 5(5), 7-14.
420
Kalami, A. (2014). A modified robust and effective algorithm with mathematical calculation for minutiae detection. Physical Sciences Research International, 2(1), 1-5.
421
Jana, B., Mondal, S. K., Jana, S., & Giri, D. (2014, February). Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach. In Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on (pp. 319-324). IEEE.
422
Garg, S., & Mathur, M. (2014, February). Chaotic map based steganography of gray scale images in wavelet domain. In Signal Processing and Integrated Networks (SPIN), 2014 International Conference on (pp. 689-694). IEEE.
423
REZA, W. (2014). Implementasi Slantlet Transform (SLT) dan Huffman Coding pada Steganografi Citra Grayscale. Skripsi, Fakultas Ilmu Komputer.
424
Thanikaiselvan, V., Arulmozhivarman, P., Chakrabarty, S., Agarwal, A., Subashanthini, S., & Amirtharajan, R. (2014). Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13(16), 2534.
425
Nag, A., Singh, J. P., Biswas, S., Sarkar, D., & Sarkar, P. P. (2014, January). A Huffman Code Based Image Steganography. In Applied Algorithms: First International Conference, ICAA 2014, Kolkata, India, January 13-15, 2014. Proceedings (Vol. 8321, p. 257). Springer..
426
Goel, S., Kumar, P., & Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator.
427
Nuri, S. A Modified Robust and Effective Algorithm with Mathematical Calculation for Minutiae Detection.
428
Madiavale, B. A. (2014). Information security management practices and organizational goals: a study of microfinanace organizations in Nairobi (Doctoral dissertation, University of Nairobi).
429
Peng, B., & Li, L. (2014). Combination of Genetic Algorithm and Ant Colony Optimization for QoS Multicast Routing. In Soft Computing in Artificial Intelligence (pp. 49-56). Springer International Publishing.
430
Prayudi, Y., Ashari, A., & Priyambodo, T. K. (2014). Digital Evidence Cabinets: A Proposed Frameworks for Handling Digital Chain of Custody. Int. J. Comput. Appl, 109(9), 30-36.
431
Saleem, S., Popov, O., & Bagilli, I. (2014). Extended abstract digital forensics model with preservation and protection as umbrella principles. Procedia Computer Science, 35, 812-821.
432
Rahman, A. F. A., Ahmad, R., & Mohamad, M. Z. (2014). Developing Forensic Readiness Secure Network Architecture for Wireless Body Area Network (WBAN). International Journal of Security and Its Applications, 8(5), 403-420.
433
Bera, A., Bhattacharjee, D., & Nasipuri, M. (2014). Hand Biometrics in Digital Forensics. In Computational Intelligence in Digital Forensics: Forensic Investigation and Applications (pp. 145-163). Springer International Publishing.
434
Malik, N. M. N. A., Yahya, S., & Abdullah, M. T. (2014). Critical Phases in Network Forensics-A Review. In The International Conference on Digital Security and Forensics (DigitalSec2014) (pp. 68-75). The Society of Digital Information and Wireless Communication.
435
Tonellotto, M. (2014). Evidenza informatica, computer forensics e best practices. Rivista di Criminologia, Vittimologia e Sicurezza, 8(2), 68-103.
436
Akosu, N., & Selamat, A. (2014). Incorporating Language Identification in Digital Forensics Investigation Framework. In Computational Intelligence in Digital Forensics: Forensic Investigation and Applications (pp. 63-78). Springer International Publishing.
437
Solinas, F. (2014). Technical and legal perspectives on forensics scenario.
438
Dlamini, M., Venter, H., Eloff, J., & Eloff, M. (2014, March). Requirements for Preparing the Cloud to Become Ready for Digital Forensic Investigation. In 13th European Conference on Cyber Warfare and Security ECCWS-2014 The University of Piraeus Piraeus, Greece (p. 242).
439
Bai, J., & Pu, T. C. (2014, May). Online Data Compression Technique for Real Time Data of Energy Management System in the Industrial Production. In Applied Mechanics and Materials (Vol. 519, pp. 70-73).
440
Pu, T., & Bai, J. (2014, May). An auto regression compression method for industrial real time data. In Control and Decision Conference (2014 CCDC), The 26th Chinese (pp. 5129-5132). IEEE.
441
Garba, A. M., & Zirra, P. B. Analysing Forward Difference Scheme on Huffman to Encode and Decode Data Losslessly.
442
Bharathi, K., & Vijaylakshmi, C. Optimization for Flexible Job Shop Scheduling by Evolutionary Representation.
443
Vignesh, B. (2014). Pipelined Quadratic Equation Based Novel Multiplication Method for Cryptographic Applications. Indian Journal of Science and Technology, 7(4), 34-39.
444
Chickerur, S., Rayudu, D. M. K., Hiriyannaiah, S., & Shabalina, O. (2014). Performance Analysis of Alternative Open Source Parallel Computing Approach to OpenMP on Multicore Processors. In Knowledge-Based Software Engineering (pp. 466-476). Springer International Publishing.
445
Lee, J. D., Im, H. J., Kang, W. M., & Park, J. H. (2014). Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices. Mathematical Problems in Engineering, 2014.
446
Mobhani, A. B., & Mishra, S. K. (2014). Diffusion of Cipher Blocks at Bit Level in Parallel AES to Improve Bit–Ratio Test thus Increasing Cryptanalysis Complexity.
447
Kumar, C., Dutta, S., & Chakborty, S. (2014, March). Musical cryptography using genetic algorithm. In Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference on (pp. 1742-1747). IEEE.
448
Sharma, R. S., Hiranwal, S., & Goyal, D. Analysis & Design Of Hybrid Cryptography Using Moving Image.
449
Sharma, R. S., Hiranwal, S., & Goyal, D. Analysis & Design Of Hybrid Cryptography Using Moving Image.
450
Jiji, G. W., Lakshmi, V. S., Lakshmi, K. V., & Priya, S. S. (2014). Diagnosis and Prognosis of the Arbovirus-Dengue using Intelligent Algorithm. Journal of The Institution of Engineers (India): Series B, 1-6.
451
Kang, Y. J., Ha, Y. R., & Lee, S. J. (2014). Microfluidic-based measurement of erythrocyte sedimentation rate for biophysical assessment of blood in an in vivo malaria-infected mouse. Biomicrofluidics, 8(4), 044114.
452
Opoku-Ansah, J., Eghan, M. J., Anderson, B., & Boampong, J. N. (2014). Wavelength Markers for Malaria (Plasmodium Falciparum) Infected and Uninfected Red Blood Cells for Ring and Trophozoite Stages. Applied Physics Research, 6(2), p47.
453
Kirongo, N. N. (2014). A Video Conferencing Security Framework For Synchronous Elearning (Doctoral dissertation).
454
El Mekawy, M., AlSabbagh, B., & Kowalski, S. (2014). The Impact of Business-IT Alignment on Information Security Process. In HCI in Business (pp. 25-36). Springer International Publishing.
455
Banerjee, C., & Banerjee, A. it security practices in an organization: balancing technology and management perspective. editorial board chief bebefactor, 495, 506.
456
Radouane, M., Messoussi, R., Touahni, R., & Boujiha, T. (2014, April). Robust method of digital image watermarking using SVD transform on DWT coefficients with optimal block. In Multimedia Computing and Systems (ICMCS), 2014 International Conference on (pp. 255-260). IEEE.
457
Wahaballa, A., Wahballa, O., Li, F., Ramadan, M., & Qin, Z. (2014). Multiple-Layered Securities Using Steganography and Cryptography. International Journal of Computers and Applications, 36(3), 93-100.
458
Thiruvengatanadhan, R., & Dhanalakshmi, P. (2014). A Fuzzy C-Means based GMM for Classifying Speech and Music Signals. International Journal of Computer Applications, 102(5).
459
Ramalingam, T., & Dhanalakshmi, P. (2014). Speech/music classification using wavelet based feature extraction techniques. Journal of Computer Science, 10(1), 34-44.
460
Pol, K. (2014). Image steganography based on DWT using Huffman LWZ Encoding. Int J Eng Tech Res, 2(3), 100-103.
461
Rajput, P., Arya, S., Kumari, S., & Lehana, P. (2014). Qualitative and quantitative analysis of non-uniform dark images. Advances in Image and Video Processing, 2(1), 23-34.
462
Thanikaiselvan, V., Arulmozhivarman, P., Chakrabarty, S., Agarwal, A., Subashanthini, S., & Amirtharajan, R. (2014). Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13(16), 2534.
463
Kaur, H., & Goyal, E. D. (2014). Performance Enhancement of a Transform Domain Based Steganographic Technique Using Segmentation.
464
Basatini, F. M., & Chinipardaz, R. (2014). Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting. Journal of Data Science, 12, 563-574.
465
Shibata, S. I., Sato, F., Kimura, H., & Oyabu, T. (2014). Evaluating Abnormal Condition in Physiological Disorder Using a Fluctuation Characteristic of Plant Bioelectric Potential. Sensors and Materials, 26(7), 483-493.
466
George, R., & Manimekalai, M. A. P. (2014, February). A novel approach for image compression using zero tree coding. In Electronics and Communication Systems (ICECS), 2014 International Conference on (pp. 1-5). IEEE.
467
Ortega-Corral, C., Palafox, L. E., García-Macías, J. A., Sánchez-García, J., & Aguilar, L. (2014). End-to-end message exchange in a deployable marine environment hierarchical wireless sensor network. International Journal of Distributed Sensor Networks, 2014.
468
Mafra, P. M., Fraga, J. S., & Santin, A. O. (2014). Algorithms for a distributed IDS in MANETs. Journal of Computer and System Sciences, 80(3), 554-570.
469
Azzawi, A. L. H. M. (2014). Enhancing The Encryption Process Of Advanced Encryption Standard (AES) By Using Proposed Algorithm To Generate S-Box. Journal of Engineering and Development, 18(2).
470
Kaul, V., Choudhari, P., & Narayankhedkar, S. K. (2014, September). Security enhancement for data transmission in 4G networks. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 373-378). IEEE.
471
Das, S., Zaman, J. S. U., & Ghosh, R. (2014). Study of Randomness in AES Ciphertexts Produced by Randomly Generated S-Boxes and S-Boxes with Various Modulus and Additive Constant Polynomials. Journal of The Institution of Engineers (India): Series B, 1-16.
472
Dara, M., & Manochehri, K. (2014). Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES. Information Security Journal: A Global Perspective, 23(1-2), 1-9.
473
Choudhari, P., Kaul, V., & Narayankhedkar, S. K. Security Enhancement Algorithms for Data Transmission in 4G Networks.
474
Kaur, N., & Behal, S. Audio Steganography Using LSB Edge Detection Algorithm.
475
Akhtar, M., Khusru, A., Usmani, A., & Sahoo, G. (2014). Nontransitive Ranking to Enhance Routing Decision in MANETS. arXiv preprint arXiv:1407.5385.
476
Patil, S., & Borade, D. (2014). Dynamic Cluster Based Intrusion Detection Architecture to Detect Routing Protocol Attacks in MANET. Sensor Netw Data Commun, 3(116), 2.
477
Rueda, J. S. R., & Bautista, D. R. (2014). análisis forense digital en dispositivos móviles. Revista de Semilleros de Investigación, 1(1).
478
Kasiaras, D., Zafeiropoulos, T., Clarke, N., & Kambourakis, G. (2014, December). Android forensics: Correlation analysis. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for (pp. 157-162). IEEE.
479
Cusack, B., & Lutui, R. (2014). Up-dating investigation models for smart phone procedures.
480
Mumba, E. R., & Venter, H. S. (2014, August). Mobile forensics using the harmonised digital forensic investigation process. In Information Security for South Africa (ISSA), 2014 (pp. 1-10). IEEE.
481
NK, P. J. K. (2014). an overview of mobile phone forensics. global journal of multidisciplinary studies, 4(1).
482
Shrivastava, G., & Gupta, B. B. (2014, October). An Encapsulated Approach of Forensic Model for digital investigation. In Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on (pp. 280-284). IEEE.
483
Morrell, C., Ransbottom, J. S., Marchany, R., & Tront, J. G. (2014, December). Scaling IPv6 address bindings in support of a moving target defense. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for (pp. 440-445). IEEE.
484
Victor, A. (2014). Splice Zerocopy System optimization using dual pipe schemes (Doctoral dissertation, TELKOM UNIVERSITY).
485
Wei, J., Zhihong, T., Chao, C., & Bei, G. (2014). Bottleneck analysis for data acquisition in high-speed network traffic monitoring. Communications, China, 11(1), 110-118.
486
Eisfeld, A. (2014). Entwurf und Analyse von Konzepten zur effizienten Datenübertragung von Grafikrendering-Befehlen auf eingebetteten Systemen.
487
Ali Tandra, S., & Rizvi, S. M. (2014). Security for Cloud Based Services.
488
Latif, R., Abbas, H., & Assar, S. (2014). Distributed denial of service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review. Journal of medical systems, 38(11), 1-10.
489
Kumar Shridhar, N. G. (2014). A Prevention of DDos Attacks in Cloud Using Honeypot. International Journal of Science and Research, 3(11), 2378-2383.
490
Aishwarya, R., & Malliga, S. (2014, April). Intrusion detection system-An efficient way to thwart against Dos/DDos attack in the cloud environment. In Recent Trends in Information Technology (ICRTIT), 2014 International Conference on (pp. 1-6). IEEE.
491
Dupin-Bryant, P. A., & Olsen, D. H. (2014). Business Intelligence, Analytics And Data Visualization: A Heat Map Project Tutorial. International Journal of Management & Information Systems (IJMIS), 18(3), 185-200.
492
Tarek, M., Ouda, O., & Hamza, T. (2014). Tokenless Cancelable Biometric Templates Based on Hetroassociation Neural Network. International Journal of Biometrics and Bioinformatics (IJBB), 8(2), 8.
493
Shiri, S., Anvari, A., & Soltani, H. An Assessment of Readiness Factors for Implementing ERP Based on Agility (Extension of Mckinsey 7s Model).
494
Ghafoor, I., Jattalai, I., Durranit, S., & Ch, M. T. Analysis of OpenSSL Heartbleed Vulnerability for Embedded Systems.
495
Sharvani, C. S. (2014). Development of Swarm Intelligent Systems for MANET: ACO based routing in MANETs for effective communication.
496
Sheta, A. F., Kassaymeh, S., & Rine, D. Estimating the Number of Test Workers Necessary for a Software Testing Process Using Artificial Neural Networks.
497
Rao, P. S., Rao, K. V., Varma, P. S., & Kim, T. H. (2014). Programming Evaluation Process Using Hybrid Cost Estimation Model. International Journal of Software Engineering and Its Applications, 8(10), 55-64.
498
KUMAR, M. S., & RAJAN, B. C. (2014).Experimental evaluation of fuzzy-based function point analysis for software effort estimation. Journal of Theoretical & Applied Information Technology, 67(2).
499
Kumar, G., & Bhatia, P. K. (2014).Automation of software cost estimation using neural network technique. International Journal of Computer Applications, 98(20).
500
Kalinic, z., arsovski, s., arsovski, z., & rankovic, v. The effectiveness and students’ perception of an adaptive mobile learning system based on personalized content and mobile web. Stanislaw juszczyk, 43.
501
Karadimce, a., & davcev, d. (2014, october). Collaborative cloud service model for delivering multimedia content in mcloud. In collaborative computing: networking, applications and worksharing (collaboratecom), 2014 international conference on (pp. 469-474). Ieee.
502
Hashim, Y. E., Osman, A., & El-Gelany, A. (2014). Mobile Technology and Education: Theoretical Study.
503
Chouarfia, M. Y. A. (2014). SCAE: Software Component Assembly Evaluation.
504
Thapar, S. S., Singh, P., & Rani, S. (2014). Reusability-based quality framework for software components. ACM SIGSOFT Software Engineering Notes, 39(2), 1-5.
505
Sampath, S., Nanjesh, B. R., Sagar, B. B., & Subbaraya, C. K. (2014, February). Performance optimization of PVM based parallel applications using optimal number of slaves. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on (pp. 388-392). IEEE.
506
Abebe, H. (2014). Predicting Infant Immunization Status in Ethiopian (Doctoral dissertation, AAU).
507
Ibrahim, M. H. (2014). Realizing Sender’s Deniability in Public Key Encryption via Random Coins Isolation. European Journal of Scientific Research, 119(2), 177-187.
508
Biedermann, S., Ruppenthal, T., & Katzenbeisser, S. (2014, July). Data-centric phishing detection based on transparent virtualization technologies. In Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on (pp. 215-223). IEEE.
509
Emilin, S. C. (2014). Detecting And Preventing Phishing Websites Dppws.
510
Chawla, M., & Chouhan, S. S. (2014). A Survey of Phishing Attack Techniques. International Journal of Computer Applications, 93(3).
511
Zeydan, h. z., & selamat, m. s. (2014).current state of anti-phishing approaches and revealing competencies. journal of theoretical and applied information technology, 70(3).
512
Philip, C., Paulus, R., & Ashok, A. (2014). Comparative Analysis of Adhoc Routing Protocols in Wi-Fi & Wi Max Networks using QualNet 6.1. International Journal of Current Engineering and Technology, 4(1).
513
Sadek, M. M., Khalifa, A. S., & Mostafa, M. G. (2014). Video steganography: a comprehensive review. Multimedia Tools and Applications, 1-32.
514
Kelash, H. M., Wahab, O. F. A., Elshakankiry, O. A., & El-sayed, H. S. (2014). Utilization of Steganographic Techniques in Video Sequences. International Journal of Computing and Network Technology, Sys, 2, 17-24.
515
Othman, J. A. (2014). Steganographic scheme to avoid statistical Steganalysis. J. Of College Of Education For Women, 25(1).
516
Al-Dmour, H., Al-Ani, A., & Nguyen, H. (2014, August). An efficient steganography method for hiding patient confidential information. In Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE (pp. 222-225). IEEE.
517
Agrawal, A., & Borikar, D. A. (2014). An approach to video steganography using novel substitution technique.
518
Kaur, S., Kaur, A., & Singh, K. (2014). A Survey of Image Steganography. IJRECE, 2(3), 102-105.
519
Priyanka, B. G., & Sathyanarayana, S. V. (2014, November). A steganographic system for embedding image and encrypted text. In Contemporary Computing and Informatics (IC3I), 2014 International Conference on (pp. 1351-1355). IEEE.
520
Praneeta, G., & Pradeep, B. (2014, January). Security Analysis of Digital Stegno Images Using Genetic Algorithm. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 277-283). Springer International Publishing.
521
Juneja, M. (2014). High Capacity and Statistical Attacks Resistant Reversible Image Data Hiding Scheme using LSB Substitution. International Journal of Computer Applications, 92(12).
522
Juneja, M. (2014). High Capacity Information Hiding System for Encrypted Text Message Using Pixel Intensity Based LSB Substitution Technique. International Journal of Computer Science Issues (IJCSI), 11(2), 159.
523
aldeen najim Alzubaidy, D. (2014). Paper of Nagham. pdf.
524
Bhalchandra, B. D., Bhatnagar, V., Tomer, R., Singh, R., Saran, S. S., Asadullah, M., ... & Khan, S. Safety and Concealing Information Utilizing Combinatorial Data Hiding Proficiencies.
525
Zahedinia, M. S., & Ahmadi, H. (2014). Color Image Steganography Method based on Difference between Pixel Values in Tri-direction. Majlesi Journal of Multimedia Processing, 3(3).
526
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication.
527
Nashier, N., & Singhrova, A. An Steganography Implementation Based Upon Improved LSB Technique.
528
Agrawal, A., & Borikar, D. A. A Novel Approach to Video Steganography using Secured Multi-Channel Substitution.
529
Shinde, P., Palmal, A., & Singh, R. Digital Image Steganography-Then, Now & Analysis of its Techniques.
530
Ahmed, Z. H. (2014). Comparison of data hiding using LSB and DCT for image (Doctoral dissertation, Universiti Tun Hussein Onn Malaysia).
531
Mehndiratta, A. Publication Procedure Topics.
532
Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., & Okediran, O. O. Performance Assessment of an Enhanced Crystographic Model for Secure E-Voting.
533
Khosla, S., & Kaur, P. Secure Data Hiding Technique Using Video Steganography and Watermarking-A Review.
534
Mostaghim, M., & Boostani, R. (2014, September). CVC: Chaotic visual cryptography to enhance steganography. In Information Security and Cryptology (ISCISC), 2014 11th International ISC Conference on (pp. 44-48). IEEE.
535
Sahu, M. (2014). Review of Image Steganography Techniques in Cloud Security.
536
Ramalingam, M., & Isa, N. A. M. (2014, October). A steganography approach for sequential data encoding and decoding in video images. In Computer, Control, Informatics and Its Applications (IC3INA), 2014 International Conference on (pp. 120-125). IEEE.
537
Senaratne, H., Gunatilaka, P., Gamage, S., Gunarathna, U., & Vithana, Y. Information Hiding with Steganography.
538
Ali, A. A., Abdellateef, B. A., & Seddik, A. H. (2014). Enhancing the Security of SMMWB Image Steganography Technique by using the Linked List structure (Cover Package Method). International Journal of Computer Applications, 90(7).
539
Molaei Kermani, and., Amir Masoud, honest, & Abrahymnzhad. (2014). Blind steganography based on Reed-Solomon codes and the substitution optimized embedded with improved payload and resistance. Journal of Electrical Engineering, University of Tabriz, 43 (2), 43-59.
540
Dhondge, K., Choi, B. Y., Song, S., & Park, H. (2014, August). Optical Wireless authentication for smart devices using an onboard ambient light sensor. In Computer Communication and Networks (ICCCN), 2014 23rd International Conference on (pp. 1-8). IEEE.
541
Xiong, J., Xiong, J., & Claramunt, C. (2014, November). A spatial entropy-based approach to improve mobile risk-based authentication. In Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis (p. 3). ACM.
542
vongsingthong, s., & boonkrong, s. (2014). a survey on smartphone authentication. walailak journal of science and technology (wjst), 12(1), 1-19.
543
Young stars, & Peng Xinguang. (2014) A lightweight one-time password authentication scheme. Small Computer Systems, 35 (008), 1808-1811.
544
Koneru, A. (2014). Knowledge Extraction from Work Instructions through Text Processing and Analysis.
545
Montero, C. (2014). Cost aware real time big data processing in Cloud Environments (Doctoral dissertation, The University of Melbourne).
546
Parsania, V. S., Jani, N. N., & Bhalodiya, N. H. Applying Naïve bayes, BayesNet, PART, JRip and OneR Algorithms on Hypothyroid Database for Comparative Analysis.
547
Babatunde, I. G. Review and Evaluation of Fingerprint Singular Point Detection Algorithms.
548
Iwasokun, G. B., & Akinyokun, O. C. False Minutiae’Impact on Fingerprint Matching.
549
Babatunde, I. G., Lange, M. J., Charles, A. O., & Olumuyiwa, D. J. (2014, August). Experimental study of thumbprint-based authentication framework for ATM machines. In Science and Information Conference (SAI), 2014 (pp. 505-514). IEEE.
550
Bifari, E. N., & Elrefaei, L. (2014, September). Automated Fingerprint Identification System based on weighted feature points matching algorithm. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 2212-2217). IEEE.
551
Akinyokun Oluwole, C., Alese Boniface, K., & Iwasokun Gabriel, B. (2014). Fingerprint Matching Using Spatial Characteristics. In Proceedings of the World Congress on Engineering (Vol. 1).
552
Iwasokun, G. B., Akinyokun, O. C., & Dehinbo, O. J. (2014). Fingerprint Matching Using Features Mapping. In Proceedings of the World Congress on Engineering and Computer Science (Vol. 1).
553
Iwasokun, G. B., & Ojo, S. O. (2014). Review and Evaluation of Fingerprint Singular Point Detection Algorithms. British Journal of Applied Science & Technology, 4(35), 4918.
554
Babatunde, I. G., Charles, A. O., & Olusegun, O. S. (2014). An Investigation into the Impact of False Minutiae Points on Fingerprint Matching. International Journal of Database Theory and Application, 7(3), 159-178.
555
Iwasokun, G. B., Akinyokun, O. C., & Angaye, C. O. (2014). Spatial Relation Approach to Fingerprint Matching. In Intelligent Systems for Science and Information (pp. 87-110). Springer International Publishing.
556
Yadav, V., & Aggarwaal, P. (2014). A Survey on Security in Cloud Computing.
557
Owusu, E., Zhan, Y., & Mao, Q. R. (2014). A neural-AdaBoost based facial expression recognition system. Expert Systems with Applications, 41(7), 3383-3390.
558
Sun, W., Halevy, A., Benedetto, J. J., Czaja, W., Li, W., Liu, C., ... & Wang, R. (2014). Nonlinear dimensionality reduction via the ENH-LTSA method for hyperspectral image classification. Selected Topics in Applied Earth Observations and Remote Sensing, IEEE Journal of, 7(2), 375-388.
559
Sun, W., Halevy, A., Benedetto, J. J., Czaja, W., Liu, C., Wu, H., ... & Li, W. (2014). UL-Isomap based nonlinear dimensionality reduction for hyperspectral imagery classification. ISPRS Journal of Photogrammetry and Remote Sensing, 89, 25-36.
560
Owusu, E., Zhan, Y. Z., & Mao, Q. R. (2014). An SVM–AdaBoost-based face detection system. Journal of Experimental & Theoretical Artificial Intelligence, 26(4), 477-491.
561
Kishore, B., Rana, V. L., Manikantan, K., & Ramachandran, S. (2014, December). Face recognition using Gabor-Feature-based DFT shifting. In Industrial and Information Systems (ICIIS), 2014 9th International Conference on (pp. 1-8). IEEE.
562
Biswas, A., Ghose, M. K., & Pandit, M. (2014). Comparison of Different Neural Network Architectures for Classification of Feature Transformed Data for Face Recognition. International Journal of Computer Applications, 96(12).
563
Makinde, A. S., Nkansah-Gyekye, Y., & Laizer, L. S. (2014). Enhancing the Accuracy of Biometric Feature Extraction Fusion Using Gabor Filter and Mahalanobis Distance Algorithm. arXiv preprint arXiv:1407.6748.
564
Biswal, M. S. (2014). Feature Extraction of Face Using Various Techniques (Doctoral dissertation, National Institute of Technology Rourkela).
565
Gupta, B. Performance Comparison of Various Face Detection Techniques.
566
Awati, J. S. (2014). Application of wireless sensor networks for agricultural parameter control.
567
Sahu, R. A., & Saraswat, V. (2014). Secure and Efficient Scheme for Delegation of Signing Rights. In Information and Communications Security (pp. 258-273). Springer International Publishing.
568
Demarinis, F., Accettura, A., Garzia, F., & Cusani, R. (2014, October). Automatic security system for recognizing unexpected motions through video surveillance. In Security Technology (ICCST), 2014 International Carnahan Conference on (pp. 1-5). IEEE.
569
Nayak, C., & Pradhan, S. Adaptive Filtering for Linear System Identification by Different Variants of LMS.
570
Eke, H. N., & Odoh, N. J. (2014). The Use of Social Networking Sites among the Undergraduate Students of University of Nigeria, Nsukka. Library Philosophy and Practice, 0_1.
571
Zhang, Y., & Rau, P. L. P. (2014). User Adoption and Loyalty of Location Based Social Network Service in China. In Cross-Cultural Design (pp. 392-402). Springer International Publishing.
572
Eke Miss, H. N., Obiora, C., & Odoh Miss, J. N. (2014). The Use of Social Networking Sites among the Undergraduate Students of University of Nigeria, Nsukka.
573
TIJJANI, H. (2014). adoption of improved pearl millet production practices by farmers in borno state, nigeria (Doctoral dissertation, USMANU DANFODIYO UNIVERSITY, SOKOTO).
574
yatigammana, m., johar, d. m. g. m., & gunawardhana, c. Impact of Innovations Attributes on e-learning Acceptance among Sri Lankan Postgraduate Students.
575
Yatigammana, K., Johar, M. G. M., & Gunawardhana, C. (2014). comparison of e-learning acceptance among postgraduate students in sri lanka and malaysia. Journal of South Asian Studies, 2(2), 165-176.
576
Madahi, A., & Sukati, I. (2014). Examining online and brick and mortar store channels switching behaviour among Malaysian consumers. International Journal of Electronic Marketing and Retailing, 6(2), 128-163.
577
Abdelrehim, S. H. M. O. (2014). The diffusion of edublogs among educators in Egypt.
578
Aligol, M., & Mohammadbeigi, A. (2014). Doctors tend to investigate the private sector to contribute to the family physician. Journal of Qom, 8 (1).
579
Mahajan, N., Bedi, R., & Gupta, S. K. A Survey on Detection of Byzantine and Resource Consumption Attacks.
580
Khan, A., Shrivastava, S., & Richariya, V. (2014, January). Normalized Worm-hole Local Intrusion Detection Algorithm (NWLIDA). In Computer Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-6). IEEE.
581
Bayeva, Z. Detection and Containment the Attack that Leads to a Denial of Service Attack.
582
Masdari, M., & Bakhtiari, F. C. (2014). Alert Management System using K-means Based Genetic for IDS. International Journal of Security and Its Applications, 8(5), 109-118.
583
Kumar, R., Verma, P., & Singh, Y. (2014). Review of MANET Protocols and Introduction of a New Optimized Routing Scheme using Evolutionary Algorithms and Analytical Hierarchy Process. Wireless Communication, 6(4), 161-171.
584
Sodagudi, S., & Rao, D. K. R. (2014). Behavior based Anomaly detection technique to identify Multilayer attacks. International Journal, 2(5).
585
Padma, T., & Pillai, J. S. (2014). Image Watermarking using PQ Sequences.
586
Gholami, S., & Bashirzadeh, R. (2014). A new effective algorithm for on-line robot motion planning. Decision Science Letters, 3(1), 121-130.
587
Padma, T., & Pillai, J. S. (2014). Image Watermarking using PQ Sequences.
588
Belaidi, H., Bentarzi, H., Belaidi, A., & Hentout, A. (2014). Terrain Traversability and Optimal Path Planning in 3D Uneven Environment for an Autonomous Mobile Robot. Arabian Journal for Science and Engineering, 39(11), 8371-8381.
589
Jothi, M. S., & Chandrasekaran, M. Fuzzy Based Optimal Clustering Protocol for Maximizing Lifetime in WSN.
590
Zhaoliu Rong, Shu Mei E, & Zhong Weijun. (2014). Virtual private networks, and intrusion detection systems analyze the optimal allocation of Game Strategies Management Engineering, (4), 187-192.
591
Behdad, M. (2014). Application of Learning Classifier Systems to Fraud Detection Problem (Doctoral dissertation, University of Western Australia).
592
Emilin, S. C. (2014). Detecting And Preventing Phishing Websites Dppws.
593
Varughese, N. M. (2014). collaborative network security management system based on association mining rule. ictact journal on soft computing, 4(4).
594
Singh, G., Kumar, N., & Verma, A. K. (2014). Antalg: An innovative aco based routing algorithm for manets. Journal of Network and Computer Applications, 45, 151-167.
595
Musau, F., Wang, G., & Abdullahi, M. B. (2014). Group formation with neighbor similarity trust in P2P E-commerce. Peer-to-Peer Networking and Applications, 7(4), 295-310.
596
Fouchal, H., Hunel, P., & Ramassamy, C. (2014). Towards efficient deployment of wireless sensor networks. Security and Communication Networks.
597
Mohsin, R., & Woods, J. (2014, September). Performance evaluation of MANET routing protocols in a maritime environment. In Computer Science and Electronic Engineering Conference (CEEC), 2014 6th (pp. 1-5). IEEE.
598
Shegokar, M. S., & Tuteja, M. R. Performance Evaluation of AODV and DSR Routing Protocols for Random Speed Mobility and Intensity Model in MANET Using NS2.
599
Natarajan, E., & Devi, L. (2014). Cross Layer Based Energy Aware Routing and Congestion Control Algorithm in MANET.
600
Ratnaparkhi, V., Patidar, P., & Rawat, M. K. (2014). Implementation of Hybrid Algorithm for Mobility and Routing Issues in MANET. International Journal of Computer Applications, 98(4).
601
Harpal, S. K., & Singh, G. Comparative Performance of MANET Routing Protocols at varying Speed in Different Traffic Patterns.
602
Kaur, A. K. A., & Kaur, A. Improving Node Stability Using Hotspot Algorithm in Mobile Ad-hoc Network.
603
Dhaliwal, B. S., & Malhotra, R. Comparative Appraise and Future Perspectives of Reactive and Proactive Routing Protocols in Manets.
604
Borade, J. L., Mishra, B. K., & Bansode, R. Performance Analysis of LLECLAIR versus AODV in wireless networks.
605
Malathy, E. M., & Muthuswamy, V. (2014, December). Vertical handover performance investigation with discrete event system simulation in next generation wireless network. In Advanced Computing (ICoAC), 2014 Sixth International Conference on (pp. 220-223). IEEE.
606
Arasomwan, A. M., & Adewumi, A. O. (2014). An investigation into the performance of particle swarm optimization with various chaotic maps. Mathematical Problems in Engineering, 2014.
607
Arya, M., Deep, K., & Bansal, J. C. (2014). A nature inspired adaptive inertia weight in particle swarm optimisation. International Journal of Artificial Intelligence and Soft Computing 13, 4(2-3), 228-248.
608
Alrabady, L. A. Y. (2014). An online-integrated condition monitoring and prognostics framework for rotating equipment.
609
Adewumi, A. O., & Arasomwan, A. M. (2014). An improved particle swarm optimiser based on swarm success rate for global optimisation problems. Journal of Experimental & Theoretical Artificial Intelligence, (ahead-of-print), 1-43.
610
Gu, J., & Shi, X. (2014, July). An adaptive PSO based on motivation mechanism and acceleration restraint operator. In Evolutionary Computation (CEC), 2014 IEEE Congress on (pp. 1328-1336). IEEE.
611
Mandil, P., & Mishra, A. MINIMIZATION OF THD IN CASCADE MULTILEVEL INVERTER USING WEIGHT IMPROVED PARTICLE SWARM OPTIMIZATION ALGORITHM.
612
Chen, R. M., & Huang, H. T. (2014, August). Particle Swarm Optimization Enhancement by Applying Global Ratio Based Communication Topology. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on (pp. 443-446). IEEE.
613
Lopez , C. E. M. ( 2014 ) . Search parameters particle swarm optimization solver for constraint satisfaction problems.
614
Babu, K. R., & Sunitha, K. V. N. (2014). An effective hybrid technique for image enhancement through Genetic Algorithm-morphological operations. International Journal of Signal and Imaging Systems Engineering, 7(2), 83-91.
615
Raut, S. D., & Humbe, V. T. (2014). An Approach to Boundary Extraction of Palm Lines and Vein Pattern. International Journal of Image, Graphics and Signal Processing (IJIGSP), 6(12), 47.
616
Babatunde, I. G., Charles, A. O., & Olusegun, O. S. (2014). An Investigation into the Impact of False Minutiae Points on Fingerprint Matching. International Journal of Database Theory and Application, 7(3), 159-178.
617
Babatunde, I. G. Review and Evaluation of Fingerprint Singular Point Detection Algorithms.
618
Karthikeyini, C., Rajamani, V., & Bommanna Raja, K. (2014). Exploring fingerprints using composite minutiae descriptors to determine hereditary relation across multiple generations. International Journal of Biomedical Engineering and Technology, 15(3), 224-242.
619
Chin, R. K. Y., & Lim, J. F. (2014). Fingerprint Recognition Using a Hybrid of Minutiae-and Image-Based Matching Techniques. International Journal of Simulation--Systems, Science & Technology, 15(2).
620
Iwasokun, G. B., & Akinyokun, O. C. False Minutiae’Impact on Fingerprint Matching.
621
Iwasokun, G. B., & Ojo, S. O. (2014). Review and Evaluation of Fingerprint Singular Point Detection Algorithms. British Journal of Applied Science & Technology, 4(35), 4918.
622
Saleh, A. M. A. M. (2014). Enhanced Secure Algorithm for Fingerprint Recognition. arXiv preprint arXiv:1402.4936.
623
Kalia, A., & Sood, S. characterization of reusable software components for better reuse.
624
Al-Khazraji, S. H. A. A. Effect of Creating Dll Libraries in Software Reusable Components.
625
Al-tarawneh, f. h. a framework for cots software evaluation and selection for cots mismatches handling and non-functional requirements.
626
Reddy, J. M., & Prasad, S. V. A. V. Quality Focus of Software Layered Technology using Analytic Hierarchy Process: A Case Study.
627
Kalia, A., & Sood, S. Component Based Software Reusability and Framing Standards for Components to be Reused.
628
Elkamchouchi, H. M., & Hassan, M. (2014). Array pattern synthesis approach using a genetic algorithm. Microwaves, Antennas & Propagation, IET, 8(14), 1236-1240.
629
Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4).
630
Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4).
631
Rocabado, S. (2014). Caso de estudio de comunicaciones seguras sobre redes móviles ad hoc (Doctoral dissertation, Facultad de Informática).
632
Pattnaik, O., & Pattanayak, B. K. (2014). Security in vehicular ad hoc network based on intrusion detection system. American Journal of Applied Sciences, 11(2), 337.
633
Ponsam, J. G., & Srinivasan, R. (2014). Multilayer intrusion detection in MANET. International Journal of Computer Applications, 98(20).
634
Vimal, S. (2014). An energy efficient intrusion detection system in MANET for secure routing and clustering (Doctoral dissertation).
635
Saraireh, S., Al-Sbou, Y., & Alsmadi, O. (2014). Image Encryption Scheme Based on Filter Bank and Lifting. Int'l J. of Communications, Network and System Sciences, 2014.
636
Gowraj, N., Avireddy, S., & Prabhu, S. SDI-ON: Secure Digital Images over the Network.
637
Osho, O., Zubair, Y. O., Ojeniyi, J. A., & Osho, L. O. a simple encryption and decryption system.
638
Singh, V., Dhiman, H., & Khatkar, M. (2014). a comprehensive study of time complexity of various encryption algorithms. international journal of advances in engineering & technology, 7(2), 495.
639
Ashik, M. H. M., & Vydehi, M. S. Secure Symmetric Key Algorithm [SSKA] For Information Exchange Using Modulo.
640
Mushtaque, M. A., & Singh, M. K. Feasibility Evaluation of Symmetric Key Encryption Techniques for Wireless Channel and Disk Storage. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2.
641
Singh, S., Kumar, A., Shaw, D. K., & Ghosh, D. (2014, February). Script separation in machine printed bilingual (Devnagari and Gurumukhi) documents using morphological approach. In Communications (NCC), 2014 Twentieth National Conference on (pp. 1-5). IEEE.
642
Aparna, R. R., & Radha, R. (2014). Script Identification In Trilingual Indian Documents. International Journal of Image Processing (IJIP), 8(4), 178.
643
ISA, N. A. N. B. M. (2014). language use on twitter among malaysian l2 speakers (doctoral dissertation, university of malaya kuala lumpur).
644
Butt, A. J., Butt, N. A., Butt, R. G., & Ikram, M. T. (2014, January). Predicting Mobile Subscriber’s Behaviour from Contextual Information Extraction: SMS Data. In Neural Information Processing (pp. 661-672). Springer International Publishing.
645
Sasitharan, D. (2014). An empirical investigation of smartphone technology acceptance among Universiti Utara Malaysia students (Doctoral dissertation, Universiti Utara Malaysia).
646
Nicol, E., Dunlop, M., Komninos, A., McGee-Lennon, M., Baillie, L., Edwards, A., ... & Mulder, I. (2014, September). Re-imagining commonly used mobile interfaces for older adults. In Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services (pp. 585-588). ACM.
647
Gilad Gressel, H. P., Surendran, K., Thara, S., & Aravind, A. Ensemble Learning Approach for Author Profiling.
648
Arunkumar, R., & Annalakshmi, A. (2014). A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET. International Journal of Computer Applications, 85(8).
649
VinothKumar, K., & Rajaram, A. (2014). An Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks. IJCSNS, 14(12), 66.
650
Cangea, O. (2014). Cryptographic Protocol for Wireless Networks Security. Petroleum-Gas University of Ploiesti Bulletin, Technical Series, 66(2).
651
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for Manets. Middle-East Journal of Scientific Research, 22(1), 91-98.
652
Deka, S., & Khaturia, M. Performance Analysis of DYMO Routing Protocol under Wormhole Attack in MANET.
653
Pandian, A., & Sadiq, M. A. K. (2014). Authorship categorization in email investigations using fisher's linear discriminant method with radial basis function. Journal of Computer Science, 10(6), 1003.
654
Qi, J. P., Zhang, Q., Zhu, Y., & Qi, J. (2014). A Novel Method for Fast Change-Point Detection on Simulated Time Series and Electrocardiogram Data. PloS one, 9(4), e93365.
655
Jamil, N., Ramli, M. I., Abu Bakar, Z., & Seman, N. (2014, January). Prosody-based sentence boundary detection of spontaneous speech. In Intelligent Systems, Modelling and Simulation (ISMS), 2014 5th International Conference on (pp. 311-317). IEEE.
656
Qi, J. P., Zhang, Q., Qi, J., & Zhu, Y. (2014). A Fast Method for Abrupt Change Detection from Large-Scale Electrocardiogram (ECG) Time Series. In Service Science and Knowledge Innovation (pp. 420-429). Springer Berlin Heidelberg.
657
Jin-peng, Q., Qing, Z., Fang, P., & Jie, Q. (2014, July). A fast method for change point detection from large-scale time series based on Haar Wavelet and Binary Search Tree (HWBST). In Control Conference (CCC), 2014 33rd Chinese (pp. 506-511). IEEE.
658
Han, G., Qian, A., Zhang, C., Wang, Y., & Rodrigues, J. J. (2014). Localization algorithms in large-scale underwater acoustic sensor networks: a quantitative comparison. International Journal of Distributed Sensor Networks, 2014.
659
Ramezani, H., Fazel, F., Stojanovic, M., & Leus, G. (2014). Collision Tolerant Packet Scheduling for Underwater Acoustic Localization. arXiv preprint arXiv:1404.3881.
660
Kulhandjian, H., & Melodia, T. (2014, September). A low-cost distributed networked localization and time synchronization framework for underwater acoustic testbeds. In Underwater Communications and Networking (UComms), 2014 (pp. 1-5). IEEE.
661
Rao, P. M., & Raju, G. S. N. (2014). International Journal of Advanced Research in Computer Science and Software Engineering. International Journal, 4(12).
662
Swain, G. (2014). Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science and Technology, 7(9), 1444-1450.
663
Kachare, H., & Deshmukh, M. Metamorphic Cryptography: A Fusion of Cryptography and Steganography. International Journal of Engineering and Technical Research (IJETR), 2.
664
Venkatesh, K., Shah, S. S. M., Narasimhan, D., Krishnan, R. B., & Raajan, N. R. (2014). A Crypto-Stego Based Approach for Secured Key Transfer. International Journal of Applied Engineering Research, 9(19), 5679-5687.
665
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication.
666
Wai, Z., & Than, S. Data Hiding Technique Depended on Pseudorandom Sequences.
667
Leng, H. S. (2014) information hidden research - using perfect square , mixing with minimal distortion and edge detection function modulus of Information Management Thesis Chaoyang University of Technology , 1-64.
668
Aldasouqi, I., & Salameh, W. A. (2014). Using GIS in Designing and Deploying Wireless Network in City Plans.
669
Bikov, D., Bouyuklieva, S., & Stojanova, A. (2014). Wireless network security and cracking security key.
670
Farjamfar, A., Abdullah, M. T., Mahmod, R., & Udzir, N. I. (2014). A review on mobile device's digital forensic process models. Res. J. Applied Sci. Eng. Technol, 8, 358-366.
671
Agbele, K. K. (2014). Context-awareness for adaptive information retrieval systems (Doctoral dissertation, University of the Western Cape).
672
Molaei Kermani , a. , Amir Masoud , mahr , & Abrahymnzhad . (2014 ) . Blind steganography based on Reed-Solomon codes and tables substituted with improved payload optimized embedded and resistance. Journal of Electrical Engineering , University of Tabriz , 43 ( 2 ) , 43-59.
673
Finsterbusch, M., Richter, C., Rocha, E., Muller, J. A., & Hanssgen, K. (2014). A survey of payload-based traffic classification approaches. Communications Surveys & Tutorials, IEEE, 16(2), 1135-1156.
674
Ghaffari, M., & Ghadiri, N. (2014). Ambiguity-Driven Fuzzy C-Means Clustering: How to Detect Uncertain Clustered Records. arXiv preprint arXiv:1409.2821.
675
Suryaputra, A., Samopa, F., & Hindayanto, B. C. (2014). klasterisasi dan analisis trafik internet menggunakan fuzzy c mean dengan ekstraksi fitur data. jurnal informatika, 12(1), 33-39.
676
Paramita, A. S., Samopa, F., & Hindayanto, B. C. (2014). Klasterisasi dan Analisis Trafik Internet Menggunakan Fuzzy C Mean Dengan Ekstraksi Fitur Data.
677
Babu, K. R., & Sunitha, K. V. N. (2014). An effective hybrid technique for image enhancement through Genetic Algorithm-morphological operations. International Journal of Signal and Imaging Systems Engineering, 7(2), 83-91.
678
Barai, A. K. Performance Based Association Rule-Mining Technique Using Genetic Algorithm. algorithms, 1, 2.
679
Asha, T., Natarajan, S., & Murthy, K. N. B. (2014). optimization of association rules for tuberculosis using genetic algorithm. international journal of computing, 12(2), 151-159.
680
Abubacker, N. F., Azman, A., Doraisamy, S., Murad, M. A. A., Elmanna, M. E. M., & Saravanan, R. (2014). Correlation-Based Feature Selection for Association Rule Mining in Semantic Annotation of Mammographic Medical Images. In Information Retrieval Technology (pp. 482-493). Springer International Publishing.
681
Zhao, D. (2014). International Journal of" Computing" Research Institute of Intelligent Computer Systems Ternopil National Economic University. Computing, 13(2).
682
Soundararajan, S. (2014). Multipath congestion control schemes for mobile ad hoc networks.
683
Joardar, S., Giri, D., & Bhattacherjee, V. (2014). Probabilistic Approach-Based Congestion-Aware Swarm-Inspired Load-Balancing Multipath Data Routing in MANETs. In Intelligent Computing, Networking, and Informatics (pp. 409-421). Springer India.
684
Knappstein-Hamelink, S. (2014). Network Discovery in a Recursive Internet Network Architecture (Doctoral dissertation, TU Delft, Delft University of Technology).
685
Singh, G. (2014). Design and Development of ACO Routing Protocol for MANETs (Doctoral dissertation, THAPAR UNIVERSITY, PATIALA).
686
Archana, S., & Saravanan, N. P. (2014, April). Biologically inspired QoS aware routing protocol to optimize lifetime in Sensor Networks. In Recent Trends in Information Technology (ICRTIT), 2014 International Conference on (pp. 1-6). IEEE.
687
Singh, G., Kumar, N., & Verma, A. K. (2014). ANTALG: An Innovative ACO based Routing Algorithm for MANETs. Journal of Network and Computer Applications, 45, 151-167.
688
Shial, R. K., Reddy, K. H. K., & Gouda, B. S. (2014, January). Finding a Trusted and Shortest Path Mechanism of Routing Protocol for Mobile Ad Hoc Network. In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol I (pp. 311-320). Springer International Publishing.
689
Tan, S., Sok, P., & Kim, K. (2014). Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET. International Journal of Networked and Distributed Computing, 2(2), 100-107.
690
Gupta, A., & Gupta, A. K. (2014). A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks. Global Journal of Computer Science and Technology, 14(1-E), 23.
691
Hatzivasilis, G., Papaefstathiou, I., & Manifavas, C. (2014, November). ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks. In Computer Systems and Applications (AICCSA), 2014 IEEE/ACS 11th International Conference on (pp. 56-63). IEEE.
692
Pradeep, P. V., & Harika, C. (2014). Detecting Adversary Location in Mobile Sensor Networks. International Journal of Research, 1(11), 1011-1022.
693
Sharma, R., & Singla, B. An Introduction to MANETS.
694
Sharma, R., & Singla, B. Comparison of AOMDV With and Without Black Hole Attack.
695
BAKILER, H. IMPROVEMENT OF PERFORMANCE AND CAPACITIES OF WIRELESS AD HOC NETWORKS.
696
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for MANETs. Journal of Convergence Information Technology, 9(6), 210.
697
Enshaei, M., Hanapi, Z. M., & Othman, M. (2014). A review: Mobile Ad Hoc Networks challenges, attacks, security, vulnerability and routing protocols. International Journal on Communications Antenna and Propagation (IRECAP), 4(5), 168-179.
698
Hassan, A., Ahsan, S., Alshomrani, S., & Alshamrani, A. (2014). Packet Travel Time based Mechanism for Detection and Mitigation against Wormhole Attack in AODV for MANETs. Life Science Journal, 11(10s).
699
Hassan, A., & Radenkovic, M. (2014, August). Simulation of security attacks and preventions on AODV protocol in ns-3. In Innovative Computing Technology (INTECH), 2014 Fourth International Conference on (pp. 158-163). IEEE.
700
Barkouzos, T. (2014). Security in Ad Hoc networks.
701
Enshaei, M., Hanapi, Z. M., & Othman, M. (2014). Vulnerability and Routing Protocols.
702
Aggarwal, A., Gandhi, S., Chaubey, N., Tada, N., & Trivedi, S. (2014). NDTAODV: Neighbor Defense Technique for Ad Hoc On-Demand Distance Vector (AODV) to mitigate flood attack in MANETS. arXiv preprint arXiv:1405.6216.
703
Aligol, M., & Mohammadbeigi, A. (2014). Studying the tendency of the private sector to participate in family medicine doctors . Journal of Qom University of Medical Sciences , 8 ( 1 ).
704
Abuadlla, Y., Kvascev, G., Gajin, S., & Jovanovic, Z. (2014). Flow-based anomaly intrusion detection system using two neural network stages. Computer Science and Information Systems, 11(2), 601-622.
705
Choi, Y. B., Sershon, C., Briggs, J., & Clukey, C. Survey of Layered Defense, Defense in Depth and Testing of Network Security.
706
ONUwA, O. B. (2014). Improving Network Attack Alarm System: A Proposed Hybrid Intrusion Detection System Model.
707
Hameed, S. M., & Rashid, O. F. Intrusion Detection Approach Based on DNA Signature.
708
Mgabile, T. (2014). Network intrusion detection system using neural networks approach in networked biometrics system (Doctoral dissertation).
709
Chan, G. Y., Lee, C. S., & Heng, S. H. (2014). Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules. Applied Soft Computing, 24, 142-157.
710
Kachurka, P., & Golovko, V. (2014). fusion of recirculation neural networks for real-time network intrusion detection and recognition. international Journal of Computing, 11(4), 383-390.
711
Sethuramalingam, S., & Naganathan, E. R. A Fuzzy Model for Network Intrusion Detection.
712
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for MANETs. Journal of Convergence Information Technology, 9(6), 210.
713
Sekulski, R., & Woda, M. (2014). Adaptive method of users authentication and authorisation. In Proceedings of the 2nd Asia-Pacific Conference on Computer-Aided System Engineering, APCASE (pp. 10-12).
714
van Eekelen, W., van den Elst, J., & Khan, V. J. (2014). Dynamic layering graphical elements for graphical password schemes. Creating the Difference, 65.
715
Shrivastava, A., & Rizvi, M. A. (2014). Network Security Analysis Based on Authentication Techniques.
716
Vasile, M. A., Pop, F., Tutueanu, R. I., Cristea, V., & Kolodziej, J. (2014). Resource-aware hybrid scheduling algorithm in heterogeneous distributed computing. Future Generation Computer Systems.
717
Singh, S., & Kalra, M. (2014, November). Scheduling of Independent Tasks in Cloud Computing Using Modified Genetic Algorithm. In Computational Intelligence and Communication Networks (CICN), 2014 International Conference on (pp. 565-569). IEEE.
718
Sharma, A., Singh, N., Hans, A., & Kumar, K. (2014, November). Review of task scheduling algorithms using genetic approach. In Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of (pp. 169-172). IEEE.
719
Kara, N., Soualhia, M., Belqasmi, F., Azar, C., & Glitho, R. (2014). Genetic-based algorithms for resource management in virtualized IVR applications. Journal of Cloud Computing, 3(1), 1-18.
720
YUSUF, A. B. (2014). application of genetic algorithm in modeling university admission decision support system (doctoral dissertation).
721
Patel, P. S. (2014). Multi-Objective Job Scheduler using Genetic Algorithm in Grid Computing. International Journal of Computer Applications, 92(14).
722
Kang, Y., Zhang, Y., Lin, Y., & Lu, H. (2014). An Improved Ant Colony System for Task Scheduling Problem in Heterogeneous Distributed System. In Computer Engineering and Networking (pp. 83-90). Springer International Publishing.
723
Pan Yang, Qiu Jianlin, Yang Na, Biancai Feng, & Lu Pengcheng. (2014). Multiprocessor task scheduling algorithm based on tabu search. Computer Engineering and Design, 35 (12), 4186-4190.
724
Kadhim, A. I., Cheah, Y. N., & Ahamed, N. H. (2014, December). Text Document Preprocessing and Dimension Reduction Techniques for Text Document Clustering. In Artificial Intelligence with Applications in Engineering and Technology (ICAIET), 2014 4th International Conference on (pp. 69-73). IEEE.
725
Goel, S., Kumar, P., & Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator.
726
Angaitkar, A. V., Shekokar, N., & Maurya, M. The Countering the XDoS Attack for Securing the Web Services.
727
Wu Xindong, Li Yadong, & Hu Donghui. (2014). Evidence of the social network. Journal of Software, 25 (12).
728
Rahman, A. F. A., Mohamad, M. Z., Ahmad, R., & Malaysia, C. (2014). Preventive and Detective Mechanism for Forensic Readiness Secure Network Architecture for WBAN.
729
Rahim, N., Wahab, W. A., Idris, Y. I., & Kiah, L. M. Digital Forensics: An Overview of the Current Trends.
730
Liu, Y., Li, C., & Liu, W. (2014). Integrated solution for timely delivery of customer change requests: A case study of using devops approach. International Journal of U-and E-Service Science and Technology, 7(2), 41-50.
731
Kamalzaman, S. N. A., Mohamad, S. M. S., & Sulaiman, S. (2014). Managing Modification Requests in Web Applications: A Systematic Literature Review. International Journal of Software Engineering and Technology, 1(1).
732
Mellado, D., Mouratidis, H., & Fernández-Medina, E. (2014). Secure Tropos framework for software product lines requirements engineering. Computer Standards & Interfaces, 36(4), 711-722.
733
Keerthi, T. (2014). Distilling Mobile Privacy Requirements from Qualitative Data (Doctoral dissertation, The Open University).
734
Tamrakar, S., & Aloney, M. R. (2013). Role of Artificial Neural Networks in Digital Image Processing: A review. Journal of Environmental Science, 2(3), 908-913.
735
Sardar, M., & Majumder, K. (2013). A Comparative Study on Different Trust Based Routing Schemes in MANET. International Journal of Wireless & Mobile Networks, 5(5), 145.
736
Abel, K. (2013).benefits of shifting freight delivery to night time, considering routing and environmental effects for addis ababa city (Doctoral dissertation, aau).
737
Fasola, J., & Mataric, M. (2013). A socially assistive robot exercise coach for the elderly. Journal of Human-Robot Interaction, 2(2), 3-32.
738
Kalaivani, R., & Thangaraj, P. (2013). An effective technique to identify a river’s stage through satellite images by means of RBFNN. The Imaging Science Journal, 61(3), 279-291.
739
Sun, D., Deng, H., Wang, F., Ji, K., Dai, W., Liang, B., & Wei, S. (2013, November). The Feature Related Techniques in Content-Based Image Retrieval and Their Application in Solar Image Data. In Intelligent Networks and Intelligent Systems (ICINIS), 2013 6th International Conference on (pp. 336-339). IEEE.
740
Khandelwal, V., & Goyal, D. (2013). BlackHole Attack and Detection Method for AODV Routing Protocol in MANETs. IJARCET, 2(4), 1555-9.
741
Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of Impact of Wormhole Attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652.
742
Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of Impact of Wormhole Attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652.
743
Karthikeyan, P., Baskar, S., & Alphones, A. (2013). Improved genetic algorithm using different genetic operator combinations (GOCs) for multicast routing in ad hoc networks. Soft Computing, 17(9), 1563-1572.
744
Saehana, S., Iskandar, F., & Abdullah, M. (2013). Optimization of electrospinning parameter by employing genetic algorithm in order to produce desired nanofiber diameter. World Academy of Science, Engineering and Technology, International Journal of Chemical, Molecular, Nuclear, Materials and Metallurgical Engineering, 7(1), 78-83.
745
Singh, M., Sharma, S., & Kaur, A. (2013). Performance Analysis of Decision Trees. International Journal of Computer Applications, 71(19), 10-14.
746
Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques.
747
Li Nan , & Zhang Xuefu . ( 2013 ) found that knowledge-based Application System related data . Library and Information Service , ( 6 ) , 127-133.
748
Rong, C., Quan, Z., & Chakravorty, A. (2013, December). On Access Control Schemes for Hadoop Data Storage. In Cloud Computing and Big Data (CloudCom-Asia), 2013 International Conference on (pp. 641-645). IEEE.
749
Pandian, A., & Sadiq, A. K. (2013). Authorship Attribution in Tamil Language Email For Forensic Analysis. International Review on Computers and Software (IRECOS), 8(12), 3002-3008.
750
Murtaza, M., Shah, J. H., Azeem, A., Nisar, W., & Masood, M. (2013). Structured Language Requirement Elicitation Using Case Base Reasoning. Research Journal of Applied Sciences, Engineering and Technology, 6, 23.
751
Aziz, A. S., Azar, A. T., Salama, M., Hassanien, A. E., & Hanafy, S. E. O. (2013, September). Genetic algorithm with different feature selection techniques for anomaly detectors generation. In Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on (pp. 769-774). IEEE.
752
Alanazi, H. O., Abdullah, A., & Al Jumah, M. (2013). A critical review for an accurate and dynamic prediction for the outcomes of traumatic brain injury based on Glasgow Outcome Scale. Journal of Medical Sciences, 13(4), 244.
753
Priedniece, K., Nikitenko, A., Liekna, A., & Kulikovskis, G. (2013). Use of Learning Methods to Improve Kinematic Models. Applied Computer Systems, 14(1), 73-79.
754
Günüç, S. (2013). Internet Bagimliligini Yordayan Bazi Degiskenlerin Cart ve Chaid Analizleri ile Incelenmesi. Turk Psikoloji Dergisi, 28(71).
755
Günüç, S. (2013). Internet Bagimliligini Yordayan Bazi Degiskenlerin Cart ve Chaid Analizleri ile Incelenmesi. Türk Psikoloji Dergisi, 28(71), 88.
756
Madhura, G. K., & Shivamurthy, R. C. twitter sentiment analysis for product reviews to gather information using mach ine learning.
757
Anand, R., Khanna, R., Student, N. C., & Israna, P. (2013). International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net. CYBERNETICS: SYSTEMS, 43(4).
758
Zhang, Q. (2013). Aspect-Oriented Product Family Modeling.
759
Mguni, K., & Ayalew, Y. (2013). An Assessment of Maintainability of an Aspect-Oriented System. ISRN Software Engineering, 2013.
760
Ramos de Oliveira, R., Sanchez, V., Vinicius, R., Estrella, J. C., Pontin de Mattos Fortes, R., & Brusamolin, V. (2013, September). Comparative evaluation of the maintainability of RESTful and SOAP-WSDL web services. In Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA), 2013 IEEE 7th International Symposium on the (pp. 40-49
761
Tiwari, G., & Sharma, A. Maintainability Prediction-An Artificial Neural Network Based Approach.
762
Ahmed, S., & Nirkhi, S. M. (2013). Fuzzy Forensic Analysis System for DDoS Attack in MANET Response Analysis. simulation, 639(156), 343.
763
Sulaiman, S., Shamsuddin, S. M., & Abraham, A. (2013). A Survey of Web Caching Architectures or Deployment Schemes. International Journal of Innovative Computing, 3(1).
764
Sirour, H. A. N., Hamad, Y. A. M., & Eisa, A. (2013, August). An agent-based proxy cache cleanup model using fuzzy logic. In Computing, Electrical and Electronics Engineering (ICCEEE), 2013 International Conference on (pp. 486-491). IEEE.
765
ShanmugaSundaram, G., & Aswini, S. Optimizing the Performance in Web Browsers through Data Compression.
766
Alguliev, R. M., Aliguliyev, R. M., & Isazade, N. R. (2013). Mr&Mr-Sum: Maximum Relevance And Minimum Redundancy Document Summarization Model. International Journal of Information Technology & Decision Making, 12(03), 361-393.
767
Black, J. (2013). On the derivation of value from geospatial linked data (Doctoral dissertation, University of Southampton).
768
Tan, M., & Morales-Arroyo, M. (2013). Understanding distributional disruptions in the Interactive Digital Media eco-system. International Journal of Electronic Business, 11(1), 42-62.
769
Wong, R. K. (2013). Feasibility and a case study on content optimization services on cloud. Information Systems Frontiers, 15(4), 525-532.
770
Al-Azawi, R., Ayesh, A., Kenny, I., & Al-Masruri, K. A. (2013). Towards an AOSE: Game development methodology. In Distributed Computing and Artificial Intelligence (pp. 493-501). Springer International Publishing.
771
Pauline, M., Aruna, P., & Shadaksharappa, B. (2013). Layered model to Estimate Effort, Performance and cost of the Software projects. International Journal of Computer Applications, 63(13), 17-23.
772
Rai, D., & Tyagi, K. (2013, July). Estimating the regression test case selection probability using fuzzy rules. In Recent Trends in Information Technology (ICRTIT), 2013 International Conference on (pp. 603-611). IEEE.
773
Elgamel, M. S., Korani, E. A., & El Helow, K. R. Developing a Software Certification for Quality Assurance.
774
Dhule, C. A., & Nagrare, T. H. (2013). Design Of Virtual Sense Technology For System Interface. IJRCCT, 2(12), 1454-1459.
775
Eun, H., Lee, H., & Oh, H. (2013). Conditional privacy preserving security protocol for NFC applications. Consumer Electronics, IEEE Transactions on, 59(1), 153-160.
776
Lin, Y., Hou, M., & Xu, Q. (2013, December). Strongly Password-Based Three-Party Authenticated Key Exchange Protocol. In Computational Intelligence and Security (CIS), 2013 9th International Conference on (pp. 555-558). IEEE.
777
Banu, S. S., & Dhanasekaran, R. (2013). EMRCS: Efficient Multipath Routing based Cryptography Scheme in Wireless Sensor Networks. Wireless Communication, 5(1), 24-31.
778
Singh, P., & Chadha, R. S. (2013). A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology (IJEIT), 2(9), 165-175.
779
Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques.
780
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42.
781
Sahu, M., Pradhan, S. R., & Das, M. (2013). Unicode and Colours Mapping for Cryptography and Steganography using Discrete Wavelet Transform. International Journal of Computer Applications, 70(5), 36-41.
782
Tayel, M., Hafez, A., & Shawky, H. (2013, December). A new hybrid fuzzy-decomposed full capacity Stego-system. In High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 2013 10th International Conference on (pp. 16-20). IEEE.
783
ShivaKumar, K. B., Jayaramu, H. S., & Srinidhi, G. A. (2013, September). A novel data hiding technique. In Research & Technology in the Coming Decades (CRT 2013), National Conference on Challenges in (pp. 1-5). IET.
784
Yajurvedi, A. H., & Kulkarni, S. (2013, January). An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 203-212). Springer India.
785
Saejung, S., Boondee, A., Preechasuk, J., & Chantrapornchai, C. (2013, September). On the comparison of digital image steganography algorithm based on DCT and wavelet. In Computer Science and Engineering Conference (ICSEC), 2013 International (pp. 328-333). IEEE.
786
Fayyaz, N., Imranuddin, R., Anwar, S. U., & Rukh, L. (2013). Steganography Based Authentication to Prevent IP Spoofing. Life Science Journal, 10(12s).
787
Nagaty, K. A. (2013). Secret Sharing using Image Hashing. International Journal of Computer Applications, 73(20), 14-22.
788
Sagheer, A. M., Abdulhameed, A. A., & AbdulJabbar, M. A. (2013, December). SMS Security for Smartphone. In Developments in eSystems Engineering (DeSE), 2013 Sixth International Conference on (pp. 281-285). IEEE.
789
Begum, M. B., & Venkataramani, Y. (2013). A new compression scheme for secure transmission. International Journal of Automation and Computing, 10(6), 578-586.
790
Patil, M., & Sahu, V. (2013). A Survey of Compression and Encryption Techniques for SMS.
791
Ahmed, Z. H. (2013). An exact algorithm for the clustered travelling salesman problem. Opsearch, 50(2), 215-228.
792
Ahmed, Z. H. (2013). A hybrid genetic algorithm for the bottleneck traveling salesman problem. ACM Transactions on Embedded Computing Systems (TECS), 12(1), 9.
793
Ahmed, Z. H. (2013). A new reformulation and an exact algorithm for the quadratic assignment problem. Indian Journal of Science and Technology, 6(4), 4368-4377.
794
Kale, K. V., Deshmukh, P. D., Chavan, S. V., Kazi, M. M., & Rode, Y. S. (2013, October). Zernike moment feature extraction for handwritten Devanagari compound character recognition. In Science and Information Conference (SAI), 2013 (pp. 459-466). IEEE.
795
Dineshkumar, R., & Suganthi, J. (2013). A research survey on sanskrit offline handwritten character recognition. International Journal of Scientific and Research Publications (IJSRP), 3, 13-16.
796
Kazi, M. M., & Rode, Y. S. (2013). Handwritten and Printed Devanagari Compound using Multiclass SVM Classifier with Orthogonal moment Feature.
797
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013, March). Handwritten devnagari consonants recognition using mlpnn with five fold cross validation. In Circuits, Power and Computing Technologies (ICCPCT), 2013 International Conference on (pp. 1222-1226). IEEE.
798
Garg, N. K., Kaur, L., & Jindal, M. (2013). Recognition of Offline Handwritten Hindi Text Using SVM. International Journal of Image Processing (IJIP), 7(4), 395.
799
Thaker, H. R., & Kumbharana, C. K. (2013). Study of Different Off-line Handwritten Character Recognition Algorithms for Various Indian Scripts. International Journal of Computer Applications, 65(16).
800
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013, August). Design and analysis of LRTB feature based classifier applied to handwritten Devnagari characters: A neural network approach. In Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on (pp. 96-101). IEEE.
801
Goyal, M., & Garg, N. K. (2013). Techniques for Recognition of Handwritten Devanagari Numeral. International Journal of Advanced Research in Computer Science, 4(9).
802
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013). Classification of Devnagari Handwritten Characters using Single Hidden Layer Neural Network with Mixed Activation Function.
803
Choudhury, A. (2013). Recognition of Handwritten Bangla Numerals using Template Matching (Doctoral dissertation, jadavpur university kolkata).
804
Arora, S. Studies on some Soft Computing Techniques: A Case Study for Constrained Handwritten Devnagari Characters and Numerals.
805
Shinde, S., & Mane, M. V. LBG Vector Quantization for Recognition of Handwritten Marathi Barakhadi.
806
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. Offline Recognition of Devanagari Handwritten Consonants Using Projection features and mlpnn.
807
Ikram, A., Anjum, A., Hill, R., Antonopoulos, N., Liu, L., & Sotiriadis, S. (2013). Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience.
808
Skracic, K., Pale, P., & Jeren, B. (2013, May). Knowledge based authentication requirements. In Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention on (pp. 1116-1120). IEEE.
809
Kumar, S. B. on-chip address and test pattern generation for image watermarking sram.
810
Uma, M., & Padmavathi, G. (2013). A Survey on Various Cyber Attacks and their Classification. IJ Network Security, 15(5), 390-396.
811
Tanwar, S., & Prema, K. V. (2013). Threats & Security Issues in Ad hoc network: A Survey Report. International Journal of Soft Computing and Engineering, 2(6).
812
Kumar, B. A., Kavuri, K., & Batchanaboyina, M. (2013). A Novel Approach for Preventing Hackers in Data Communication. International Journal of Advanced Studies in Computers, Science and Engineering, 2(2), 1.
813
Grochocki, D. (2013). Deployment considerations for intrusion detection systems in advanced metering infrastructure.
814
Khubalkar, A. S., & Ragha, L. R. (2013, July). Security enabled DSR for establishing symmetric key and security in MANETS. In Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on (pp. 1-5). IEEE.
815
Mandala, S., Abdullah, A. H., Ismail, A. S., Haron, H., Ngadi, M. A., & Coulibaly, Y. (2013, November). A review of blackhole attack in mobile adhoc network. In Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), 2013 3rd International Conference on (pp. 339-344). IEEE.
816
Gupta, N. K., & Garg, A. (2013). Trust and Shortest Path Selection based Routing Protocol for MANET. International Journal of Computer Applications, 76(12).
817
Saxena, N., Kumar, S., & Saxena, V. (2013). Performance Analysis of AODV Routing Protocol under the Different Attacks Through The Use Of OPNET Simulator. International Journal of Innovative Research and Development, 2(12).
818
Shrivastava, S., & Jain, S. (2013). A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network. International Journal of Computer Science & Engineering Technology (IJCSET), 4(3).
819
Singhal, P., & Kumar, R. (2013). Analyzing Misbehavior of Selfish Nodes in Mobile Adhoc Network. International Journal of Computer Applications (0975–8887) Volume.
820
Ahmed, M. N., Abdullah, A. H., & El-Sayed, A. (2013). A survey of MANET survivability routing techniques.
821
Singh, J. P., & Gupta, A. K. (2013). Protocol Stack based Security Vulnerabilities in MANETs. International Journal of Computer Applications (0975–8887), 69(21).
822
Singh, D. (2013). Intrusion Detection System based on Fuzzy C Means Clustering and Probabilistic Neural Network.
823
Singh, A., Khanna, O. S., Singh, S. P., & Singh, J. (2013). Multipath Algorithm For Prevention Of Wormhole Attack In Manet.
824
Shrivastava, A., & Ahirwal, R. R. (2013). A SVM and K-means Clustering based Fast and Efficient Intrusion Detection System. International Journal of Computer Applications, 72(6), 25-29.
825
Callegari, C., Giordano, S., Mannella, S., & Pagano, M. (2013). Design and Implementation of a Testbed for the Security Assessment of MANETs. In Cyberspace Safety and Security (pp. 228-242). Springer International Publishing.
826
Nirmala, G., Thudupathi, E., & Nadu, T. (2013). Risk-Aware Response Mechanism with Extended DS theory. Risk, 2(1), 6-15.
827
Gupta, N. K., & Pandey, K. (2013, August). Trust based Ad-hoc on Demand Routing protocol for MANET. In Contemporary Computing (IC3), 2013 Sixth International Conference on (pp. 225-231). IEEE.
828
ON, S. O. B. H. A. (2013). A STUDY OF DIFFERENT ATTACKS IN MANET AND DISCUSSION ABOUT SOLUTIONS OF BLACK HOLE ATTACK ON AODV PROTOCOL.
829
Chen, P. Y., & Lin, F. Y. S. (2013). Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques. Journal of Applied Mathematics, 2013.
830
Dhiman, D., & Nayyar, A. (2013). Complete Scenario of Routing Protocols, Security Leaks and Attacks in MANETs. International Journal, 3(10).
831
Shukla, R., & Bhandari, R. (2013). A Novel Minimized Computational Time Based Encryption and Authentication Using ECDSA. International Journal of Modern Education and Computer Science (IJMECS), 5(9), 19.
832
Yadav, N. A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks.
833
Elamathi, N. a study of routing attacks in wireless mobile adhoc networks.
834
Barcena-Humanes, J. L., Mata-Moya, D., Jarabo-Amores, M. P., del Rey-Maestre, N., & Martin de Nicolas-Presa, J. (2013, June). Analysis of NNs Detectors for Targets with Unknown Correlation in Gaussian Interference. In Computational Intelligence, Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on (pp. 48-53). IEEE.
835
Zamani, A., Sorbi, M. R., & Safavi, A. A. (2013). Application of neural network and ANFIS model for earthquake occurrence in Iran. Earth Science Informatics, 6(2), 71-85.
836
Kodali, R. K., Patel, K. H., & Sarma, N. N. (2013). Implementation of Energy Efficient Scalar Point Multiplication Techniques for ECC. International Journal on Recent Trends in Engineering & Technology, 9(1), 14.
837
Kodali, R. K., Patel, K. H., & Sarma, N. (2013, February). Energy efficient elliptic curve point multiplication for WSN applications. In Communications (NCC), 2013 National Conference on (pp. 1-5). IEEE.
838
Zele, A. P., & Wadhe, A. P. Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography.
839
Kulkarni, V. (2013). Speaker identification using orthogonal transforms and vector quantization.
840
Kekre, H. B., & Kulkarni, V. (2013, January). Closed set and open set Speaker Identification using amplitude distribution of different Transforms. In Advances in Technology and Engineering (ICATE), 2013 International Conference on (pp. 1-8). IEEE.
841
Siddiqui, S. T., Hamatta, H. S., & Bokhari, M. U. (2013). Multilevel Security Spiral (MSS) Model: NOVEL Approach. International Journal of Computer Applications, 65(20).
842
Pirnau, M. (2013, June). The analysis of the. NET architecture security system. In Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on (pp. 1-6). IEEE.
843
Athawale, A. (2013). Information Hiding in image and audio files.
844
Xu, L., Yeh, Y. R., Lee, Y. J., & Li, J. (2013). A Hierarchical Framework Using Approximated Local Outlier Factor for Efficient Anomaly Detection. Procedia Computer Science, 19, 1174-1181.
845
Sladic, G., Vidakovic, M., & Konjovic, Z. (2013). Network Monitoring Using Intelligent Mobile Agents. In Intelligent Systems: Models and Applications (pp. 301-318). Springer Berlin Heidelberg.
846
Chaoyu, Y. A. N. G., Yerong, H. E., & Minli, S. O. N. G. (2013). Wireless Sensor Network Topology Control Based on Agent. Sensors & Transducers (1726-5479), 160(12).
847
Kotenko, I., & Chechulin, A. (2013, June). A cyber attack modeling and impact assessment framework. In Cyber Conflict (CyCon), 2013 5th International Conference on (pp. 1-24). IEEE.
848
Mazumder, J. A., & Hemachandran, K. (2013). A high capacity and secured color image steganographic technique using discrete wavelet transformation. International Journal of Computer Science and Information Technologies, 4(4), 583-589.
849
Mann, V. K., & Dhaliwal, H. S. (2013). 32* 32 Colour Image Steganography. International Journal of Engineering Trends and Technology (IJETT) Vol, 4.
850
Mazumder, J. A., & Hemachandran, K. (2013). Study of Image steganography using LSB, DFT and DWT. International Journal of Computers & Technology, 11(5), 2618-2627.
851
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42.
852
Atawneh, S., & Sumari, P. (2013). Hybrid and Blind Steganographic Method for Digital Images Based on DWT and Chaotic Map. Journal of Communications, 8(11).
853
Zhou, Y., & Ng, W. W. (2013, July). A study of influence between digital watermarking and steganography. In Wavelet Analysis and Pattern Recognition (ICWAPR), 2013 International Conference on (pp. 49-55). IEEE.
854
Lin, Q., Wang, R., Ye, N., & Wang, Z. (2013). Energy efficient distributed steganography for secure communication in wireless multimedia sensor networks. Journal of Electronics (China), 30(1), 9-16.
855
Kanzariya, N., Nimavat, A., & Patel, H. (2013). Security of Digital Images using Steganography Techniques based on LSB, DCT and Huffman Encoding.
856
Yajurvedi, A. H., & Kulkarni, S. (2013, January). An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 203-212). Springer India.
857
Mondal, A., Sahana, S., & Mahata, S. K. (2013, April). A Pictorial Block Steganography based Secure Algorithm for Data Transfer. In IJCA Special Issue on International Conference on Computing, Communication and Sensor Network (No. 4, pp. 12-15). Foundation of Computer Science (FCS).
858
Dagar, S. (2013). RGB Based Dual Key Image Steganography.
859
Sahana, S., Sen, J., & Mondal, C. Secure Adaptive N-cryption (SAN).
860
Shahana, T. A Secure DCT Image Steganography based on Public-Key Cryptography.
861
Kamble, S. V., & Warvante, B. G. A Review on Novel Image Steganography Techniques.
862
Mann, V. K., Dhaliwal, H. S., & Dhaliwal, H. S. Nav view search.
863
Maan, V. K., & Dhaliwal, H. S. 32× 32 Vector Quantization Based Colour Image Steganography.
864
Chaturvedi, P., & Bairwa, R. K. Image Steganography Method for Hiding Secret Message in Colored Images by Using IWT.
865
Wang, D., Chen, D., & Guo, R. (2013). DDoS mitigation in content distribution networks. International Journal of Wireless and Mobile Computing, 6(5), 508-514.
866
Cartier, G., Cartier, J. F., & Fernandez, J. M. (2013). Next-generation dos at the higher layers: A study of smtp flooding. In Network and System Security (pp. 149-163). Springer Berlin Heidelberg.
867
Bou-Harb, E., Pourzandi, M., Debbabi, M., & Assi, C. (2013). A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. Security and Communication Networks, 6(12), 1478-1489.
868
Bedi, D. S. (2013). Information security in hospitality SMMEs in the Cape Metropole area: policies and measures in the online environment (Doctoral dissertation, Cape Peninsula University of Technology).
869
Aye, N., Khin, H. S., Win, T. T., KoKo, T., Than, M. Z., Hattori, F., & Kuwabara, K. (2013). Multi-domain public key infrastructure for information security with use of a multi-agent system. In Intelligent Information and Database Systems (pp. 365-374). Springer Berlin Heidelberg.
870
Peng, B., & Li, L. (2013). QoS Multicast Routing Algorithm Based on Genetic Algorithm and Ant Colony Optimization. International Information Institute (Tokyo). Information, 16(10), 7717.
871
Chen, H., & Zhou, P. (2013, July). An ant algorithm for solving the four-coloring map problem. In Natural Computation (ICNC), 2013 Ninth International Conference on (pp. 491-495). IEEE.
872
Nakhumwa, J. N. (2013). Adoption of E-commerce Payment Systems by Commercial Banks in Kenya (Doctoral dissertation, University of Nairobi).
873
Kerrigan, M. (2013). A capability maturity model for digital investigations. Digital Investigation, 10(1), 19-33.
874
Saleem, S., Popov, O., & Appiah-Kubi, O. K. (2013). Evaluating and comparing tools for mobile device forensics using quantitative analysis. In Digital Forensics and Cyber Crime (pp. 264-282). Springer Berlin Heidelberg.
875
Fenu, G., & Solinas, F. (2013). computer forensics investigation an approach to evidence in cyperspace. In The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) (pp. 77-88). The Society of Digital Information and Wireless Communication.
876
Neil, A. M., Elmogy, M., & RIAD, A. (2013). A Proposed Framework for Crime Investigation Based On Windows Registry Analysis. Journal of Engineering and Applied Science, Faculty of Engineering, Cairo University, 60(1).
877
Fenu, G., & Solinas, F. (2013). Computer forensics between the italian legislation and pragmatic questions. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2(1), 9-24.
878
Vlachopoulos, K., Magkos, E., & Chrissikopoulos, V. (2013). A model for hybrid evidence investigation. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, 150.
879
Bulbul, H. I., Yavuzcan, H. G., & Ozel, M. (2013). Digital forensics: An Analytical Crime Scene Procedure Model (ACSPM). Forensic science international, 233(1), 244-256.
880
Hewling, M. O. (2013). Digital forensics: an integrated approach for the investigation of cyber/computer related crimes.
881
Krishnan, M., Karthikeyan, T., Chinnusamy, T. R., & Murugesan, A. (2013). Dynamic Scheduling of Flexible Manufacturing System Using Scatter Search Algorithm. International Journal of Emerging Technology and Advanced Engineering, 3(10), 329-341.
882
Ismail, M. A. (2013, April). Multi-core processor based parallel implementation for finding distribution vectors in Markov processes. In Electronics, Communications and Photonics Conference (SIECPC), 2013 Saudi International (pp. 1-5). IEEE.
883
Shahi, G., & Singh, C. (2013). To Secure and Compress the Message on Local Area Network. International Journal of Computer Applications, 69(17), 43-47.
884
Dutta, S., Kumar, C., & Chakraborty, S. (2013). A symmetric key algorithm for cryptography using music. International Journal of Engineering and Technology, 5(3), 3109-3115.
885
Rote, G. D., & Patil, A. M. Steganography with Cryptography Technique For Data Hiding.
886
Das, D., Lanjewar, U. A., & Sharma, S. J. The Art of Cryptology: From Ancient Number System to Strange Number System.
887
Nithyaa, A. N., Premkumar, R., Kanchana, D., & Krishnan, N. A. (2013). Automated Detection and Classification of Blood Diseases. In Recent Advancements in System Modelling Applications (pp. 393-404). Springer India.
888
Suradkar, P. T. (2013). Detection of malarial parasite in blood using image processing. International Journal of Engineering and Innovative Technology (IJEIT), 2(10).
889
Waghmare, V., & Akhter, S. Image Analysis Based System for Automatic Detection of Malarial Parasite in Blood Images.
890
Opoku-Ansah, J., Anderson, B., Eghan, J. M., Boampong, J. N., Adueming, P. O. W., Amuah, C. L. Y., & Akyea, A. G. (2013). Automated Protocol for Counting Malaria Parasites (P. falciparum) from Digital Microscopic Image Based on L* a* b* Colour Model and K-Means Clustering.
891
Elmir, A., Elmir, B., & Bounabat, B. (2013, November). Multi-facet quality assessment of process driven services in collaborative networks. In ISKO-Maghreb, 2013 3rd International Symposium (pp. 1-7). IEEE.
892
Könst, W. J. (2013). Usability of Networked Information.
893
Elmir, A., Elmir, B., & Bounabat, B. (2013). Towards an Assessment-oriented Model for External Information System Quality Characterization. arXiv preprint arXiv:1310.8111.
894
Mahajan, D., & Sachdeva, M. (2013, December). Distinguishing DDoS Attack from Flash Event Using Real-World Datasets with Entropy as an Evaluation Metric. In Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on (pp. 90-94). IEEE.
895
Kaur, S., & Bansal, R. (2013). enhanced technique for secured and reliable watermarking using mfhwt. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(5), pp-1674.
896
Mishra, S., Mahapatra, A., & Mishra, P. (2013). A survey on Digital watermarking techniques. International Journal of Computer Science and Information Technologies, 4(3), 451-456.
897
Shrirao, D. W., & Honole, S. A Survey on Improving Robustness of Image Watermarking By Using Gradient.
898
Hasan, H. R., Sulong, G. B., & Selamat, A. A Novel Blind Color Image Watermarking Technique in Hybrid Domain Using LSB Approach and Discrete Slantlet Transform.
899
Nilizadeh, A. F., & Nilchi, A. R. N. (2013). Steganography on RGB Images Based on a “Matrix Pattern” using Random Blocks. International Journal of Modern Education and Computer Science (IJMECS), 5(4), 8.
900
Mann, V. K., & Dhaliwal, H. S. (2013). 32* 32 Colour Image Steganography. International Journal of Engineering Trends and Technology (IJETT) Vol, 4.
901
Maan, V. K., & Dhaliwal, H. S. 32× 32 Vector Quantization Based Colour Image Steganography.
902
Mohebbi, K., Ibrahim, S., & Idris, N. B. (2013). Prediction of relevance between requests and web services using ANN and LR models. In Intelligent Information and Database Systems (pp. 40-49). Springer Berlin Heidelberg.
903
Shibata, S. I., Sato, F., Kimura, H., & Oyabu, T. A Fluctuation Characteristic of Plant Bioelectric Potential for Evaluating Abnormal Growth in Physiological Disorders.
904
Das, S., Zaman, J. U., & Ghosh, R. (2013). Generation of AES S-boxes with Various Modulus and Additive Constant Polynomials and Testing their Randomization. Procedia Technology, 10, 957-962.
905
Riman, C., & Hallal, H. H. (2013, January). DES Based Educational Encryption System. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
906
Yadav, S., & Lakhani, K. (2013). A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET. International Journal of Distributed and Parallel Systems, 4(2), 17.
907
Sivagurunathan, S., & Prathapchandran, K. (2013). Survey of Cluster-Based Cryptographic Schemes to Secure MANET. In Proceedings of the International Conference on Applied Mathematics and Theoretical Computer Science (p. 243).
908
Oguike, O. E. (2013). Recursive Shortest Route Algorithm Using Abstract Data Type, Graph. African Journal of Computing & ICT, 6(2).
909
Shaikh, E. A., & Dhale, A. AGV Path Planning and Obstacle Avoidance Using Dijkstra’s Algorithm.
910
Ismail, M. N., Aborujilah, A., Musa, S., & Shahzad, A. (2013, January). Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. In Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication (p. 36). ACM.
911
Chawla, I., Kaur, D., & Luthra, P. DDoS Attacks in Cloud and Mitigation Techniques.
912
Shah, N., Chaudhary, L., Rajmane, A., Patil, N., & Khatke, K. (2013). Implementation Of C-Trend For Commercial Application.
913
Sardar, M., & Majumder, K. Asurvey on trust based secure routing in manet.
914
Ganesh, M. S., & Thanushkodi, K. (2013).Fashcep: Fuzzy and Analogy Based Hybrid Software Cost Estimation Process. International Review on Computers and Software (IRECOS), 8(7), 1497-1505.
915
Pauline, M., Aruna, P., & Shadaksharappa, B. Comparison of available Methods to Estimate Effort, Performance and Cost with the Proposed Method.
916
Aljahdali, S., & Sheta, A. (2013).Evolving software effort estimation models using multigene symbolic regression genetic programming. Int. J. Adv. Res. Artif. Intell, 2, 52-57.
917
Haghshenas, m., & jeddi, k. Y. (2013). Using mobile devices to improve learning technologies. Ijitr, 1(6), 519-523.
918
Gómez ardila, s. E. (2013). Learning design implementation in context-aware and adaptive mobile learning.
919
Sun, g. (2013). Teamwork as a service: design of a cloud-based system for enhancing teamwork performance in mobile learning.
920
Mehigan, t. J. (2013). Automatic detection of learner-style for adaptive elearning.
921
Ahmad, A. (2013).A model of distributed rights allocation in online social interaction: a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology at Massey University, Albany, Auckland, New Zealand (Doctoral dissertation).
922
Zheng, Y., Huang, Z., & He, T. (2013). Classification based on both attribute value weight and tuple weight under the cloud computing. Mathematical Problems in Engineering, 2013.
923
Vern, R., & Dubey, S. K. (2013). A Survey on Evaluation of the Quality of Software System by Using Fuzzy Logic Approach. Global Journal of Computer Science and Technology, 13(1).
924
Tegegne, W., Belachew, M., & Kifle, M. (2013). Quantification of Software Requirements Specification and Software Quality: Quantitative Approach. HiLCoE Journal of Computer Science and Technology, 144.
925
Hmood, A. (2013). A Unified Metamodel for Assessing and Predicting Software Evolvability Quality (Doctoral dissertation, Concordia University).
926
Tomar, A., & Thakare, V. M. (2013). A Customized Model on Software Quality Assurance & Reuse. International Journal Of Computer Science And Applications, 6(2).
927
Ibrahim, N. H., Mustapha, A., Rosli, R., & Helmee, N. H. (2013). A hybrid model of hierarchical clustering and decision tree for rule-based classification of diabetic patients. International Journal of Engineering and Technology (IJET), 5(5), 3986-91.
928
Thakare, S., & Wadhe, A. P. (2013). A literature Review on Desktop Phishing Based on Visual Appearance Analysis. International Journal of Research in Computer Engineering & Electronics, 2(2).
929
Mitev, I., & Maimarev, R. International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net.
930
Gayathri, C., & Kalpana, V. (2013). Study on Image Steganography Techniques. International Journal of Engineering and Technology (IJET) Vol, 5.
931
Al-Bahadili, H. (2013). A Secure Block Permutation Image Steganography Algorithm. Submitted to the International Journal on Cryptography and Information Security (IJCIS) on 30th July.
932
Kelash, H. M., Abdel Wahab, O. F., Elshakankiry, O., & El-sayed, H. S. (2013, October). Hiding data in video sequences using steganography algorithms. In ICT Convergence (ICTC), 2013 International Conference on (pp. 353-358). IEEE.
933
Chugh, G. (2013). Image Steganography Techniques: A Review Article. acta technica corviniesis-Bulletin of engineering Tome VI July-September, 97-104.
934
Sharda, S., & Budhiraja, S. (2013). Performance Analysis of Image Steganography based on DWT and Arnold Transform. International Journal of Computer Applications, 69(21).
935
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42.
936
Chee, A. (2013). Steganographic techniques on social media: investigation guidelines (Doctoral dissertation, Auckland University of Technology).
937
Sohag, S. A., Islam, D. M. K., & Islam, M. B. (2013). A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key. American Journal of Engineering Research (AJER) Volume-02, Issue-09.
938
Shah, H., Shinde, P., & Kukreja, J. (2013). Retouching Detection and Steganalysis. International Journal of Engineering Innovations and Research, 2(6), 487.
939
Ali, A. A., & Saad, A. H. S. (2013). New Image Steganography Method by Matching Secret Message with pixels of Cover Image (SMM). International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), 3 (2), 1-10.
940
Saejung, S., Boondee, A., Preechasuk, J., & Chantrapornchai, C. (2013, September). On the comparison of digital image steganography algorithm based on DCT and wavelet. In Computer Science and Engineering Conference (ICSEC), 2013 International (pp. 328-333). IEEE.
941
Patil, H. H., & Hingway, S. P. Improved Way of Image Stegnography for JPEG2000 Compression Standard by Using EBCOT.
942
Poongavanam, V., & Shamala, l. m. an enhanced difference pair mapping steganography method to improve embedding capacity.
943
FADHIL, J. A. (2013). A New Method for Improving the Capacity of Data Hiding in an Image Steganography.
944
Rad, J. M. (2013). Intensity Adaptive LSB Method Applying a Revised Matching. International Journal of Computer Applications, 70(27).
945
Bedwal, T., & Kumar, M. (2013). An Enhanced and Secure Image Steganographic Technique Using RGB-Box Mapping.
946
Arora, A., Neeru, M. N., & Taqdir, M. image steganography techniques: an overview.
947
Jassim, F. A. (2013). A Novel Robust Method to Add Watermarks to Bitmap Images by Fading Technique. arXiv preprint arXiv:1307.1166.
948
Lal, G. J., Veena, V. K., & Soman, K. P. (2013). A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition. In Security in Computing and Communications (pp. 52-62). Springer Berlin Heidelberg.
949
Shihab, A. M., Mohammed, R. K., & Abed, W. M. (2013). evaluating the performance of the secure block permutation image steganography algorithm. international journal of network security & its applications, 5(5), 167.
950
Nagaty, K. A. (2013). Secret Sharing using Image Hashing. International Journal of Computer Applications, 73(20), 14-22.
951
Patil, A. U., Hingway, S. P., & Hingway, S. P. Nav view search.
952
Barmawi, A. M. (2013, November). Strengthening Dynamic Cell Spreading (DCS) image steganography. In Information and Network Security (ICINS 2013), 2013 International Conference on (pp. 1-6). IET.
953
Yunus, Y. A., Ab Rahman, S., & Ibrahim, J. (2013). Steganography: A Review of Information Security Research and Development in Muslim World. American Journal of Engineering Research (AJER), 2(11), 122-128.
954
AKTAS, H., & KALKAN, M. An Application of the Crystography.
955
Kovtun, VY, Hnatiuk, S., & Kinzeryavyy, A. (2013). Systematics modern methods of computer steganography. Safety information, 19 (3), 209-217.
956
Rodrigues, P., Belguinha, A., Gomes, C., Cardoso, P., Vilas, T., Mestre, R., & Rodrigues, J. M. F. (2013). Open source technologies involved in constructing a web-based football information system. In Advances in Information Systems and Technologies (pp. 715-723). Springer Berlin Heidelberg.
957
Syamala, P. J., Vimalai, R., & Vimala, R. Nav view search.
958
Kuseler, T., Lami, I. A., & Al-Assam, H. (2013, May). Location-assured, multifactor authentication on smartphones via LTE communication. In SPIE Defense, Security, and Sensing (pp. 87550B-87550B). International Society for Optics and Photonics.
959
Al-Assam, H., Lami, I. A., & Kuseler, T. (2013). Integrating Cancellable Biometrics with Geographical Location for Effective Unattended Authentication of Users of Mobile Devices. Journal of Communications, 8(11).
960
Namayanja, J. M., & Janeja, V. P. (2013, June). Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks. In Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on (pp. 191-196). IEEE.
961
Mandal, S., Saha, G., & Pal, R. K. (2013). An Approach towards Automated Disease Diagnosis & Drug Design Using Hybrid Rough-Decision Tree from Microarray Dataset. J Comput Sci Syst Biol, 6, 337-343.
962
Yinkfu Chuye, K. (2013). Design and Implementation of Machine Learning and Rule-Based System for Verifying Automation System Designs.
963
Gabriel, I., Charles, A. O., & Officer, A. C. (2013). Fingerprint Matching using Neighbourhood Distinctiveness.
964
Babatunde, I. G., & Charles, A. O. (2013). A Fingerprint-based Authentication Framework for ATM Machines. J Comput Eng Inf Technol 2: 3. doi: http://dx. doi. org/10.4172/2324, 9307, 2.
965
Babatunde, I. G., Charles, A. O., & Officer, A. C. (2013, October). Fingerprint matching by neighbourhood characteristics. In Science and Information Conference (SAI), 2013 (pp. 434-442). IEEE.
966
Angaye, C. O., Akinyokun, O. C., & Iwasokun, g. b. experimental study of minutiae based algorithm for fingerprint matching.
967
Han, S. W., Jeoune, D. S., & Yoon, Y. W. (2013). New Minutiae Detection Algorithm from Fingerprint Image using the Improved Tracing on Ridge Curve. International Journal of Security and Its Applications, 7(4), 343-352.
968
Babatunde, I. G., Charles, A. O., & Olatunbosun, O. (2013). Uniformity Level Approach to Fingerprint Ridge Frequency Estimation. International Journal of Computer Applications, 62(22).
969
Jain, N., Sharma, S. K., & Pal, B. L. (2013). Development of a Multimodal Biometric Identification and Verification System using Two Fingerprints. International Journal of Computer Applications, 74(12).
970
Sahu, M., & Shukla, N. Rotation Invariant Approach of SURF for Unimodal Biometric System.
971
Peng xi, peng xiao-qi, zhong yunfei, tang ying, & left the dragon. (2013). extraction of minutiae identity detection method.computer applications and software, 30 (6), 132-136.
972
Dogra, N., & Kaur, H. (2013). Cloud Computing Security: Issues and Concerns. International Journal of Emerging Technology and Advanced Engineering, 3(3).
973
Beham, M. P., & Roomi, S. M. M. (2013). A review of face recognition methods. International Journal of Pattern Recognition and Artificial Intelligence, 27(04), 1356005.
974
Shah, S., Khan, S. A., & Riaz, N. (2013). Analytical Study of Face Recognition Techniques.
975
Thomas, L. L., Gopakumar, C., & Thomas, A. A. Face Recognition based on Gabor Wavelet and Backpropagation Neural Network.
976
Sahraoui, S., & Bouam, S. (2013). Secure routing optimization in hierarchical cluster-based wireless sensor networks. International Journal of Communication Networks and Information Security (IJCNIS), 5(3).
977
Yuhong Zhen, Wu Yonghao, & Zhou Fengli. (2013). Based on vehicle terminal system design µC / OS-? Computer Applications and Software, 30 (2), 324-327.
978
Left flat, Yunfang, Wangsan Fu, & Wang ya. (2013). A new proxy signature scheme without certificate directional Computer Applications and Software, 30 (2), 315-316.
979
Chen, B. C., & Yeh, H. T. (2013). Secure proxy signature schemes from the Weil pairing. The Journal of Supercomputing, 65(2), 496-506.
980
Zambrano, J. G., Guzmán-Ramírez, E., & Pogrebnyak, O. (2013). Search Algorithm for Image Recognition Based on Learning Algorithm for Multivariate Data Analysis. INTECH Open Access Publisher.
981
Hoelz, B. W., & Ralha, C. G. (2013, March). A framework for semantic annotation of digital evidence. In Proceedings of the 28th Annual ACM Symposium on Applied Computing (pp. 1966-1971). ACM.
982
Tanner, A., & Duncan, S. On Integrating Mobile Applications into the Digital Forensic Investigative Process.
983
Ezeah, G. H., Asogwa, C. E., & Edogor, I. O. (2013). Social media use among students of universities in South-East Nigeria. Journal of Humanities and Social Sciences, 16, 23-32.
984
Shittu, A. T., Madarsha, K. B., AbduRahman, N. S. N., & Ahmad, T. B. T. (2013). Determinants of social networking software acceptance: A multi-theoretical approach. The Malaysian Online Journal of Educational Technology, 1(1), 27-43.
985
koçak, n. g., kaya, s., & EROL, E. Social Media from the Perspective of Diffusion of Innovation Approach.
986
Mahmud, Y., Rahim, N. Z. A., & Miskon, S. (2013, October). Developing a conceptual framework of Social Network Site (SNS) appropriation in family context. In Science and Information Conference (SAI), 2013 (pp. 288-293). IEEE.
987
Yaghmaei, & F. Users tend to use this system to evaluate the hospital information system based on innovation diffusion model Razi hospital. Journal of Health Administration.
988
Patel, A., & Verma, M. K. Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET: Reliability Value based Approach. International Journal of Computer Applications (0975-8887) Volume.
989
Patel, A., & Verma, M. K. (2013). Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET. International Journal of Computer Applications, 82(1).
990
Shrivastava, S. Normalized Worm-Hole Local Intrusion Detection Algorithm (NWLIDA).
991
Gupta, A., & Malviya, M. A Novel Recommendation Trust Proxy (RTP) Based Pre-emptive Malicious Node Detection Mechanism for AODV in MANET.
992
Seo, D., Lee, H., & Perrig, A. (2013). APFS: adaptive probabilistic filter scheduling against distributed denial-of-service attacks. Computers & Security, 39, 366-385.
993
Chellani, G., & Kalla, A. (2013). A Review: Study of Handover Performance in Mobile IP. arXiv preprint arXiv:1312.2108.
994
Kumar, R., Verma, P., & Singh, Y. (2013). Mobile Ad Hoc Networks and It’s Routing Protocols. World Academy of Science, Engineering and Technology International Journal of Computer, Information, Systems and Control Engineering, 7(8).
995
Roopak, M., & Reddy, B. (2013). Blackhole Attack Implementation in AODV Routing Protocol. International Journal of Scientific & Engineering Research, 4(5), 402-406.
996
Mobadersany, P., Khanmohammadi, S., & Ghaemi, S. (2013, May). An efficient fuzzy method for path planning a robot in complex environments. In Electrical Engineering (ICEE), 2013 21st Iranian Conference on (pp. 1-6). IEEE.
997
Jafarzadeh, H., Gholami, S., & Bashirzadeh, R. (2013). Decision Science Letters.
998
Garbervetsky, D., & Kim, S. (2013). Report from 2nd international workshop on developing tools as plug-ins (TOPI 2012). ACM SIGSOFT Software Engineering Notes, 38(1), 49-51.
999
Singh, Y., Khatkar, A., Rani, P., Deepika, D., & Barak, D. D. (2013, April). Wormhole Attack Avoidance Technique in Mobile Adhoc Networks. In Advanced Computing and Communication Technologies (ACCT), 2013 Third International Conference on (pp. 283-287). IEEE.
1000
Fritzsche, M., & Gilani, W. (2013). U.S. Patent No. 8,438,533. Washington, DC: U.S. Patent and Trademark Office.
1001
Elkabbany, G. F., & Elnemr, H. A. (2013). An Efficient Parallel Based Diabetic Retinopathy Grading Algorithm. International Journal of Computer Science and Information Security, 11(9), 12.
1002
Younes, O., & Thomas, N. (2013). Modelling and performance analysis of multi-hop ad hoc networks. Simulation Modelling Practice and Theory, 38, 69-97.
1003
Krishnakumar, L., & Varughese, N. M. (2013, December). High speed classification of vulnerabilities in cloud computing using collaborative network security management. In Advanced Computing and Communication Systems (ICACCS), 2013 International Conference on (pp. 1-6). IEEE.
1004
Kaur, R. (2013). Energy efficient routing protocols in mobile ad hoc network based on AODV protocol. Int. J. Appl. Innov. Eng. Manag.(IJAIEM), 2(1), 323-324.
1005
Rajeshkanna, R., & Saradha, A. (2013). Energy Efficient Enhanced AODV Routing Protocol for maximize the lifetime of Mobile Ad hoc Networks. International Journal of Computer Technology and Applications, 4(5), 856.
1006
Gupta, R., & Aggarwal, H. (2013). Network Density based Analysis of MANET Routing Protocols. International Journal of Computer Applications, 77(10).
1007
Gupta, R. (2013). Ad-hoc routing protocol “review paper”. Journal of Global Research in Computer Science, 4(5), 26-29.
1008
Bernard, T., Fouchal, H., Linck, S., & Perrin, E. (2013, June). Impact of routing protocols on packet retransmission over wireless networks. In Communications (ICC), 2013 IEEE International Conference on (pp. 2979-2983). IEEE.
1009
Rajeshkanna, R., Senthilkumar, S. P., & Kumuthini, C. (2013). Energy Efficient Routing Protocols in Mobile Ad hoc Network Based on Enhanced AODV Protocol.
1010
Bhushan, S., Saroliya, A., & Singh, V. (2013). Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols. International Journal of Advanced Research in Computer and Communication Engineering, 2(6).
1011
Sharma, V., Singh, H., & Kant, S. (2013, September). AODV based energy efficient IEEE 802.16 G VANET network. In Communication and Computing (ARTCom 2013), Fifth International Conference on Advances in Recent Technologies in (pp. 35-43). IET.
1012
Arya, P., Vijay, S., Gupta, V., & Pandey, A. (2013). Effect of File Mobility Pattern on AODV, DSDV and ZRP Routing Protocols in MANET. International Journal of Computer Applications, 80(2).
1013
Yibyeonggwan , and jeongeunhui . (2013) . GSK (Group Secret Key) based SAODV (Secure AODV) routing protocol to detect packet injection attacks. Security Engineering Research Institute Journal of Security Engineering, 10 (6), 681-694.
1014
Agarwal, M. (2013). Text steganographic approaches: a comparison. arXiv preprint arXiv:1302.2718.
1015
Awad, W. S., & Zolait, A. H. (2013). E-Mail as an Official Communication Tool in Bahrain: Individual and Public Organization Perspectives. International Journal of E-Services and Mobile Applications (IJESMA), 5(1), 51-76.
1016
da Rocha, M. C., & Saraiva, J. T. (2013). A discrete evolutionary PSO based approach to the multiyear transmission expansion planning problem considering demand uncertainties. International Journal of Electrical Power & Energy Systems, 45(1), 427-442.
1017
Latha, K., Rajinikanth, V., & Surekha, P. M. (2013). PSO-based PID controller design for a class of stable and unstable systems. ISRN Artificial Intelligence, 2013.
1018
Arasomwan, M. A., & Adewumi, A. O. (2013, June). An adaptive velocity particle swarm optimization for high-dimensional function optimization. In Evolutionary Computation (CEC), 2013 IEEE Congress on (pp. 2352-2359). IEEE.
1019
Arasomwan, M. A., & Adewumi, A. O. (2013). On the performance of linear decreasing inertia weight particle swarm optimization for global optimization. The Scientific World Journal, 2013.
1020
Arasomwan, M. A., & Adewumi, A. O. (2013, April). On adaptive chaotic inertia weights in particle swarm optimization. In Swarm Intelligence (SIS), 2013 IEEE Symposium on (pp. 72-79). IEEE.
1021
Jadon, S. S., Sharma, H., Bansal, J. C., & Tiwari, R. (2013, January). Self adaptive acceleration factor in particle swarm optimization. In Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012) (pp. 325-340). Springer India.
1022
Yavari, S., Zoej, V., Mohammad, J., Mohammadzadeh, A., & Mokhtarzade, M. (2013). Particle swarm optimization of RFM for georeferencing of satellite images. Geoscience and Remote Sensing Letters, IEEE, 10(1), 135-139.
1023
Pessin, G., Osório, F. S., Souza, J. R., Ueyama, J., Costa, F. G., Wolf, D. F., ... & Vargas, P. A. (2013). Investigation on the evolution of an indoor robotic localization system based on wireless networks. Applied Artificial Intelligence, 27(8), 743-758.
1024
Wang, L. (2013). An improved cooperative particle swarm optimizer. Telecommunication Systems, 53(1), 147-154.
1025
Chen, R. M., & Wu, D. S. (2013). Solving Scheduling Problem Using Particle Swarm Optimization with Novel Curve Based Inertia Weight and Grouped Communication Topology. International Journal of Digital Content Technology and its Applications, 7(7), 94.
1026
Ramphuengnit, P., & Polvichai, J. An Effective Hybrid-DEPSO applied with Dynamic Sigmoid Weights.
1027
Costeira da Rocha, M., & Tome Saraiva, J. (2013, June). Transmission expansion planning—A multiyear PSO based approach considering load uncertainties. In PowerTech (POWERTECH), 2013 IEEE Grenoble (pp. 1-6). IEEE.
1028
Singh, N., & Singh, S. B. (2013, September). A New Modified Approach of Mean Particle Swarm Optimization Algorithm. In Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on (pp. 296-300). IEEE.
1029
Chen, R. M., & Hsu, C. C. (2013). Guiding Search Using an Asymmetric Decline Control Function for Solving Flowshop Problems. Journal of Convergence Information Technology, 8(6).
1030
Bahaa-Eldin, A. M. (2013). A medium resolution fingerprint matching system. Ain Shams Engineering Journal, 4(3), 393-408.
1031
Lim, J. F., & Chin, R. K. Y. (2013, December). Enhancing Fingerprint Recognition Using Minutiae-Based and Image-Based Matching Techniques. In Artificial Intelligence, Modelling and Simulation (AIMS), 2013 1st International Conference on (pp. 261-266). IEEE.
1032
Chockaian, K., Vayanaperumal, R., & Kanagaraj, B. R. (2013). New approach for identifying hereditary relation using primary fingerprint patterns. Image Processing, IET, 7(5), 423-431.
1033
Babu, K. R., & Sunitha, K. V. N. (2013). Enhancing Hazy Images with the Aid of Particle Swarm Optimization (PSO) and Morphological Operation. International Review on Computers and Software (IRECOS), 8(1), 21-28.
1034
Babu, K. R., & Sunitha, K. V. N. (2013). Image De-noising and Enhancement for Salt and Pepper Noise using Genetic Algorithm-Morphological Operations. International Journal on Signal and Image Processing, 4(1), 36.
1035
Koteska, B., & Velinov, G. (2013). Component-Based Development: A Unified Model of Reusability Metrics. In ICT Innovations 2012 (pp. 335-344). Springer Berlin Heidelberg.
1036
Valliappan, N., Lozano, A., & Heath, R. W. (2013). Antenna subset modulation for secure millimeter-wave wireless communication. Communications, IEEE Transactions on, 61(8), 3231-3245.
1037
Goswami, B., & Mandal, D. (2013). A genetic algorithm for the level control of nulls and side lobes in linear antenna arrays. Journal of King Saud University-Computer and Information Sciences, 25(2), 117-126.
1038
Banerjee, S., & DWIVEDI, V. V. (2013). Review of Adaptive Linear Antenna Array Pattern Optimization. International Journal of Electronics.
1039
Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24.
1040
Mandala, S., Abdullah, A. H., Ismail, A. S., Haron, H., Ngadi, M. A., & Coulibaly, Y. (2013, November). A review of blackhole attack in mobile adhoc network. In Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), 2013 3rd International Conference on (pp. 339-344). IEEE.
1041
Daniel, J. V., Joshna, S., & Manjula, P. (2013). A Survey of Various Intrusion Detection Techniques in Wireless Sensor Networks. International Journal of Computer Science and Mobile Computing, 2(9).
1042
Singh, D., & Bedi, S. S. (2013). A State of an Art Survey of Intrusion Detection System in Mobile Ad-hoc Network. International Journal of Computer Applications, 82(5).
1043
Butun, I. (2013). Prevention and Detection of Intrusions in Wireless Sensor Networks.
1044
Subha, P. S., & Moses, J. C. A Survey of Various Risk Mitigating Techniques in MANET Environment.
1045
Jacobs, M., Chang, L., & Pulkkinen, A. (2013, January). Automatic Segmentation and Classification of Multiple Coronal Mass Ejections from Coronagraph Images. In Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV) (p. 1). The Steering Committee of The World Congress in Computer Science, Compute
1046
Lee, g. s. color image segmentation using a morphological gradient-based active contour model.
1047
Gupta, R. K., & Singh, P. (2013). A new way to design and implementation of hybrid crypto system for security of the information in public network. International Journal of Emerging Technology and Advanced Engineering, 3(8), 108-115.
1048
Msvs, B. R., Vardhan, V., & Reddy, P. A noval security model for indic scripts-a case study on Telugu. Int. J. Comput. Sci. Secur.(IJCSS), 3(4), 303.
1049
Sinha, S. K., Shrivastava, M., & Pandey, K. K. (2013). A New Way of Design and Implementation of Hybrid Encryption to Protect Confidential Information from Malicious Attack in Network. system, 6, 7.
1050
Das, D., Lanjewar, U. A., & Sharma, S. J. Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS.
1051
Jain, S. A New Approach of Dynamic Encryption using Steganography.
1052
Ceccucci, W., Peslak, A., Kruck, S. E., & Patricia, S. (2013). DOES GENDER PLAY A ROLE IN TEXT MESSAGING?. Issues in Information Systems, 14(2).
1053
Lewis-Mohabir, B. N. (2013). English Language Butchered: A Study of the Correlational Relationship Between Text Messaging Frequency and the Instance of Jargon in Formal Writing.
1054
Fasola, J. P. (2013). socially assistive and service robotics for older adults: from motivating exercise to following spatial language instructions.
1055
Lazim, h. b. m., & sasitharan, d. what factor persuade malaysians consumer to purchase smartphone?.
1056
Kaur, V., Chattopadhyay, D. P., & Kaur, S. (2013). Study on Extraction of Bamboo Fibres from Raw Bamboo Fibres Bundles Using Different Retting Techniques. Textiles and Light Industrial Science and Technology.
1057
Faruk, I. H. (2013). A Novel Approach of Secure Routing Protocol for Mobile Ad Hoc Network (Doctoral dissertation).
1058
Joshi, M. K., & Lalmandoria, H. A Review On Wireless Adhoc Network Security.
1059
Azad, M., Pal, R., Nautiyal, J., Panday, M., & Kumar, K. Review of Emerging Threats, Vulnerabilities and Techniques of Security on Mobile Ad hoc Networks.
1060
Kazemitabar Amirkolaei, M. (2013). Enhancing Bio-inspired Intrusion Response in Ad-hoc Networks (Doctoral dissertation, Edinburgh Napier Unversity).
1061
Valluvan, K. R. (2013). A Comparative Study of Secure Intrusion-Detection Systems for Discovering Malicious Nodes on MANETs.
1062
Labbai, t. p. m., & rajamani, v. (2013). prevention of worm hole and black hole attacks in secure vbor for mobile ad hoc networks. journal of theoretical and applied information technology, 55(2).
1063
Kalaivani, R., & Thangaraj, P. (2013). An effective technique to identify a river’s stage through satellite images by means of RBFNN. The Imaging Science Journal, 61(3), 279-291.
1064
Medialdea, J. L. G., Manamparan, M. E. C., Sorita, M. G. M., Ponce, E. L., & Beltran Jr, A. A. A Novel Thermal Gas Analyzer Using Adaptive Neuro-Fuzzy Inference System (ANFIS).
1065
Salam, M. S. B. H., Mohamad, D., & Salleh, S. H. S. Connected digit speech segmentation: a malay speech case using statistical approach with insertion reduction using neural network.
1066
Diamant, R., & Lampe, L. (2013). Underwater localization with time-synchronization and propagation speed uncertainties. Mobile Computing, IEEE Transactions on, 12(7), 1257-1269.
1067
Kheirabadi, M. T., & Mohamad, M. M. (2013). Greedy routing in underwater acoustic sensor networks: a survey. International Journal of Distributed Sensor Networks, 2013.
1068
Han, G., Qian, A., Li, X., Jiang, J., & Shu, L. (2013, August). Performance evaluation of localization algorithms in large-scale underwater sensor networks. In Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on (pp. 493-498). IEEE.
1069
Li Zuopeng, Caishao Bin, Zhang Jing, high Zhenguo, & Zhao Jing. (2012). Summary of underwater acoustic sensor network node localization technology. Small Computer Systems, 33 (3), 442-447.
1070
Roee, D. (2013). Spatial reuse scheduling and localization for underwater acoustic communication networks.
1071
Tunaa, G., Gungorb, V. C., Dasc, R., & Gulezd, K. A Survey on Potential Applications of Underwater Acoustic Sensor Networks: Deployment Techniques, Localization Algorithms, and Research Challenges.
1072
Dabbour, M., Alsmadi, I., & Alsukhni, E. (2013). Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT. International Journal of Security and its Applications IJAST, 7(1).
1073
Devaraju, S., & Ramakrishnan, S. (2013). Performance comparison of intrusion detection system using various techniques–A review. ICTACT Journal on Communication Technology, 4(3), 802-812.
1074
Manivannan, S. S., & Sathiyamoorthy, E. An Efficient and Accurate Intrusion Detection System to detect the Network Attack Groups using the Layer wise Individual Feature Set.
1075
Nugroho, H. T., & Wicaksono, B. A. (2013). Utilizing Instant Messaging for Real-Time Notification and Information Retrieval of Snort Intrusion Detection System. ISICO 2013.
1076
Arunachalam, V. P., & Ravichandran, T. A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback. International Journal of Computer Science and Security (IJCSS), 3(4), 272.
1077
Barreto, rdmm right, cyberspace and networks: consumer protection challenges in social commerce.
1078
Nithya, M., & Varadarajan, V. (2013). An Security Architecture for Campus Virtual Organization Using Role Based Access Control. Life Science Journal, 10(7s).
1079
Swain, G., & Lenka, S. K. (2013). Steganography using two sided, three sided, and four sided side match methods. CSI transactions on ICT, 1(2), 127-133.
1080
Swain, G. (2013). Steganography in Digital Images Using Maximum Difference of Neighboring Pixel Values. International Journal of Security & Its Applications, 7(6).
1081
Tayel, M., Shawky, H., & Hafez, A. E. S. (2013, January). A hybrid chaos-fuzzy-threshold steganography algorithm for hiding secure data. In Advanced Communication Technology (ICACT), 2013 15th International Conference on (pp. 156-161). IEEE.
1082
Thanekar, S., & Pawar, S. S. (2013, December). OCTA (STAR) PVD: A different approach of image steganopgraphy. In Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on (pp. 1-5). IEEE.
1083
Solanki, R., Chuahan, M., & Desai, m. survey of image steganography techniques.
1084
Kaur, R., & Kaur, B. A Study and Review of Techniques of Spatial Steganography.
1085
Elangovan, B., Rajesh, K., & Venkateswari, P. (2013). An Efficient Method for High Secured Image Steganography Using Image Segments. International Journal of Applied Engineering Research, 8(12).
1086
Sedeeq, I. T. (2013). Steganography in Colored Images. International Journal of Computer Science and Information Security, 11(4), 87.
1087
Gracy, S. A., & Jayakumar, C. (2013). Identifying and Locating Multiple Spoofing Attackers Using Cluster Analysis. In International Conference on Engineering and Technology (p. 123).
1088
Kovtun, VY , Hnatyuk, S. , & Kinzeryavyy , A. (2013) . Systematics modern methods of computer steganography . Safety information , 19 ( 3), 209-217.
1089
Kumari, P., Kumar, C., & Preeyanshi, J. B. (2013). Data Security Using Image Steganography And Weighing Its Techniques. International Journal of Scientific & Technology Research, 2(11).
1090
Al-Bahadili, H. (2013). A Secure Block Permutation Image Teganography Algorithm. Submitted to the International Journal on Cryptography and Information Security (IJCIS) on 30th July.
1091
Asole, S., & Mundada, M. (2013). A Survey on Securing Databases From Unauthorized Users. Int. J. Sci. Technol. Res, 2(4), 2-4.
1092
Abbasy, M. B., & Ordonez, L. M. L. (2013, March). Single-Sink Mobility Performance Analysis on a Wireless Senosr Networks. In Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on (pp. 407-412). IEEE.
1093
Li, B., Springer, J., Bebis, G., & Gunes, M. H. (2013). A survey of network flow applications. Journal of Network and Computer Applications, 36(2), 567-581.
1094
Chadokar, S. K., Singh, D., & Singh, A. (2013, July). Optimizing network traffic by generating association rules using hybrid apriori-genetic algorithm. In Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on (pp. 1-5). IEEE.
1095
Dhanore, G., & Chaturvedi, S. K. (2013). An Optimization of Association Rule Mining using K-Map and Genetic Algorithm for Large Database. International Journal of Computer Applications, 84(17), 26-31.
1096
Taleb, A. M., Yahya, A. A., & Taleb, N. M. Parallel Genetic Algorithm Model to Extract Association Rules.
1097
Krishnamoorthy, k. pagerank algorithm and genetic algorithm in web mining.
1098
Shankar, S., & Purusothaman, T. (2013). A new utility-emphasized analysis for stock trading rules. Intelligent Data Analysis, 17(2), 271-294.
1099
Dahiya, P., & Jyotsna, M. Swam Based ACO Routing Protocol in MANET.
1100
Sutariya, D., & Kamboj, P. (2013). A Survey of QOS Multicast Routing Protocol for MANET.
1101
Nivetha, S. K., Asokan, R., & Senthilkumaran, N. (2013, July). A swarm-based hybrid routing protocol to support multiple Quality of Service (QoS) metrics in mobile ad hoc networks. In Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on (pp. 1-8). IEEE.
1102
Pourahmad, S., Safarpour, A. R., Bananzadeh, A., Rahimikazerooni, S., & Zabangirfard, Z. (2013). A Pilot study on Prediction of Pouchitis in Ulcerative Colitis Patients by Decision Tree Method Versus Logistic Regression Analysis. Annals of Colorectal Research, 1(2), 67-70.
1103
Gebremeskel, K. (2013). Application of Data Mining Techniques to Predict Customers’ churn at Commercial Bank of Ethiopia (Doctoral dissertation, AAU).
1104
Jahantigh, F. F., Nazarnejad, R., & Jahantigh, M. F. Investigating the Risk Factors for Low Birth Weight Using Data Mining: A Case Study of Imam Ali Hospital, Zahedan, Iran.
1105
Blandón, M. G., Howard, G. M., & Torres, R. (2013). Estudio de Medición de la Actividad de Botnets en la República de Panamá.
1106
LA, A. D. B. E.mario isaac gongora bland on.
1107
Lekova, A., & Adda, M. (2013). Reliable OLSR in MANETs for detecting and isolating user selfish nodes. Complex Control Systems, 11, 1-9.
1108
SAI PRAGATHI, Y. V. S., & Setty, S. P. (2013). HYBRID ANONYMOUS LOCATION-AIDED ROUTING PROTOCOL FOR PRIVACY PRESERVING AND AUTHENTICATION IN MANET. Journal of Theoretical & Applied Information Technology, 55(2).
1109
Bhuvaneshwari, K., & Devaraj, A. F. S. (2013). Examination of Impact of Flooding attack on MANET and to accentuate on Performance Degradation. International Journal of Advanced Networking and Applications, 4(4), 1695.
1110
Seethalakshmi, S., & Manikandan, K. C. (2013). Comparison of Different Methods to identify wormhole attacks in MANETS. International Journal of Advanced Networking and Applications, 4(5), 1760.
1111
Sinnreich, A., Graham, N., & Trammell, A. MONDO NET.
1112
Callegari, C., Giordano, S., Mannella, S., & Pagano, M. (2013). Design and Implementation of a Testbed for the Security Assessment of MANETs. In Cyberspace Safety and Security (pp. 228-242). Springer International Publishing.
1113
Sanaei, M. G., Ghani, I., Hakemi, A., & Jeong, S. R. (2013). ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW. Science International, 25(4).
1114
Sudhakar Sengan, D. S. (2013). A Trust and Co-Operative Nodes with Affects of Malicious Attacks and Measure the Performance Degradation on Geographic Aided Routing in Mobile Ad Hoc Network. Life Science Journal, 10(4s).
1115
Arunachalam, V. P., & Ravichandran, T. A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback. International Journal of Computer Science and Security (IJCSS), 3(4), 272.
1116
Arora, K., & Jindal, S. ANALYTICAL REVIEW OF AODV IN WORM HOLE ATTACK.
1117
Abdul Jawad, P. P., & Chacko, B. ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS.
1118
Ghani, I., Hakemi, A., Jeong, S. R., & Sanaei, M. G. P. (2013). ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW. Science International, 25(4).
1119
Gandhi, R., & Joeg, P. LERP: A Secure Location Based Efficient Routing Protocol.
1120
Panda, P., Gadnayak, K. K., & Panda, N. (2013). MANET Attacks and their Countermeasures: A Survey.
1121
Benghabrit, A., Ouhbi, B., Behja, H., & Frikh, B. (2013, June). Text clustering using statistical and semantic data. In Computer and Information Technology (WCCIT), 2013 World Congress on (pp. 1-6). IEEE.
1122
Suja, K. R., & Raglend, I. J. (2013). Adaptive genetic algorithm/neuro-fuzzy logic controller based unified power quality conditioner controller for compensating power quality problems. Australian Journal of Electrical and Electronics Engineering, 10(3), 351-361.
1123
Chan, G. Y., Lee, C. S., & Heng, S. H. (2013). Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks. Journal of Network and Computer Applications, 36(2), 829-842.
1124
Chandrashekhar, A. M., & Raghuveer, K. (2013). Fortification of hybrid intrusion detection system using variants of neural networks and support vector machines. International Journal of Network Security & Its Applications, 5(1), 71-90.
1125
Husagic-Selman, A., Koker, R., & Selman, S. (2013, October). Intrusion detection using neural network committee machine. In Information, Communication and Automation Technologies (ICAT), 2013 XXIV International Symposium on (pp. 1-6). IEEE.
1126
Parate, S., Nirkhi, S. M., & Dharaskar, R. V. (2013, December). Application of Network Forensics for Detection of Web Attack using Neural Network. In IJCA Proceedings on National Conference on Innovative Paradigms in Engineering & Technology 2013 (No. 2, pp. 28-31). Foundation of Computer Science (FCS).
1127
Chana, G. Y., Leea, C. S., & Hengb, S. H. (2013). peanfis-farm framework in defending against web service attacks.
1128
Hameed, S. M., Saad, S., & AlAni, M. F. (2013). An Extended Modified Fuzzy Possibilistic C-Means Clustering Algorithm for Intrusion Detection. Lecture Notes on Software Engineering, 1(3), 273-278.
1129
Selman, A. H. (2013). Intrusion Detection System using Fuzzy Logic.
1130
Li Nan , Zhang Xuefu & study found that knowledge-based application system related data.
1131
LABBAI, T. P. M., & RAJAMANI, V. (2013). PREVENTION OF WORM HOLE AND BLACK HOLE ATTACKS IN SECURE VBOR FOR MOBILE AD HOC NETWORKS. Journal of Theoretical and Applied Information Technology, 55(2).
1132
Skracic, K., Pale, P., & Jeren, B. (2013, January). Knowledge based authentication requirements. In MIPRO 2012 International Convention Opatija.
1133
van Eekelen, W. A., van den Elst, J., & Khan, V. J. (2013, April). Picassopass: a password scheme using a dynamically layered combination of graphical elements. In CHI'13 Extended Abstracts on Human Factors in Computing Systems (pp. 1857-1862). ACM.
1134
Khan, F. N., & Govil, K. (2013). Distributed Task Allocation Scheme for Performance Improvement in Mobile Computing Network. International Journal of Trends in Computer Science, 2(3), 809-817.
1135
Kamal, S., & Singh, B. H. (2013). Scheduling Of Parallel Constrained Task Graphs On Multiprocessor Systems. American International Journal of Research in Science, Technology, Engineering and Mathematics, 153-158.
1136
Kaur, A., & Kaur, P. (2013). Implementation of Mapping Heuristic Genetic Algorithm. International Journal of Advanced Research in Computer and Communication Engineering, 3224-3229.
1137
Tutueanu, R. I., Pop, F., Vasile, M. A., & Cristea, V. (2013). Scheduling Algorithm Based on Agreement Protocol for Cloud Systems. In Algorithms and Architectures for Parallel Processing (pp. 94-101). Springer International Publishing.
1138
Kaur, P., & Kaur, A. Implementation of Dynamic Level Scheduling Algorithm using Genetic Operators. International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume, 2.
1139
Awadall, M., Ahmad, A., & Al-Busaidi, S. (2013). Min–min GA Based Task Scheduling In Multiprocessor Systems. International Journal of Soft Computing and Engineering (IJSCE). ISSN, 2231-2307.
1140
Vasile, M. A., Pop, F., Tutueanu, R. I., & Cristea, V. (2013). HySARC2: Hybrid Scheduling Algorithm Based on Resource Clustering in Cloud Environments. In Algorithms and Architectures for Parallel Processing (pp. 416-425). Springer International Publishing.
1141
Geetha, T., Mahalakshmi, K., Ummusalma, I., & Kumaran, K. M. (2013). An Observational Analysis of Genetic Operators. International Journal of Computer Applications, 63(18), 24-34.
1142
Kaur, A., & Singh, B. (2013). Enhancement of Power Aware Job Scheduling with Minimum Completion Time Algorithm. International Journal of Engineering Science and Technology, 5(7), 1465.
1143
Na'mneh, A., & Darabkh, K. (2013, November). A new genetic-based algorithm for scheduling static tasks in homogeneous parallel systems. In Robotics, Biomimetics, and Intelligent Computational Systems (ROBIONETICS), 2013 IEEE International Conference on (pp. 46-50). IEEE.
1144
Sivasankar, S., Jeyapaul, R., & Kunhahamed, P. K. (2013). Performance study of tool materials and optimisation of pulse duration on EDM of zirconium di boride. International Journal of Machining and Machinability of Materials, 14(2), 123-141.
1145
El-Said, A. M., Eldesoky, A. I., & Arafat, H. A. (2013). An efficient object oriented text analysis (OOTA) approach to construct static structure with dynamic behavior. International Journal of Information Acquisition, 9(01), 1350006.
1146
Benghabrit, A., Ouhbi, B., Behja, H., & Frikh, B. (2013). Statistical and Semantic Feature Selection for Text Clustering. Journal of Intelligent Computing, 4(2), 69-79.
1147
De Quiroz, V. B. A., & Guizzardi, R. S. S. Secure Tropos.
1148
Fotso, D. B. F. (2013). Efficient data aggregation and routing in wireless sensor networks (Doctoral dissertation).
1149
FOTUE, D. (2013). Agrégation et Routage Efficace de Données dans les Réseaux de Capteurs Sans Fils.
1150
Mohammadi, F. G., & Abadeh, M. S. (2012). A survey of data mining techniques for steganalysis. Recent Advances in Steganography, 1-25.
1151
5. G. Liu and X. Chen, “A Positioning Research of Underwater Acoustic Sensor Networks Based on Support Vector Regression”, Engineering Future Computing, Communication, Control and Management Lecture Notes in Electrical Engineering, 2012, Volume 144, pp. 9-16.
1152
Shukla, D., Verma, K., & Gangele, S. (2012). Least square curve fitting applications under rest state environment in internet traffic sharing in computer network. International Journal of Computer Science and Telecommunications (IJCST), 3(05), 43-51.
1153
Shukla, D., Verma, K., & Gangele, S. (2012). Iso-Failure in Web Browsing using Markov chain model and curve fitting analysis. International journal of modern engineering research (IJMER), 2(02), 512-517.
1154
Sultan Aljahdali, “Development of a Software Effort Estimation Model Using Differential Evolution”, Journal Of Electronics And Computer Systems (IJECS). 12(1), pp. 1-8, 2012.
1155
Woungang, I., Dhurandher, S. K., Peddi, R. D., & Obaidat, M. S. (2012, May). Detecting blackhole attacks on DSR-based mobile ad hoc networks. In Computer, Information and Telecommunication Systems (CITS), 2012 International Conference on (pp. 1-5). IEEE.
1156
Ramana, V. V., Reddy, A., & Sekaran, K. C. (2012). Bio Inspired Approach to Secure Routing in MANETs. arXiv preprint arXiv:1208.3486.
1157
Choudhury, P., Nandi, S., Pal, A., & Debnath, N. C. (2012, July). Mitigating route request flooding attack in MANET using node reputation. In Industrial Informatics (INDIN), 2012 10th IEEE International Conference on (pp. 1010-1015). IEEE.
1158
Pavani, K., & Avula, D. (2012). Performance of Mobile Adhoc Networks in Presence of Attacks. International Proceedings of Computer Science and Information Technology, 56, 147.
1159
Bhosle, A. A., Thosar, T. P., & Mehatre, S. (2012). Black-hole and wormhole attack in routing protocol AODV in MANET. International Journal of Computer Science, Engineering and Applications, 2(1), 45.
1160
Singh, G., Kumar, N., & Verma, A. K. (2012). Ant colony algorithms in MANETs: A review. Journal of Network and Computer Applications, 35(6), 1964-1972.
1161
Bharathi, C. R., & Shanthi, V. (2012). An effective system for acute spotting aberration in the speech of abnormal children via artificial neural network and genetic algorithm. American Journal of Applied Sciences, 9(10), 1561.
1162
Gupta, R., & Satsangi, C. S. (2012). An efficient range partitioning method for finding frequent patterns from huge database. International Journal of Advanced Computer Research, 2(2), 62-69.
1163
S. Patil, A. Patil and A. Kumar, “Implemented Encryption Scheme Using Even (10’s and 2’s) Complement with Binary Addition Approach”, International Journal of Information Technology and Knowledge Management, 5(1), pp. 65-67, 2012.
1164
Swain, G., & Lenka, S. K. (2012). A Novel Approach to RGB Channel Based Image Steganography Technique. Int. Arab J. e-Technol., 2(4), 181-186.
1165
Swain, G., & Lenka, S. K. (2012). LSB array based image steganography technique by exploring the four least significant bits. In Global Trends in Information Systems and Software Applications (pp. 479-488). Springer Berlin Heidelberg.
1166
Hassan, W. A., & Rahman, T. A. (2012). A Spectrum Sharing Model for Compatibility between IMT-Advanced and Digital Broadcasting. TIIS, 6(9), 2073-2085.
1167
A. Ranjan, R. S. Murthy and R. P. Kumar, “A Review of Secure SMS Based M-Commerce”, International Journal of Engineering Sciences & Emerging Technologies, 1(2), pp: 1-7, 2012.
1168
W. Barkouti, S. Oueslati and A. Cherif, “PCM Encoding and a Spread Spectrum Modulation in the Watermarking System”, The Online Journal on Computer Science and Information Technology (OJCSIT), 2(1), pp. 111-114, January, 2012.
1169
G. Swain and S. K. Lenka, “Application Of A Large Key Cipher In Image Steganography By Exploring The Darkest And Brightest Pixels”, International Journal of Computer Science and Communication, 3(1), pp. 49-53, January-June 2012.
1170
Tyagi, A., & Sharma, S. (2012). Implementation Of ROCK Clustering Algorithm For The Optimization Of Query Searching Time. International Journal on Computer Science and Engineering, 4(5), 809.
1171
S. R. Jathe and D. M. Dakhane, “Indicators for Detecting Sinkhole Attack in MANET”, International Journal of Emerging Technology and Advanced Engineering, 2(1), pp. 369-372, January 2012.
1172
D. Pendlimarri and P. B. B. Petlu, “Ancillary Resistor leads to Sparse Glitches: an Extra Approach to Avert Hacker using Syndicate Browser Design”, International Journal on Advanced Science, Engineering and Information Technology, 2 (5), pp. 57-60, 2012.
1173
D. Shravani, Dr. P. S. Varma, K. V. Rao, M.U. Kumar and Dr.B.P. Rani, “Dependable Web Services Security Architecture Development Theoretical and Practical Issues – Spatial Web Services Case Study”, Natarajan Meghanathan, et al. (Eds): ITCS, SIP, JSE-2012, CS & IT 04, pp. 79–98, 2012.
1174
Prof. S. K. Bandyopadhyay and S. Roy, “Detection of Sharp Contour of the element of the WBC and Segmentation of two leading elements like Nucleus and Cytoplasm”, International Journal of Engineering Research and Applications (IJERA), 2(1), pp.545-551, Jan-Feb 2012.
1175
D. Vishwakarma, Prof. S. Maheshwari and Prof. S. Joshi, “Efficient Information Hiding Technique Using Steganography”, International Journal of Emerging Technology and Advanced Engineering, 2(1), pp. 154-159 January 2012.
1176
N. Kaur, H. Kaur and S. P. Ahuja, “Inter-Intra Fairness Schedular for Resource Management in Grid Environment”, International Journal of Advanced Research in Computer Science and Software Engineering, 2(1), January 2012.
1177
A. Ranjan, R. S. Murthy and R. P. Kumar, “A Review of Secure SMS Based M-Commerce”, International Journal of Engineering Sciences & Emerging Technologies, 1(2), pp: 1-7, 2012.
1178
R. R. Chavan, Sabnees and Manoj , “Secured mobile messaging”, in Proceedings of Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference, Nagercoil, Tamil Nadu, India, 21-22 March 2012, pp. 1036 - 1043 .
1179
R.H. Jhaveri, S.J.Patel, and D.C. Jinwala, “DoS Attacks in Mobile Ad Hoc Networks: A Survey”, in Proceedings of Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference , Rohtak, Haryana, 7-8 Jan. 2012, pp. 535 – 541
1180
11. D.Devi Aruna and P.Subashini, “CCMP-AES Model with SNAuth SPMAODVRouting Potocol to Secure Link and Network Layer for Mobile Adhoc Networks in Military Scenario”, International Journal of Engineering and Advanced Technology (IJEAT), 1(4), pp. 230-236, 2012
1181
A. K. Rai and R. R. Tewari, “A Secure Framework for Integrated MANET-Internet Communication”, in Proceedings of the National Academy of Sciences, India, 2012.
1182
M. Kumar, A. Bhushan and Amit Kumar, “A Study of wireless Ad-Hoc Network attack and Routing”, International Journal of Advanced Research in Computer Science and Software Engineering, 2(4), pp. 30-33, 2012.
1183
Jeongmingyu , and Kim Jae-kyung . (2012) . Intelligent audience emotions determine models for personalized exhibition service implementation. Intelligence and Information Systems, 18 (1) , 39-57.
1184
Pal, U., Jayadevan, R., & Sharma, N. (2012). Handwriting recognition in indian regional scripts: a survey of offline techniques. ACM Transactions on Asian Language Information Processing (TALIP), 11(1), 1.
1185
Ingle, V. A. (2012, December). Processing of unstructured data for information extraction. In Engineering (NUiCONE), 2012 Nirma University International Conference on (pp. 1-4). IEEE.
1186
Chaudhary, A., Kolhe, S., & Kamal, R. (2012, September). Machine learning techniques for Mobile Intelligent Systems: A study. In 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN).
1187
Bahaidara, A. S. (2012). Algorithem and Programme for Computation of Forces Acting on Line Supports. International Journal of Computer Science and Security (IJCSS), 6(1), 53.
1188
GETACHEW, W. application of case-based reasoning for anxiety disorder diagnosis.
1189
Mguni, K., & Ayalew, Y. (2012, September). Improving maintainability of COTS based system using Aspect Oriented Programming: An empirical evaluation. In Sofware Engineering and Applied Computing (ACSEAC), 2012 African Conference on (pp. 21-28). IEEE.
1190
Oliveira, R. R. D. (2012). Avaliação de manutenibilidade entre as abordagens de web services RESTful e SOAP-WSDL (Doctoral dissertation, Universidade de São Paulo).
1191
Lalnunsanga, M. (2012). An Introduction to a Meta-meta-search Engine.
1192
Kumar, A. V., Jeyapal, A., & Gowda, R. (2012). FPGA implementation of enhanced ABR protocol with auto defense towards malicious node in MANETs. Internal Security, 4(2), 139.
1193
Grebenik, V. V., & Abraham, P. (2012). U.S. Patent No. 8,255,419. Washington, DC: U.S. Patent and Trademark Office.
1194
Vinay, A., & Saxena, P. (2012). Inter and Intra Cluster Load Balancing Strategies for Cluster Based Video-on-Demand Systems. In Global Trends in Computing and Communication Systems (pp. 772-781). Springer Berlin Heidelberg.
1195
Gimgeunhyeong , and yunsanghun . (2012) . Impact Factors and services by type comparative analysis of the SNS user satisfaction. Internet e-commerce Research , 12 ( 1), 125-143.
1196
The Swiss Zhai ( 2012 ) from the community , virtual community to the social network : . Changes in social theory of Lanzhou University ( Social Science Edition ), 40 (5), 51r56.
1197
Yaghmaei , F. , & Shiraz. (2012 ) . Review system based on user interest Hospital Information System to Use Diffusion of Innovation in Razi hospital . Health Management , 14 ( 46 ) , 11-20.
1198
Alguliev, R. M., Aliguliyev, R. M., & Isazade, N. R. (2012). DESAMC+ DocSum: Differential evolution with self-adaptive mutation and crossover parameters for multi-document summarization. Knowledge-Based Systems, 36, 21-38.
1199
Alguliev, R. M., Aliguliyev, R. M., & Hajirahimova, M. S. (2012). GenDocSum+ MCLR: Generic document summarization based on maximum coverage and less redundancy. Expert Systems with Applications, 39(16), 12460-12473.
1200
Mannes, E., Nogueira, M., & Santos, A. (2012, October). Reliable operational services in MANETs by misbehavior-tolerant quorum systems. In Proceedings of the 8th International Conference on Network and Service Management (pp. 343-349). International Federation for Information Processing.
1201
Ananthi, S., & Anjanadevi, A. (2012). Reversible Image Data Hiding Using Predictive Coding Technique Based on Steganograpic Scheme. International Journal of Engineering and Innovative Technology (IJEIT) Volume, 2.
1202
Ogilvie, R., & Weir, G. R. (2012). Genre-based information hiding. In Global Security, Safety and Sustainability & e-Democracy (pp. 104-111). Springer Berlin Heidelberg.
1203
Wong, R. K. (2012, June). The Economics of Content Optimization Services. In Services Economics (SE), 2012 IEEE First International Conference on (pp. 9-15). IEEE.
1204
Agarwal, A., Hamza-Lup, G. L., & Khoshgoftaar, T. M. (2012). A System-Level Modeling Methodology for Performance-Driven Component Selection in Multicore Architectures. Systems Journal, IEEE, 6(2), 317-328.
1205
Nazir, S., Khan, M. A., Anwar, S., Khan, H., & Nazir, M. (2012, May). A novel fuzzy logic based software component selection modeling. In Information Science and Applications (ICISA), 2012 International Conference on (pp. 1-6). IEEE.
1206
Pauline, M., Aruna, P., & Shadaksharappa, B. (2012). Fuzzy-Based Approach Using Enhanced Function Point to Evaluate the Performance of Software Project. IUP Journal of Computer Sciences, 6(2), 20.
1207
KUMAR, M. S. R., & SivaSubramanian, S. An Approach towards Developing an Efficient Software Cost Estimation System Using Fuzzy and Analogy Methods.
1208
Pauline, M., Aruna, P., & Shadaksharappa, B. an enhanced model to estimate effort, performance and cost of the software projects.
1209
Nimbhorkar, S. U., & Malik, L. G. (2012). A survey on Elliptic curve cryptography (ECC). International Journal of Advanced Studies in Computers, Science and Engineering, 1(1), 1.
1210
Shukla, D., Verma, K., & Gangele, S. (2012). Iso-Failure in Web Browsing using Markov chain model and curve fitting analysis. International journal of modern engineering research (IJMER), 2(02), 512-517.
1211
Shukla, D., Verma, K., & Gangele, S. (2012). Curve Fitting Approximation In Internet Traffic Distribution In Computer Network In Two Market Environment. International Journal of Computer Science and Information Security, 10(4), 71.
1212
Shukla, D., Verma, K., & Gangele, S. (2012). Least square curve fitting applications under rest state environment in internet traffic sharing in computer network. International Journal of Computer Science and Telecommunications (IJCST), 3(05), 43-51.
1213
Alghazzawi, D. M. (2012). A Novel Password based Multi Party Key Agreement Protocol on Elliptic Curve. International Journal of Computer Science & Information Technology, 4(1), 75-81.
1214
Swain, G., & Lenka, S. K. (2012). A better RGB channel based image steganography technique. In Global Trends in Information Systems and Software Applications (pp. 470-478). Springer Berlin Heidelberg.
1215
Tayel, M., Shawky, H., & Hafez, A. E. D. S. (2012, February). A new chaos steganography algorithm for hiding multimedia data. In Advanced Communication Technology (ICACT), 2012 14th International Conference on (pp. 208-212). IEEE.
1216
Banu, S. S., & Dhanasekaran, R. (2012). A New Residual Energy Based Multipath Routing Approach for Wireless Sensor Networks.
1217
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012). Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168-187.
1218
Bhattacharyya, S., & Sanyal, G. (2012). A robust image steganography using dwt difference modulation (dwtdm). International Journal of Computer Network and Information Security (IJCNIS), 4(7), 27.
1219
Mandal, P. C. (2012). Modern Steganographic technique: A survey. International Journal of Computer Science & Engineering Technology (IJCSET), 3(9), 444-448.
1220
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012). A Comparison between using SIFT and SURF for characteristic region based image steganography. International Journal of Computer Science Issues, 9(33-3), 110-116.
1221
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. (2012, April). Characteristic region based image steganography using Speeded-Up Robust Features technique. In Future Communication Networks (ICFCN), 2012 International Conference on (pp. 141-146). IEEE.
1222
Barukab, O. M., Khan, A. I., Shaik, M. S., Murthy, M. R., & Khan, S. A. (2012). Secure Communication Using Symmetric and Asymmetric Cryptographic Techniques. International Journal of Information Engineering and Electronic Business (IJIEEB), 4(2), 36.
1223
Anitha, M. P., & Sivanandham, S. N. (2012). An efficient neural network based algorithm for detecting steganography content in corporate mails: A web based steganalysis. IJCSI International journal of computer science issues, 9(3).
1224
Sonaniya, A. K., & Rai, R. K. (2012). A Review on Comparison between Different Image Steganography Methods.
1225
Hamid, N., Yahya, A., Ahmad, B., Al-Qershi, O. M., Najim, D., & Kanaan, L. (2012). Enhancing the Robustness of Digital Image Steganography Using ECC and Redundancy.
1226
Kaur, A., & Kaur, B. Secure The Secret Information In An Image Using K-MM In Steganography.
1227
Dalvi, A., & Kamathe, R. S. Color Image Steganography by Using Dual Wavelet Transform (DWT, SWT).
1228
Ranjan, A., Rajashekara Murthy, S., & Kumar, R. (2012). AReview OF secure sms based MCommerce.
1229
Murali, G., Redddy, C. A. P. K., Swetha, G. V. N., & Kumar, P. B. (2012). End to End Security for Mobile Application. Wireless Communication, 4(5), 253-256.
1230
MIGWI, G. M. (2012). Framework for securing mobile money transfer services (Doctoral dissertation, KCA University).
1231
Das, D. D. (2012). Strange Number System: An Enhancing Tool for Data Encryption and Decryption. International Journal of Advanced Research in Computer Science, 3(2).
1232
Chavan, R. R., & Sabnees, M. (2012, March). Secured mobile messaging. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 1036-1043). IEEE.
1233
Saxena, S., & Gupta, P. C. (2012). A Novel Approach of Handwritten Devanagari Character Recognition through Feed Forward Back Propagation Neural Network. International Journal of Computer Applications, 51(20), 33-41.
1234
Jadhav, N. B., Mulay, G. N., & Anuse, A. D. (2012). Recognition of Identical Shape Handwritten Devnagari Vowels. Artificial Intelligent Systems and Machine Learning, 4(5), 314-318.
1235
Mantri, K. S., Ramteke, S. P., & Suralkar, S. R. (2012). Pali Character Recognition System.
1236
El Zanfaly, D. S., Darwish, A., Gomaa, A. G., & Youssif, A. A. (2012, May). Heterogeneous data reduction model for payment request file of direct debit processes. In Informatics and Systems (INFOS), 2012 8th International Conference on (pp. DE-8). IEEE.
1237
Kamalanathan, S., & Selvaraju, S. (2012). Collaborative Approaches for Personalized Web Search Using Fuzzy Neural Networks. In Global Trends in Information Systems and Software Applications (pp. 367-376). Springer Berlin Heidelberg.
1238
Toufik, B., & Mokhtar, N. (2012). The Wavelet Transform for Image Processing Applications. INTECH Open Access Publisher.
1239
Korbi, I. E., Zeadally, S., & Jumira, O. (2012, December). A chain-based relocation approach to maintain connectivity with a center of Interest. In Computational Science and Engineering (CSE), 2012 IEEE 15th International Conference on (pp. 235-242). IEEE.
1240
El Korbi, I., Zidi, C., Zeadally, S., & Azouz Saidane, L. (2012, October). A novel sensor node relocation approach to maintain connectivity with a center of interest. In Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems (pp. 135-142). ACM.
1241
Cunningham, T. (2012). Understanding Synthetic Speech and Language Processing of Students With and Without a Reading Disability (Doctoral dissertation).
1242
Karmore, P. K., & Gaurishankar, L. G. (2012). Detection of Blackhole Attack on AODV based Mobile Ad hoc Networks using K-means Clustering Technique of Data Mining.
1243
Balarengadurai, C., & Saraswathi, S. (2012, November). Detection of exhaustion attacks over IEEE 802.15. 4 MAC layer using fuzzy logic system. In Intelligent Systems Design and Applications (ISDA), 2012 12th International Conference on (pp. 527-532). IEEE.
1244
Biswas, S., Dey, P., & Neogy, S. (2012, November). Trusted checkpointing based on ant colony optimization in MANET. In Emerging Applications of Information Technology (EAIT), 2012 Third International Conference on (pp. 433-438). IEEE.
1245
Rai, A. K., & Tewari, R. R. (2012). A Secure Framework for Integrated MANET-Internet Communication. Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 82(3), 251-255.
1246
Aruna, D. D., & Subashini, D. P. (2012). Securing Physical and network layer using SNAuth-SPMAODV with DSSS for Mobile adhoc networks in Military Scenario. International Journal of Electronics and Computer Science Engineering (IJECSE, ISSN: 2277-1956), 1(03), 1840-1849.
1247
Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012, January). DoS attacks in mobile ad hoc networks: A survey. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 535-541). IEEE.
1248
Sadeghi, M., & Yahya, S. (2012, July). Analysis of Wormhole attack on MANETs using different MANET routing protocols. In Ubiquitous and Future Networks (ICUFN), 2012 Fourth International Conference on (pp. 301-305). IEEE.
1249
Indirani, G., & Selvakumar, K. (2012). Swarm based Intrusion Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks. International Journal of Computer Applications (0975–8887), 50(19), 1-7.
1250
Kumar, M., & Kumar, A. B. A. (2012). A study of wireless Ad-hoc Network attack and routing Protocol attack. International Journal of Advanced Research in Computer Science and Software Engineering ISSN, 2277.
1251
Grochocki, D., Huh, J. H., Berthier, R., Bobba, R., Sanders, W. H., Cardenas, A., & Jetcheva, J. G. (2012, November). AMI threats, intrusion detection requirements and deployment recommendations. In Smart Grid Communications (SmartGridComm), 2012 IEEE Third International Conference on (pp. 395-400). IEEE.
1252
Banerjee, S., & Majumder, K. (2012). A comparative study on wormhole attack prevention schemes in mobile ad-hoc network. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 372-384). Springer Berlin Heidelberg.
1253
Patel, M. C., & Kuche, A. J. (2012). Different Attacks in MANET. International Journal of Managment, IT and Engineering, 2(9), 394-406.
1254
Mirzaei, A., & Mohammadi, S. (2012). Use of Honeypots along with IDS in Cluster-Based MANETs. American Journal of Scientific Research, (80), 155-163.
1255
Banerjee, S., & Majumder, K. (2012). A survey of blackhole attacks and countermeasures in wireless mobile ad-hoc networks. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 396-407). Springer Berlin Heidelberg.
1256
Jathe, S. R., & Dakhane, D. M. (2012). Indicators for Detecting Sinkhole Attack in MANET. International Journal of Emerging Technology and Advanced Engineering, 2, 2250-2459.
1257
Kaur, E. H., Pooja, E., & Gupta, O. P. (2012). International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net.
1258
Sharma, E. S., & Singh, E. T. (2012). An Efficient Intrusion Detection System for Routing Attacks in Manets: An Analytical Report. NETWORKS, 19(20), 21.
1259
Aruna, D. D., & Subashini, P. (2012). CCMP-AES Model with SNAuth-SPMAODV Routing Potocol to Secure Link and Network Layer for Mobile Adhoc Networks in Military Scenario. International Journal of Engineering and Advanced Technology (IJEAT) ISSN, 2249-8958.
1260
Jayanand, A., & Jebarajan, T. (2012). Improved Multi-Path Secured Routing Protocol. Networking and Communication Engineering, 4(13), 787-792.
1261
Sharma, E. S., & Singh, E. T. P. (2012). Distance Vector Routing Algorithm for Detection and Correction of Grey & Black Hole Attack by Implementing IDS.
1262
Pendlimarri, D., & Petlu, P. B. B. (2012). Ancillary Resistor leads to Sparse Glitches: an Extra Approach to Avert Hacker using Syndicate Browser Design. International Journal on Advanced Science, Engineering and Information Technology, 2(5), 57-60.
1263
Mewada, V. B., & Borisagar, V. modified dsr for mitigating blackhole impact in manet.
1264
Sharma, k., & singla, p. a survey on various security attacks in manet.
1265
Patheja, P. S., Waoo, A. A., & Sharma, R. (2012). Comparison of Efficient and Rand Index Fitness Function for Clustering Gene Expression Data. In Advances in Computer Science and Information Technology. Computer Science and Information Technology (pp. 160-167). Springer Berlin Heidelberg.
1266
Mata Moya, D. A. D. L. (2012). Diseño de detectores robustos en aplicaciones radar.
1267
Thilagavathi, K., & Rajeswari, P. G. (2012). Efficiency and Effectiveness Analysis over ECC-Based Direct and Indirect Authentication Protocols: An Extensive Comparative Study. ICTACT Journal on Communication Technology, 3(1), 515-524.
1268
Shravani, D., Varma, P. S., Rao, K. V., Rani, B. P., & Kumar, M. U. (2012). dependable web services security architecture development theoretical and practical issues–spatial web services case study.
1269
Thepade, D. S. D., Parekh, D., Shah, J., Shah, B., & Vora, P. (2012). Classification of Fingerprint using KMCG Algorithm. International Journal of Science and Technology Research, 1(6).
1270
Soliman, H. H., Hikal, N. A., & Sakr, N. A. (2012). A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. Egyptian Informatics Journal, 13(3), 225-238.
1271
Fernandes, R., Li, B., Vadakkeveedu, K., Verma, A., Gustafson, P., & Hwang, J. (2012, May). Agent-based analysis of trustworthiness in wireless sensor networks. In SPIE Defense, Security, and Sensing (pp. 84070W-84070W). International Society for Optics and Photonics.
1272
Kotenko, I., & Chechulin, A. (2012). Attack modeling and security evaluation in SIEM systems. International Transactions on Systems Science and Applications, 8, 129-147.
1273
Dey, N., Roy, A. B., & Dey, S. (2012). A novel approach of color image hiding using RGB color planes and DWT. arXiv preprint arXiv:1208.0803.
1274
Rubab, S., & Younus, M. (2012). Improved image steganography technique for colored images using wavelet transform. image, 100, 512x512.
1275
Raftari, N., & Moghadam, A. M. E. (2012, May). Digital image steganography based on integer wavelet transform and assignment algorithm. In Modelling Symposium (AMS), 2012 Sixth Asia (pp. 87-92). IEEE.
1276
Chanu, Y. J., Singh, K. M., & Tuithung, T. (2012). Image steganography and steganalysis: A survey. International Journal of Computer Applications, 52(2).
1277
Raftari, N., & Moghadam, A. M. E. (2012, July). Digital Image Steganography Based on Assignment Algorithm and Combination of DCT-IWT. In Computational Intelligence, Communication Systems and Networks (CICSyN), 2012 Fourth International Conference on (pp. 295-300). IEEE.
1278
Vongurai, N., & Phimoltares, S. (2012, September). Frequency-Based Steganography Using 32x32 Interpolated Quantization Table and Discrete Cosine Transform. In Computational Intelligence, Modelling and Simulation (CIMSiM), 2012 Fourth International Conference on (pp. 249-253). IEEE.
1279
Masoumi, M., & Amiri, S. (2012). A High Capacity Digital Watermarking Scheme for Copyright protection of Video Data based on YCbCr Color Channels Invariant to Geometric and Non-Geometric Attacks. International Journal of Computer Applications, 51(13), 0975-8887.
1280
Nithyanandam, P., Ravichandran, T., Priyadharshini, E., & Santron, N. M. (2012). An image steganography for colour images using lossless compression technique. International Journal of Computational Science and Engineering, 7(3), 194-205.
1281
Goel, M. K., & Jain, N. (2012). A RSA-DWT Based Visual Cryptographic Steganogrphy Technique. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 1(2), pp-95.
1282
Pandian, N., & Thangavel, R. (2012). Gray Coded Grayscale Image Steganoraphy using Hufman Encoding. International Journal of Image Processing (IJIP), 6(5), 334.
1283
Satyavathy, G., & Punithavalli, M. (2012). Distinct Steganographic Approach for 4D-DCT Combined with RSA and HAAR-DWT for Safe Delivery of Text and Images without Distortion. European Journal of Scientific Research, 91(4), 555-562.
1284
Zan, M. M., & Aye, N. A Modified High Capacity Colored Image Steganography in RGB Color Space.
1285
Vishwakarma, D., Maheshwari, S., & Joshi, S. Efficient Information Hiding Technique Using Steganography.
1286
Cauvery, N. K. Empirical Computation Of Rs-Analysis For Building Robust Steganography Using Integer Wavelet Transform And Genetic Algorithm.
1287
Kumar, D., & Anand, B. Evaluation of RS-Analysis Proficiency by Genetic Algorithm for Robust Steganography using IWT.
1288
Rasheed, Z. A. S. Comparative Study for Steganography Techniques.
1289
Gezehagn, G. E. (2012). Afaan Oromo Text Retrieval System.
1290
Arai, K., & Sentinuwo, S. R. (2012). Spontaneous-braking and lane-changing effect on traffic congestion using cellular automata model applied to the two-lane traffic. IJACSA) International Journal of Advanced Computer Science and Applications, 3(8).
1291
Huang, W., Wang, X., Li, J., & Jin, Z. (2012). A Novel Feature Extraction Method based on Collaborative Representation for Face Recognition. International Journal of Pattern Recognition and Artificial Intelligence, 1556004.
1292
MUGO, E. A. K. (2012). A Model to Measure Information Security Awareness (Doctoral dissertation, Strathmore University).
1293
Yasin, S., Haseeb, K., & Qureshi, R. J. (2012). Cryptography based e-commerce security: a review. International Journal of Computer Science Issues, 9(2), 132-137.
1294
Opoku, S. K. (2012). A Robust Cryptographic System using Neighborhood-Generated Keys. arXiv preprint arXiv:1209.2738.
1295
Abbadi, L. (2012). Multi-factor Authentication Techniques for Video Applications over the Untrusted Internet (Doctoral dissertation, University Of Ottawa).
1296
Idrizi, F., & Ninka, I. (2012). Some potential challenges during the implementation of security models for electronic transactions. International Journal of Science, Innovation & New Technology.
1297
ANT, L. B. U. F. B. (2012). International Journal of Engineering & Science Research.
1298
Sivaprasad, A., & Jangale, S. (2012, March). A complete study on tools & techniques for digital forensic analysis. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 881-886). IEEE.
1299
Al-Fedaghi, S., & Al-Babtain, B. (2012). Modeling the forensics process. Int. J. Security Appl, 6(4).
1300
Adams, R. (2012). The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice (Doctoral dissertation, Murdoch University).
1301
Knight, G. (2012). The forensic curator: Digital forensics as a solution to addressing the curatorial challenges posed by personal digital archives. International Journal of Digital Curation, 7(2), 40-63.
1302
Jawale, N. (2012). Locating and extracting digital evidence from hosted virtual desktop infrastructures: cloud context (Doctoral dissertation, Auckland University of Technology).
1303
Susaimanickam, R. (2012). A workflow to support forensic database analysis (Doctoral dissertation, Murdoch University).
1304
Kumar, K., Sofat, S., Aggarwal, N., & Jain, S. K. (2012). Identification of User Ownership in Digital Forensic using Data Mining Technique. International Journal of Computer Applications, 50(4), 1-5.
1305
Lee, K., & Boddington, M. R. (2012). A Workflow to Support Forensic Database Analysis.
1306
Hanson, S. Computer Forensics: Investigations of the Future.
1307
Roger, A. E., & Achille, M. M. Article: Multi-perspective Cybercrime Investigation Process Modeling}. International Journal of Applied, 2, 14-20.
1308
Rajagopal, R., & Chitra, M. (2012, July). Trust based interoperability security protocol for grid and Cloud computing. In Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on (pp. 1-5). IEEE.
1309
Maruthanayagam, D., & Rani, R. U. (2012). International Journal of Engineering & Science Research.
1310
Nimako, G., Otoo, E. J., & Ohene-Kwofie, D. (2012, October). Cache-sensitive MapReduce DGEMM algorithms for shared memory architectures. In Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference (pp. 100-110). ACM.
1311
Dash, T., & Nayak, T. (2012). Chain Multiplication of Dense Matrices: Proposing a Shared Memory based Parallel Algorithm. Matrix, 10, 16.
1312
Ismail, M. A., Altaf, T., & Mirza, S. H. Parallel Matrix Multiplication on Multi-Core Processors using SPC 3 PM.
1313
Zirra, P. B., Wajiga, G. M., & Boukari, S. (2012). Generating Ciphertext Using Systems of Equations: An Asymmetric Key Approach. Int. J. Pure Appl. Sci. Technol, 8(2), 47-53.
1314
Bandyopadhyay, S. K., & Roy, S. (2012). Detection of sharp contour of the element of the WBC and segmentation of two leading elements like nucleus and cytoplasm. Int J Eng Res Appl (IJERA), 2(1), 545-551.
1315
Crysdian, C., & Abdullah, A. H. (2012). The Application of Multi Gradient Operators to Enhance Watershed Transform for Generic Medical Segmentation. Journal of Next Generation Information Technology, 3(4).
1316
Ghate, D. A., & Jadhav, C. (2012). Automatic Detection of Malaria Parasite from Blood Images. International Journal of Computer Science & Applications (TIJCSA), 1(3).
1317
Wahyuningrum, R. T., & Indrawan, A. K. (2012). a hybrid automatic method for parasite detection and identification of plasmodium falciparum in thin blood images. International Journal of Academic Research, 4(6).
1318
Tuomela, M. J. 1. Tietoturvallisuuden mittaaminen.
1319
Rebolledo, M. D. Optimización de la ruta de cumplimiento de un estándar de Seguridad de la Información.
1320
Chitla, A., & Mohan, M. C. (2012). Authentication of Images through Lossless Watermarking (LWM) Technique with the aid of Elliptic Curve Cryptography (ECC). International Journal of Computer Applications, 57(6).
1321
Rashed, A. N. Z. (2012). International Journal of Engineering & Science Research.
1322
Vongurai, N., & Phimoltares, S. (2012, September). Frequency-Based Steganography Using 32x32 Interpolated Quantization Table and Discrete Cosine Transform. In Computational Intelligence, Modelling and Simulation (CIMSiM), 2012 Fourth International Conference on (pp. 249-253). IEEE.
1323
Nithyanandam, P., & Ravichandran, T. (2012). Geometrical Rotation Addressed Steganography Technique using Matrix Embedding and Huffman Encoding. European Journal of Scientific Research, 87(1), 31-45.
1324
Pandian, N., & Thangavel, R. (2012). Gray Coded Grayscale Image Steganoraphy using Hufman Encoding. International Journal of Image Processing (IJIP), 6(5), 334.
1325
Pourahmad, S., Azad, M., Paydar, S., & Reza, H. (2012). Prediction of malignancy in suspected thyroid tumour patients by three different methods of classification in data mining. In First International Conference on advanced information technologies and applications (pp. 1-8).
1326
Kaleeswari, N., & Baskaran, K. (2012). Secure Energy Efficient Multipath Routing Scheme for Data Gathering in WSNs. European Journal of Scientific Research, 91(4), 505-514.
1327
Jain, P., Trivedi, V. K., & LNCT, B. (2012). A Novel Technique for Data Hiding in Audio by Using DWTs. International Journal of Computational Engineering and Management, 15(4), 2230-7893.
1328
Nadaf, R., & Desai, V. (2012). Hardware Implementation of Modified AES with Key Dependent Dynamic S-Box. IEEE ICARET.
1329
Al-Dallah, R. A., Al-Anani, A. M., Al-Khalid, R. I., & Massadeh, S. A. (2012). An Efficient technique for data hiding in audio signals. American Academic & Scholarly Research Journal, 4(5), 1.
1330
Chouhan, K., & Ravi, S. Hardware Implementation of Polarization Encryption (EP) Based Data Security in Network.
1331
Tamimi, S. Performance Evaluation of Computational Models Based FEM.
1332
Uzunov, A. V., Fernandez, E. B., & Falkner, K. (2012). Engineering Security into Distributed Systems: A Survey of Methodologies. J. UCS, 18(20), 2920-3006.
1333
Wenerstrom, B., Ragade, R., & Kantardzic, M. (2012).ReClose Fuzz: Improved Automatic Summary Generation using Fuzzy Sets. ICSIIT 2012, 8.
1334
Mittal, H., Sharma, M., & Mittal, J. P. (2012, January). Analysis and modelling of websites quality using fuzzy technique. In 2012 Second International Conference on Advanced Computing & Communication Technologies (pp. 10-15). IEEE.
1335
Al-Jamimi, H. A., & Ahmed, M. (2012, June). Prediction of software maintainability using fuzzy logic. In Software Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on (pp. 702-705). IEEE.
1336
Azath, H., & Wahidabanu, R. S. D. (2012). Efficient effort estimation system viz. function points and quality assurance coverage. Software, IET, 6(4), 335-341.
1337
Harchay, a., cheniti-belcadhi, l., & braham, r. (2012, june). Towards a formal description of mobile personalized assessment. In communications and information technology (iccit), 2012 international conference on (pp. 270-275). Ieee.
1338
Harchay, a., cheniti-belcadhi, l., & braham, r. (2012, june). A model driven infrastructure for context-awareness mobile assessment personalization. In trust, security and privacy in computing and communications (trustcom), 2012 ieee 11th international conference on (pp. 1676-1683). Ieee.
1339
Pereira, F. J. R., de Alcântara Correia, A., da Silva, C. C., Neto, E. D. A. L., & de Moraes, R. M. (2012). Condições de Acesso às Pessoas com Deficiência em Instituições de Ensino Enfermagem: Utilização de Redes Neurais Artificiais como Suporte à Decisão. Revista Brasileira de Ciências da Saúde, 16(2), 143-148.
1340
Thapar, S. S., Singh, P., & Rani, S. (2012). Challenges to Development of Standard Software Quality Model. International Journal of Computer Applications, 49(10).
1341
ANT, L. B. U. F. B. (2012).International Journal of Engineering & Science Research.
1342
Sampath, S., Nanjesh, B. R., & Pramod, H. B. (2012). Evaluation of Parallel Application's Performance Dependency on RAM using Parallel Virtual Machine. International Journal of Computer Science & Communication Networks, 2(6), 641.
1343
Mandal, P. C. (2012). Modern Steganographic technique: A survey. International Journal of Computer Science & Engineering Technology (IJCSET), 3(9), 444-448.
1344
Rao, D. S., & Parihar, P. S. Embedding Approach of Audio Data in RGB Images Using Circle Equation.
1345
Goel, M., & Chaudhari, m. secured data hiding by using extended visual cryptography.
1346
Singh, S., Gill, N., & Kaur, G. Identical Frames Based Video Steganography.
1347
Goel, M., & Chaudhari, M. M. A Novel Approach for Data Hiding by integrating Steganography & Extended Visual Cryptography.
1348
Hamza, Y. A. Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet Transform.
1349
Hamid, N., Yahya, A., Ahmad, B., Al-Qershi, O. M., Najim, D., & Kanaan, L. (2012). Enhancing the Robustness of Digital Image Steganography Using ECC and Redundancy.
1350
Shyamala, G., Jeya, I. J. S., & Revathi, M. Secure and Reliable Watermarking in Relational Databases.
1351
Subha, M., & Vanithaasri, S. (2012). A study on authenticated admittance of ATM Clients using biometrics based cryptosystem. International Journal of Advances in Engineering & Technology, 4(2), 456-463.
1352
Babatunde, I. G., Charles, A. O., & Olatubosun, O. (2012). A Block Processing Approach to Fingerprint Ridge-Orientation Estimation. Computer Technology and Application, 3(6).
1353
Babatunde, I. G., Charles, A. O., & Olatunbosun, O. A Mathematical Modeling Method for Fingerprint Ridge Segmentation and Normalization.
1354
Akinyokun, o. c. strategy for software knowledge incubation and skill development for nigerian students.
1355
Iwasokun, G. B., Akinyokun, O. C., & Dehinbo, O. J. Minutiae Inter-Distance Measure for Fingerprint Matching.
1356
Pradhan, M. P., & Ghose, M. K. (2012). automatic techniques for identification of minutiae’s in morphology study of terrain. European Scientific Journal, 8(16).
1357
Bhele, S. G., & Mankar, V. H. (2012). A review paper on face recognition techniques. International Journal of Advanced Research in Computer Engineering & Technology, 1(8), 339-346.
1358
Jung, M. K., & Kim, J. K. (2012). The Intelligent Determination Model of Audience Emotion for Implementing Personalized Exhibition. Journal of Intelligence and Information Systems, 18(1), 39-57.
1359
Das, A. (2012, December). Face recognition in reduced Eigen-plane. In Communications, Devices and Intelligent Systems (CODIS), 2012 International Conference on (pp. 620-623). IEEE.
1360
Jeongmingyu, and Kim Jae-kyung. (2012). Intelligent audience feeling judged models for personalized exhibition service implementation. Intelligence and Information Systems, 18 (1), 39-57.
1361
Javaid, A. Y., Sun, W., Devabhaktuni, V. K., & Alam, M. (2012, November). Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 585-590). IEEE.
1362
Hsu, C. L., & Lu, C. F. (2012). A security and privacy preserving e-prescription system based on smart cards. Journal of medical systems, 36(6), 3637-3647.
1363
Aboud, S., & Yousef, S. (2012). a practical proxy signature scheme. International Journal of Digital Information and Wireless Communications (IJDIWC), 2(4), 27-36.
1364
Philosophiae, d. (2012). mlungisi sizwe duma (doctoral dissertation, university of johannesburg).
1365
Lernatovych, DA, & Kondratenko, Y. (2012). Identification by image element comparisons. Artificial Intelligence.
1366
Tanner, A., Dampier, D., & Thompson, J. (2012, November). On developing a conceptual modeling report management tool for digital forensic investigations. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 445-450). IEEE.
1367
Al-Fedaghi, S., & Al-Babtain, B. (2012). Modeling the forensics process. Int. J. Security Appl, 6(4).
1368
Buang, M. F. M., & Daud, S. M. (2012, May). A web-based KM system for digital forensics-knowledge sharing capability. In Multimedia Computing and Systems (ICMCS), 2012 International Conference on (pp. 528-533). IEEE.
1369
Weiner, M. D., Puniello, O. T., Noland, R. B., Ciemnecki, D., & Turakhia, C. (2012). Consider the non-adopter: Developing a prediction model for the adoption of household-level broadband access. Socio-economic planning sciences, 46(3), 183-193.
1370
Ayinde, L. O., & Echchabi, A. (2012). Perception and adoption of Islamic insurance in Malaysia: An empirical study. World Applied Sciences Journal, 20(3), 407-415.
1371
Gimgeunhyeong, & yunsanghun. (2012). Comparative Analysis of Impact Factors and services by type of SNS user satisfaction. Internet e-commerce study, 12 (1), 125-143.
1372
Zhai The Swiss (2012) from communities, virtual communities to social networks: Changes of social theory Lanzhou University: Social Sciences, 40 (5), 7-7.
1373
Yatigammana, M. R. K. N., Johar, M. G. M., & Gunawardhana, c. postgraduate students’perceived e learning acceptance: framework of extended technology acceptance model.
1374
Haigh, C., & Costa, C. (2012). Reconsidering the role of participatory media in nursing research and knowledge dissemination. Journal of Research in Nursing, 17(6), 598-607.
1375
Yaghmaei, F., & Shirazi, M. (2012). Assessment of Users’ Intention to Use Hospital Information Systems Based on Diffusion of Innovation Theory in Razi Hospital of Ahvaz. Journal of Health Administration, 14(46), 11-20.
1376
Liu, Y. (2012). Knowledge, Persuasion, and Decision: Examining Predictors of Microblogging’s Diffusion in China.
1377
HONG, C. W. (2012). factors affecting undergraduates’involvement in entrepreneurial activities through online social networks (malaysia context) (doctoral dissertation, universiti tunku abdul rahman).
1378
Banmeke, T. O. A., & Oose, M. O. (2012). Assessment of the Use of Social Network Tools (SNTs) by Agriculture Researchers in South West Nigeria. Communications of the IIMA, 12(3), 35.
1379
Beech, G. M. (2012). Risk-based Aviation Security Diffusion and Acceptance (Doctoral dissertation, Monterey, California. Naval Postgraduate School).
1380
Jindrichovská, I., & Purcarea, I. diffusion of innovation through social networks: example of social innovations.
1381
Yun, S. H., Kim, K. H., & Oh, S. R. (2012). Structure Modeling on Factors Influencing the User Satisfaction of Social Network Services by Mediating the Moderator of the Service Types in SNS. The Journal of Information Systems, 21(3), 23-44.
1382
Yaghmaei, F., & Shiraz. (2012). Studying the tendency of users to use these systems, hospital information system based on innovation diffusion model Razi hospital. Health Management, 14 (46), 11-20.
1383
Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012, January). DoS attacks in mobile ad hoc networks: A survey. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 535-541). IEEE.
1384
Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012, January). A novel approach for grayhole and blackhole attacks in mobile ad hoc networks. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 556-560). IEEE.
1385
Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1-12.
1386
Shin, S. Y., & Halim, E. H. (2012, October). Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation. In ICT Convergence (ICTC), 2012 International Conference on (pp. 781-786). IEEE.
1387
Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in aodv based manets. In Advances in Communication, Network, and Computing (pp. 60-67). Springer Berlin Heidelberg.
1388
Jhaveri, R. H., Patel, A. D., & Dangarwala, K. J. (2012, December). Comprehensive study of various DoS attacks and defense approaches in MANETs. In Emerging Trends in Science, Engineering and Technology (INCOSET), 2012 International Conference on (pp. 25-31). IEEE.
1389
Kartheesn, L., & Srivatsa, S. K. (2012). A policy based scheme for combined data security in mobile ad hoc networks. Journal of Computer Science, 8(8), 1397.
1390
Tiwari, A., & Verma, N. A Novel Scheme for Intrusion Detection & Anticipation of Black Hole & Gray Hole Attacks In AODV Based MANET using ZED.
1391
Aarti, P. R. Nav view search.
1392
Ahangari, S., Modiri, N., & Zadeh, A. K. (2012). A New Hybrid Model Security Management in Wireless Networks. International Proceedings of Computer Science and Information Technology, 57, 30.
1393
Bhatnagar, R., & Shankar, U. (2012). The proposal of hybrid intrusion detection for defence of sync flood attack in wireless sensor network. International Journal of Computer Science & Engineering Survey, 3(2), 31-38.
1394
Ahrabi, A. A. A., Feyzi, K., Orang, Z. A., Bahrbegi, H., Safarzadeh, E., Azimi, A., & Ahrabi, A. (2012). Using Learning Vector Quantization in Alert Management of Intrusion Detection System. International Journal of Computer Science and Security, 6(2), 128.
1395
Bhatti, D. G., Virparia, P. V., & Patel, B. (2012). Conceptual Framework for Soft Computing based Intrusion Detection to Reduce False Positive Rate. International Journal of Computer Applications, 44(13), 1-3.
1396
Orang, Z. A., Moradpour, E., Navin, A. H., Ahrabim, A. A. A., & Mirnia, M. K. (2012). Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems. International Journal of Computer Network and Information Security (IJCNIS), 4(11), 32.
1397
Kane, A. M. (2012). On the use of continued fractions for mutual authentication. International Journal of Information Security Science, 1(3), 88-99.
1398
Tanil, Ç. (2012, March). Improved heuristic and evolutionary methods for tactical missile mission planning. In Aerospace Conference, 2012 IEEE (pp. 1-8). IEEE.
1399
Pathania, S., & Saini, J. S. Development of a New Class of Cost Effective and Fault Tolerant Multi Stage Interconnection Network for Parallel Computing System.
1400
Behdad, M., Barone, L., Bennamoun, M., & French, T. (2012). Nature-inspired techniques in the context of fraud detection. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 42(6), 1273-1290.
1401
Mostafavi, M. A., Moghanjoughi, A. A., & Mousavi, H. (2012). A Review and Performance Analysis of Reactive and Proactive Routing Protocols on MANET. Network and Communication Technologies, 1(2), 48.
1402
Guo, J., Han, C., Orlik, P., Zhang, J., & Ishibashi, K. (2012). Loop-free routing in low-power and lossy networks. In SENSORCOMM 2012, The Sixth International Conference on Sensor Technologies and Applications (pp. 59-66).
1403
Ramassamy, C., Fouchal, H., & Hunel, P. (2012, August). Impact of transmission range in 802.15. 4 with usual routing protocols. In Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International (pp. 728-733). IEEE.
1404
Nayyar, A. (2012, January). Simulation Based Evaluation of Reactive Routing Protocol for MANET. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 561-568). IEEE.
1405
Ramassamy, C., Fouchal, H., & Hunel, P. (2012, June). Impact of Application Layer over Wireless Sensor Networks. In IICS (pp. 130-141).
1406
Tirkey, N. U., Nitin, N., Agrawal, N., & Jaiswal, A. K. (2012, October). Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization. In International Journal of Engineering Research and Technology (Vol. 1, No. 8 (October-2012)). ESRSA Publications.
1407
Parthiban, S., Amuthan, A., Shanmugam, N., & Joseph, K. S. (2012). NEIGHBOR ATTACK AND DETECTION MECHANISM IN MOBILE AD-HOC NETWORKS. Advanced Computing, 3(2), 57.
1408
Al-Hujailan, H., Al-Rodhaan, M., & Al-Dhelaan, A. (2012). A Cooperative Intrusion Respond for Clustered MANETs. Journal of Information Assurance & Security, 7(2).
1409
Kumar, N., & Kim, J. (2012). Performance Analysis of Zone Based Routing by Varying Radius of Zone Using Ant Colony in MANET. In Information Technology Convergence, Secure and Trust Computing, and Data Management (pp. 215-223). Springer Netherlands.
1410
Kavitha, G., & Sundararajan, J. (2012). An Intelligent Routing Protocol for MANETs using Radial Basis Function Neural Network. European Journal of Scientific Research, 89(3), 342-349.
1411
Lin, D., & Meng, X. (2012). Optimization and Realization of Ad Hoc On-Demand Distance Vector Routing Based on NS2. In Information Computing and Applications (pp. 531-537). Springer Berlin Heidelberg.
1412
Zade, A. V., & Shandilya, V. K. (2012). Network Simulation Based Parametric Analysis of AODV Protocol for Wireless Mobile Ad-hoc Network. International Journal of Managment, IT and Engineering, 2(6), 280-290.
1413
Njeh, F., & Yang, B. (2012, January). A SECURE CLOUD-ENABLED WIRELESS SENSOR NETWORK PLATFORM. In Proceedings of the International Conference on Grid Computing and Applications (GCA) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
1414
Ramassamy, C. (2012). Analyse des protocoles des Réseaux de capteurs sans-fil (Doctoral dissertation, Université de Paris 13).
1415
Anh, N. T. L., Kim, Y. C., & Lee, G. S. (2012, February). Morphological gradient applied to new active contour model for color image segmentation. In Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication (p. 21). ACM.
1416
García-Gonzalo, E., & Fernández-Martínez, J. L. (2012). A brief historical review of particle swarm optimization (PSO). Journal of Bioinformatics and Intelligent Control, 1(1), 3-16.
1417
Malik, R. F., Rahman, T. A., Ngah, R., Mohd, S. Z., & Hashim, H. (2012). The new multipoint relays selection in OLSR using particle swarm optimization. TELKOMNIKA (Telecommunication Computing Electronics and Control), 10(2), 343-352.
1418
Ismail, A., & Engelbrecht, A. P. (2012). Self-adaptive particle swarm optimization. In Simulated Evolution and Learning (pp. 228-237). Springer Berlin Heidelberg.
1419
Uma, S. M., Gandhi, K. R., Kirubakaran, E., & Kirubakaran, E. (2012). A hybrid PSO with dynamic inertia weight and GA approach for discovering classification rule in data mining. International Journal of Computer Applications, 40(17).
1420
Yavari, S., Zoej, M. J. V., Mokhtarzade, M., & Mohammadzadeh, A. (2012). Comparison of Particle Swarm Optimization and Genetic Algorithm in Rational Function Model Optimization. International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 39, B1.
1421
Chen, R. M., Wang, C. T., Wang, C. T., & Hsu, C. C. (2012, December). An exploration and exploitation search control scheme for permutation flow shop problem. In Computing and Convergence Technology (ICCCT), 2012 7th International Conference on (pp. 1298-1303). IEEE.
1422
Babu, K. R., & Sunitha, K. V. N. (2012). Image de-noising and enhancement for salt and pepper noise using improved median filter-morphological operations. In Advances in Communication, Network, and Computing (pp. 7-14). Springer Berlin Heidelberg.
1423
Karthikeyan, T., & Geetha, J. (2012). A Study and Critical Survey on Service Reusability Metrics. International Journal of Information Technology and Computer Science (IJITCS), 4(5), 25.El-Sayed, A., & ElHelw, M. (2012, June). Distributed component-based framework for unmanned air vehicle systems. In Information and Automation (ICIA), 2012 International
1424
Trivedi, P., & Kumar, R. (2012). Software metrics to estimate software quality using software component reusability. IJCSI International Journal of Computer Science Issues, 9(2).
1425
Basha, T. G., Prasad, M. G., & Sridevi, P. V. (2012). Beam forming in smart antenna with improved gain and suppressed interference using genetic algorithm. Central European Journal of Computer Science, 2(1), 33-46.
1426
Kisku, B., & Datta, R. (2012, December). An energy efficient scheduling scheme for intrusion detection system in mobile ad-hoc networks. In Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on (pp. 1-6). IEEE.
1427
Singh, O., & Singh, J. (2012). Comparative Study of Various Distributed Intrusion Detection Systems for WLAN.
1428
Srinivasan, S., & Alampalayam, S. P. (2012). Intrusion Detection Algorithm for MANET. Privacy Solutions and Security Frameworks in Information Protection, 163.
1429
Sathya, R., & Latha, P. (2012). An Effective Security Approach for MANET using Detection Algorithm. Wireless Communication, 4(12), 702-707.
1430
Kundu, A., Kundu, T. K., & Mukhopadhyay, I. Survey on Intrusion Detection and Prevention System: A MANET Perspective.
1431
Jung, B. K., Wang, W., Li, Z., Son, S. H., & Kim, J. Y. (2012, October). A sectorized object matching approach for breast magnetic resonance image similarity study. In Proceedings of the 2012 ACM Research in Applied Computation Symposium (pp. 172-175). ACM.
1432
Dhanalakshmi, M., Sriraam, N., Ramya, G., Bhargavi, N., & Tamizhtennagaarasi, V. (2012). Computer aided diagnosis for enteric lesions in endoscopic images using anfis. International Journal of Wisdom Based Computing, 2(1).
1433
Rahman, M. (2012). Any File Encryption by Translating ASCII Value of Characters. International Journal of Advanced Research in Computer Science, 3(2).
1434
EL-ARABY, W. S. M. S. (2012). Video Watermarking Implementation Based on fpga (doctoral dissertation, arab academy for science).
1435
Masum, M. R. (2012). Any File Encryption by Translating ASCII Value of Characters. International Journal of Advanced Research in Computer Science, 3(2).
1436
ABEBAYEHU, S. (2012). Amharic-English Script Identification in Real-Life Document Images (Doctoral dissertation, aau).
1437
Boon, L. K., Chein, T. S., & Yittjia, C. user acceptance of bancassurance in malaysia.
1438
Božic, T., & Relja, R. (2012). The new culture of communication via mobile phones among young people. Kultura, (136), 85-107.
1439
Lacey, T. H., Mills, R. F., Mullins, B. E., Raines, R. A., Oxley, M. E., & Rogers, S. K. (2012). RIPsec–Using reputation-based multilayer security to protect MANETs. computers & security, 31(1), 122-136.
1440
Ochola, E. O., Eloff, M. M., & van der Poll, J. A. (2012). Mobile Ad-hoc Network Security Challenges under AODV Routing Protocol. In International Network Conference (INC 2012) (pp. 113-122).
1441
Sharma, P. K. EXTENDED DYNAMIC SOURCE ROUTING PROTOCOL FOR AD HOC NETWORK. Indian Journal of Computer Science and Engineering (IJCSE) ISSN, 0976-5166.
1442
Khari, M. (2012). Mobile ad hoc netwoks security attacks and secured routing protocols: A survey. In Advances in Computer Science and Information Technology. Networks and Communications (pp. 119-124). Springer Berlin Heidelberg.
1443
Shiral, J. V., & Mahajan, B. N. (2012). A Review on-Comparative Study of Issues in Cellular, Sensor and Adhoc Networks. CCSEA, SEA, CLOUD, DKMP, CS & IT, 5, 199-205.
1444
Mpofu, P. G. Towards More Realistic Encryption Systems for Wireless Mobile Ad Hoc Networks.
1445
Andrews, C., & Kakon, J. F. (2012). Impacts and Minimization of Interference in Adhoc Network (Doctoral dissertation, East West University).
1446
Shiral, J. V. A Comparative Study on Cellular, Sensor and Adhoc Networks.
1447
Sachdeva, m., sharma, a., & spiet, s. impact of wormhole on adhoc routing protocol.
1448
Raju, R., Devakumaran, K., Balasubramanian, A., & Balan, G. (2012). A composite model that overwhelms outliers to anticipate the stages in renal disorder. Computer Science & Engineering, 2(3), 1.
1449
Fook, C. Y., Hariharan, M., Yaacob, S., & Ah, A. (2012, March). Malay speech recognition in normal and noise condition. In Signal Processing and its Applications (CSPA), 2012 IEEE 8th International Colloquium on (pp. 409-412). IEEE.
1450
Han, G., Jiang, J., Shu, L., Xu, Y., & Wang, F. (2012). Localization algorithms of underwater wireless sensor networks: A survey. Sensors, 12(2), 2026-2061.
1451
Kebkal, O., Kebkal, K., & Bannasch, R. (2012, May). Long-baseline Hydro-acoustic positioning using D-MAC communication protocol. In oceans, 2012-Yeosu (pp. 1-7). IEEE.
1452
Wang, S., & Hu, H. (2012). Wireless sensor networks for underwater localization: A survey. School of Computer Science and Electronic Engineering, University of Essex, Tech. Rep.
1453
Debont, M., Jamshaid, K., Shihada, B., & Ho, P. H. (2012, August). Event localization in underwater wireless sensor networks using Monitoring Courses. In Communications in China (ICCC), 2012 1st IEEE International Conference on (pp. 769-774). IEEE.
1454
Li Zuopeng , Caishao Bin , Zhang Jing , high Zhenguo , & Zhao Jing . ( 2012 ) . Survey of underwater acoustic sensor network node localization . Computer Systems , 33 ( 3 ) , 442-447.
1455
Bucure?ti, U. P., & si Calculatoare, F. D. A. A Practical Analysis of Intrusion Detection Techniques on a Linux Environment.
1456
Ruse, L. C. A Practical Analysis of Intrusion Detection Techniques on a Linux Environment.
1457
Awodele, O., Onuiri, E. E., & Okolie, S. O. Vulnerabilities in Network Infrastructures and Prevention/Containment Measures.
1458
Swain, G., & Lenka, S. K. (2012). A Technique for secret communication using a new block cipher with dynamic steganography. International Journal of Security and Its Applications, 6(2), 1-12.
1459
Pradhan, A., Sharma, D. S., & Swain, G. (2012). Variable rate steganography in digital images using two, three and four neighbor pixels. Indian Journal of Computer Science and Engineering, 3(3), 457-63.
1460
Swain, G., & Lanka, S. K. (2012). A quick review of network security and steganography. International Journal of Electronics and Computer Science Engineering, 1(2), 426-435.
1461
Swain, G., & Lenka, S. K. (2012). Application of a large key cipher in image steganography by exploring the darkest and brightest pixels. Int J Comput Sci Comm, 3(1), 49-53.
1462
Sonaniya, A. K., & Rai, R. K. (2012). A Review on Comparison between Different Image Steganography Methods.
1463
Arndt, D. J. (2012). An Investigation of Using Machine Learning with Distribution Based Flow Features for Classifying SSL Encrypted Network Traffic.
1464
Wangjian Ling, Li Wenbin, & Jia Chunsheng. (2012). Based on Data Mining acupuncture and moxibustion literature data warehouse building. Acupuncture study, 37 (1), 67-71.
1465
Nayak, K., Deccaraman, M., & Nayak, V. (2012). Formulating a Mathematical Model for the E-Nose Application through Genetic Algorithm (GA). International Journal of Computer Applications, 51(1), 7-13.
1466
Kumar, K. D., & Kumar, K. P. (2012). Performance Evolutions of All Positive and Negative Association Rules.
1467
Poornamala, K., & Lawrance, R. a general survey on frequent pattern mining using genetic algorithm.
1468
Poornamala, K., & Lawrance, R. (2012). A Frequent Pattern Tree Algorithm for Mining Association Rule Using Genetic Algorithm. Data Mining and Knowledge Engineering, 4(7), 357-360.
1469
Kellner, A. (2012). A Multi-objective Ant Colony Optimisation-based Routing Approach for Wireless Sensor Networks Incorporating Trust (Doctoral dissertation, Niedersächsische Staats-und Universitätsbibliothek Göttingen).
1470
Mukherjee, D., & Acharyya, S. (2012, November). ACO variants in solving Mobile Ad hoc Network routing. In Emerging Applications of Information Technology (EAIT), 2012 Third International Conference on (pp. 366-371). IEEE.
1471
Bhattacherjee, V., & Giri, D. (2012). a swarm inspired multipath data transmission with congestion control in manets using probabilistic approach. international journal of wireless & mobile networks, 4(4), 109.
1472
Joardar, S., Bhattacherjee, V., & Giri, D. (2012). A swarm inspired probabilistic path selection with congestion control in MANETs. In Advances in Computer Science, Engineering & Applications (pp. 617-626). Springer Berlin Heidelberg.
1473
Baboo, S. S., & Narasimhan, B. (2012). Genetic Algorithm Based Congestion Aware Routing Protocol (GA-CARP) for Mobile Ad Hoc Networks. Procedia Technology, 4, 177-181.
1474
Wankhade, S. B., & Ali, M. S. (2012). Recent trends in ANT based routing protocols for MANET. International Journal of Advances in Engineering & Technology,, ISSN, 2231-1963.
1475
Sensarma, D., & Majumder, K. (2012). A Comparative Analysis of the Ant Based Systems for QoS Routing in MANET. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 485-496). Springer Berlin Heidelberg.
1476
Brown, S., Lam, R., Prasad, S., Ramasubramanian, S., & Slauson, J. (2012). Honeypots in the cloud. University of Wisconsin-Madison.
1477
Zhang Quan . ( 2012 ) . In the network behavior to PSO + K-means of detection mechanism botnets . The dissertation cause Datong University Department of Business Administration , 1-69.
1478
Shukla, D., Verma, K., & Gangele, S. (2012). Least Square based Curve Fitting in Internet Access Traffic Sharing in Two Operator Environment. International Journal of Computer Applications, 43(12), 26-32.
1479
Shukla, D., Verma, K., & Gangele, S. (2012). Curve Fitting Approximation In Internet Traffic Distribution In Computer Network In Two Market Environment. International Journal of Computer Science and Information Security, 10(4), 71.
1480
Stergiou, E., & Garofalakis, J. (2012). Performance estimation of banyan semi layer networks with drop resolution mechanism. Journal of Network and Computer Applications, 35(1), 287-294.
1481
Khalatbari, A., Jenab, K., Laskarzewska, B., Mehrvar, M., Goel, A., Mishra, R. S., ... & Lan, H. Ibrahim salem saeh, A. Khairuddin. Anesthesiology, 12.
1482
Priyadarsini, S. (2012). TSRD-RL algorithm based Secured Route Discovery for MANET with improved Route Lifetime. International Journal of Electronics and Electrical Engineering, 1(1), 52-67.
1483
Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2012). Energy efficient administrator based secure routing in MANET. In Advances in Computer Science, Engineering & Applications (pp. 659-672). Springer Berlin Heidelberg.
1484
Dadhania, P., & Patel, S. (2012). Comparative performance analysis of AODV and DSR routing protocols in MANET.
1485
Vinod, B. (2012). Responding to an Attack in Sensor Networks (Doctoral dissertation, Oklahoma State University).
1486
Munjal, K., Verma, S., & Bakshi, A. (2012). Cooperative black hole node detection by modifying AODV. Int. J. Manag. IT Eng.(IJMIE), 2, 484-501.
1487
Min, S. G., Park, Y. H., Park, Y. H., & Moon, S. J. (2012). Secure routing protocol in cluster-based ad hoc networks. The Journal of Korean Institute of Communications and Information Sciences, 37(12), 1256-1262.
1488
Sathya, R., & Latha, P. (2012). An Effective Security Approach for MANET using Detection Algorithm. Wireless Communication, 4(12), 702-707.
1489
Pal, A., & Choudhury, P. (2012). Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph. Mapana-Journal of Sciences, 11(4), 65-76.
1490
Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2012). A Novel Energy Efficient and Administrator Based Secured Routing in MANET. International Journal of Network Security & Its Applications, 4(4), 73.
1491
Sathiyakumar, C., & Duraiswamy, K. (2012). A Secured Key Model for Efficient Node Clustering Based on Reputation and Ranking Model. European Journal of Scientific Research, 74(3), 433-439.
1492
KALOKI, M. P. (2012). SCHOOL OF COMPUTING AND INFORMATICS MASTERS DEGREE OF SCIENCE IN COMPUTER SCIENCE (Doctoral dissertation, The University of Nairobi).
1493
Minseonggeun , bakyohan , Young Ho Park , & Cryptology . (2012) . Cluster -based security in an ad hoc routing protocol in a network environment.The Journal of Korea Information and Communications Society , 37 ( 12), 1256-1262.
1494
Chan, G. Y., Lee, C. S., & Heng, S. H. (2012). Policy-enhanced ANFIS model to counter SOAP-related attacks. Knowledge-Based Systems, 35, 64-76.
1495
Naoum, R. S., & Al-Sultani, Z. N. (2012). Learning Vector Quantization (LVQ) and k-Nearest Neighbor for Intrusion Classification. World of Computer Science and Information Technology Journal (WCSIT), 2(3), 105-109.
1496
Choi, B. H., Choi, S. K., & Cho, K. S. (2012). Anomaly Detection Scheme of Web-based attacks by applying HMM to HTTP Outbound Traffic.
1497
Hameed, S. M., & Sulaiman, S. S. (2012). Intrusion Detection Using a Mixed Features Fuzzy Clustering Algorithm. Iraq Journal of Science (IJS), 53(2), 427-434.
1498
Chandrashekar, A. M., & Raghuveer, K. (2012, October). Fusion of multiple data mining techniques for effective network intrusion detection: a contemporary approach. In Proceedings of the Fifth International Conference on Security of Information and Networks (pp. 178-182). ACM.
1499
Dharmar, V., Parveen, M. A. R., & Bhuvaneswaran, R. S. Black Hole Detection in Adhoc Networks using Neural Networks. Dear Scholars, 29.
1500
Al-Sultani, Z. N. M. A. (2012). an enhanced resilient backpropagation artificial neural network for intrusion detection system (doctoral dissertation, middle east university).
1501
Kode, S. R. (2012). A relational interval tree for efficient insertion and searching of transient mobile data.
1502
Mocanu, E. M., Florea, M., Andreica, M. I., & Tapus, N. (2012, March). Cloud computing—task scheduling based on genetic algorithms. In Systems Conference (SysCon), 2012 IEEE International (pp. 1-6). IEEE.
1503
Delavar, A. G., Boroujeni, A. R. K., & Bayrampoor, J. (2012). A Balanced Scheduling Algorithm with Fault Tolerant and Task Migration based on Primary Static Mapping (PSM) in Grid. International Journal of Computer Applications, 52(8).
1504
Singh, S. N., Thakur, A. K., & Kumar, N. (2012). International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net. development, 13, 19.
1505
Gao, Y., Gu, X., Yang, Q., & Ke, H. Y. (2012). Improved Genetic Scheduling Algorithm in Heterogeneous System. Jisuanji Gongcheng/ Computer Engineering, 38(19).
1506
Remmersmann, T., Schade, U., & Schlick, C. (2012, October). Supervisory control of multi-robot systems by disaggregation and scheduling of quasi-natural language commands. In Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on (pp. 315-320). IEEE.
1507
Strickland, S., & Sanders, T. A Genetic Algorithm for Task Scheduling.
1508
Plateau, Gu Xing, Yang Juan, & Ke Yang Ho. (2012). Heterogeneous systems improved genetic scheduling algorithm. Computer Engineering, 38 (19), 142-146.
1509
Mahalle, M. S. D., & Shah, D. K. Semantic Based Approach for Document Clustering. Journal of Sci., Engg. & Tech. Mgt. Vol 4 (1), MPSTME, Mumbai. July 2012.
1510
Khandare, S. S., & Malode, S. N. International Journal of Science Innovations and Discoveries An International peer.
1511
Jiang, F. Deriving Topics and Opinions from Microblog.
1512
Mahalle, M. S. D., & Shah, K. Document Clustering by using Semantics.
1513
Gutema, G. (2012). Afaan Oromo Text Retrieval System (Doctoral dissertation, AAU).
1514
Mohamed, V. Verifying ODP Computational Behavioral Specification by using B-Method.
1515
Farham Mohamed, M., Lazim, Y. M., & Mohamed, S. B. Managing Multimedia Data: A Temporal-Based Approach.
1516
Islam, G., & Qureshi, M. A. (2012). A Framework for Security Requirements Elicitation.
1517
Alorfi, A. S. M. (2012). Web Based Online Volunteer Trainer System (OVTRS) (Doctoral dissertation, Universiti Utara Malaysia).
1518
Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2011). Fidelity Index Based on Demand (FBOD) Secure Routing in Mobile Ad Hoc Network. In Advances in Parallel Distributed Computing (pp. 615-627). Springer Berlin Heidelberg.
1519
Y. C. Lee, Y. Hsieh and P. Lee, “Improvement on the Password Authenticated Three-Party Key Agreement Protocol”, Journal of Computational Information Systems, 7(1), pp. 42-48, 2011
1520
D. Shikha and B.V. Dhandra, “Abnormality Detection in Endoscopic Images of Throat Cancer by Morphological Operations ”, Indian Stream Research Journal, 1(4), pp. 1-14, 2011.
1521
2. R.Dhanalakshmi and Dr.C.Chellappan , “Secure Email – Ensuring CIA (Confidentiality, Integrity and Authentication) and Privacy for Organizations”, in International Conference on Environment, Economics, Energy, Devices, Systems, Communications, Computers, Mathematics, University Center Drobeta Turnu Severin, Romania, October 27-29, 2011.
1522
Ms. Preetee, K. Karmore, Ms. Sonali and T. Bodkhe, “A Survey on Intrusion in Ad Hoc Networks and its Detection Measures”, International Journal on Computer Science and Engineering (IJCSE), 3 (5), pp. 1896- 1903, 2011.
1523
Mrs. F. Suthar, Mrs. U. PATEL, Mrs. A. K. PATEL, “To Study, Analysis and Issues of Wireless Adhoc Network”. Journal of Information, Knowledge and Research in Computer Science and Applications, 1(2), pp. 32-37, 2011.
1524
E. O. Ochola, M. M. Eloff, (2011). “A Review of Black Hole Attack on AODV Routing in MANET”, Presented at Information Security South Africa Conference, Johannesburg, South Africa, Aug. 15-17, 2011.
1525
W. Lane and C. Manner, “The Impact of Personality Traits on Smartphone Ownership and Use”, International Journal of Business and Social Science, 2(17), pp.. 22-28, 2011.
1526
Kawas, S. Al, (2011), “Textisms. (c2011)”.
1527
A. Kumar, R. Kumar and P. S. GROVER, “Unified Cohesion Measures for Aspect-Oriented Systems”, International Journal of Software Engineering and Knowledge Engineering (IJSEKE), 21(1), pp. 143-163, 2011.
1528
V. Thilagavathe and Dr. K Duraiswamy. “Cross Layer Based Congestion Control Technique for Reliable and Energy Aware Routing in MANET”. International Journal of Computer Applications 36(12) pp. 1-6, 2011.
1529
1. J.C. Bansal, P.K. Singh, M. Saraswat, A. Verma, S.S. Jadon and A. Abraham, “Inertia Weight strategies in Particle Swarm Optimization”, in Nature and Biologically Inspired Computing (NaBIC), 2011 Third World Congress, Salamanca, pp. 633 – 640, 19-21 Oct. 2011.
1530
K. Deep, M. Arya and J. C. Bansal, “A Non-Deterministic Adaptive Inertia Weight In PSO”, in Proceedings of the 13th Annual Conference on Genetic and Evolutionary Computation, New York, USA, 12 – 16 July. 2011.
1531
R. Bansal, P. Sehgal and P. Bedi, “Minutiae Extraction from Fingerprint Images-a Review”, International Journal of Computer Science Issues (IJCSI), 8(5), pp. 74-85, Sep. 2011.
1532
M. Karami, M. K. Rafsanjani, A. H. F. Navid and Y. Yavari, “QAIDS: Quantitative and Agent based Intrusion Detection System”, Computer and Information Science, 4(2), pp. 64-74, 2011.
1533
Y. Singh and S. K. Jena, “Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks”, Computer Science Advances in Parallel Distributed Computing Communications in Computer and Information Science, 203(1), pp. 410-419, 2011.
1534
Rajeswari, R., & Irudhayaraj, A. A. (2011). Implementation of Radial Basis Function for fMRI Registration. International Journal of Computer Theory and Engineering, 3(2), 287.
1535
H. P. Tan, R. Diamant, W. K.G. Seah and M. Waldmeyer, “A Survey Of Techniques and Challenges in Underwater Localization”, Ocean Engineering 38(14–15), pp. 1663–1676, October 2011
1536
M. E. Kantarci, H.T. Mouftah and S. Oktug, “A Survey of Architectures and Localization Techniques for Underwater Acoustic Sensor Networks”, Communications Surveys & Tutorials, IEEE, 13 (3) pp. 487 – 502, 2011.
1537
R. Diamant and L. Lampe, “Underwater Localization with Time-Synchronization and Propagation Speed Uncertainties”, in Positioning Navigation and Communication (WPNC), 8th Workshop, Dresden , 7-8 April 2011, pp. 100 – 105.
1538
R. W. Harder and R. Darken, “A Quantitative Model for Assessing Visual Simulation Software Architecture”, Doctor Of Philosophy Thesis In Modeling, Virtual Environments, and Simulation (MOVES), Naval Postgraduate School, Monterey, California, 2011.
1539
Shukla, D., Gangele, S., Verma, K., & Thakur, S. (2011). A Study on Index Based Analysis of Users of Internet Traffic Sharing in Computer Networking. World Applied Programming (WAP), 1(04), 278-287.
1540
Shukla, D., Gangele, S., Verma, K., & Trivedi, M. (2011). Elasticity variation under rest state environment in case of Internet traffic sharing in computer network. International Journal of Computer Technology and Application (IJCTA), 2, 2052-2060.
1541
Jalab, H. A. (2011, September). Image retrieval system based on color layout descriptor and Gabor filters. In Open Systems (ICOS), 2011 IEEE Conference on (pp. 32-36). IEEE.
1542
N. Dey , A. Bardhan Roy and S. Dey, “A Novel Approach of Color Image Hiding using RGB Color planes and DWT”, International Journal of Computer Applications, 36(5), pp. 19-24, December 2011.
1543
N. Dey , A. Bardhan Roy and S. Dey, “A Novel Approach of Color Image Hiding using RGB Color planes and DWT”, International Journal of Computer Applications, 36(5), pp. 19-24, December 2011.
1544
4. Z.Muda, W.Yasin, M.N.Sulaiman and N.I.Udzir, “A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection” International Technology Journal, 10(3), pp. 648-656, 2011.
1545
H. J. Hsu and F. J. Wang, “A Delegation Framework for Task-Role Based Access Control in WFMS”, Journal of Information Science and Engineering, 27, pp. 1011-1028, 2011.
1546
P. C. Sherimon, P. V. Vinu and R. Krishnan, “Enhancing The Learning Experience In Blended Learning Systems: A Semantic Approach”, in Proceedings of the 2011 International Conference on Communication, Computing & Security, New York, USA, 2011.
1547
P.V. Vinu, P.C. Sherimon and Reshmy Krishnan, “Towards Pervasive Mobile Learning – The Vision Of 21st Century”, in Proceedings Procedia - Social and Behavioral Sciences Volume 15, 3rd World Conference on Educational Sciences – 2011, pp. 3067–3073.
1548
Mustare, N. B. (2011). A Study of Conservative Physiological Homeostasis and its Analysis Linked to Status of E. Coli Environment Related to Cancer Disease.
1549
Basak, T. K., Ramanujam, T., Jeybalan, S., Bhatt, M., Garg, D., & Garg, R. (2011). Growth Factor Inhibiting PKC Sensor in E-coli Environment Using Classification Technique and ANN Method. Sensors & Transducers, 126(3), 125.
1550
Sinnreich, A., Graham, N., & Trammell, A. (2011). Weaving a new'Net: A mesh-based solution for democratizing networked communications. The Information Society, 27(5), 336-345.
1551
Mohammadi, S., & Jadidoleslamy, H. (2011). A comparison of physical attacks on wireless sensor networks. International Journal of Peer to Peer Networks, 2(2), 24-42.
1552
Mohammadi, S., Atani, R. E., & Jadidoleslamy, H. (2011). A Comparison of Routing Attacks on Wireless Sensor Networks. organization, 4, 21.
1553
Jebadurai, J. V. S., Melvin, A. A. R., & Jebadurai, I. J. R. (2011, April). Sinkhole detection in mobile ad-hoc networks using mutual understanding among nodes. In Electronics Computer Technology (ICECT), 2011 3rd International Conference on (Vol. 3, pp. 321-324). IEEE.
1554
Jebadurai, I. J. R., & Rajsingh, E. B. (2011). A Survey on Sinkhole attack Detection methods in Mobile Ad-hoc Networks. In 3rd International Conference on Mechine Learning and Computing (Vol. 4).
1555
Mohammadi, S., & Jadidoleslamy, H. (2011). A Comparison of Transport and Application Layers Attacks on Wireless Sensor Networks. organization, 4, 21.
1556
Tamilarasan, S., & Reddy, M. S. (2011). A Quantitative Study and Comparison of Secure OLSR Routing Protocol. S Tamilarasan et al, Int. J. Computer Technology & Applications, 3(2), 632-638.
1557
Mohammadi, S., & Jadidoleslamy, H. (2011). A comparison of link layer attacks on wireless sensor networks. arXiv preprint arXiv:1103.5589.
1558
Maulik, R., & Chaki, N. (2011). A study on wormhole attacks in MANET. International Journal of Computer Information Systems and Industrial Management Applications ISSN, 2150-7988.
1559
V. K. Tiwari, S. Thakur and D. Shukla, “Analysis of Internet Traffic Distribution for User Behaviour Based Probability in Two-Market Environment”, International Journal of Computer Applications, 30(8), pp. 44-51, 2011.
1560
Dr. H. B. Kekre and V. Kulkarni, “Speaker Identification using Row Mean of DCT and Walsh Hadamard Transform”, International Journal on Computer Science and Engineering (IJCSE), 3(3), pp. 1295- 1301, Mar. 2011.
1561
V. K. Tiwari, S. Thakur and D. Shukla. “Analysis of Internet Traffic Distribution for User Behavior based Probability in Two-Market Environment”. International Journal of Computer Applications, 29(8), pp. 44-51, 2011.
1562
D. Shukla, S. Gangele?, K. Verma and M. Trivedi, “Two-Call Based Cyber Crime Elasticity Analysis of Internet Traffic Sharing in Computer Network”, International Journal of Computer Application, 2(1), pp. 27-38, 2011.
1563
D. Minnie and S. Srinivasan, “Meta Search Engines for Information Retrieval on Multiple Domains”, International Journal of Technology and Engineering System, 2(2), pp. 115-118, 2011.
1564
D. Minnie and S. Srinivasan, “Multi-Domain Meta Search Engine with an Intelligent Interface for Efficient Information Retrieval on the Web”, Trends in Computer Science, Engineering and Information Technology Communications in Computer and Information Science, 204(1), pp. 121-129, 2011.
1565
W. Tang, J. Ni, M. Chen and X. Yang, ?Contextual Role-Based Security Enhancement Mechanism for 2G-RFID Systems?, in Proceedings, Computer Communications Workshops (INFOCOM WKSHPS), IEEE Conference, Shanghai, 10-15 April 2011, pp. 942-946.
1566
W. Tang, M. Chen, J. Ni and X. Yang "Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems". Sensors, 11(7), pp. 6743-6759. 2011.
1567
A. Vinay , K. G. Abhijit , M. Saifulla , D. Jayashree and T. N. Anitha, “A Comparative Analysis of Centralized and Distributed Dynamic Load Balancing Algorithms for Cluster Based Video-on-Demand Systems”, in Proceedings of the International Conference & Workshop on Emerging Trends in Technology ACM, New York, USA, 2011.
1568
R. M. Alguliev, R. M. Aliguliyev and C. A. Mehdiyev, “pSum-SaDE: A Modified p-Median Problem and Self-Adaptive Differential Evolution Algorithm for Text Summarization”, Applied Computational Intelligence and Soft Computing, Vol. 2011, Article ID 351498, 13 pages, 2011.
1569
R. M. Alguliev, R. M. Aliguliyev, M. S. Hajirahimova and C. A. Mehdiyev, “MCMR: Maximum Coverage and Minimum Redundant Text Summarization Model”, Expert Systems with Applications, 38(12), pp. 14514–14522, 2011.
1570
K. P. David, “Decentralised Soft-Security in Distributed Systems”, Ph.D. Thesis, College of Engineering and Physical Sciences, University of Birmingham., 2011.
1571
Dewang, R., & Agarwal, J. (2011). A New Method for Generating All Positive and Negative Association Rules. International Journal on Computer Science and Engineering, 3(4), 1649-1657.
1572
Kumar, M. R., & Iyakutti, D. K. (2011). Application of Genetic algorithms for the prioritization of Association Rules. IJCA Special Issue on Artificial Intelligence Techniques-Novel Approaches and Practical Applications, 1-3.
1573
Ravi S. Sharma, “Towards a Strategic Tool for the Business Modeling of IDM Startups - Implementing the Advisor Framework”, International Journal of Applied Engineering and Technology, 1 (1), pp.68-79, 2011.
1574
X. Xie, H. Chen, Y. Wu, H. Zhang and P. Wu, “New Encryption Scheme of One-Time Pad Based on KDC”, Computer Science Intelligent Computing and Information Science Communications in Computer and Information Science, 134, pp. 51-55, 2011.
1575
J. Barker, P. Hannay and P. Szewczyk, "Using Traffic Analysis to Identify the Second Generation Onion Router," in Proceedings, 9th International Conference on Embedded and Ubiquitous Computing, Melbourne, Victoria Australia, October 24- 26, 2011, pp.72-78.
1576
C. McCarthy, A.N. Z. Heywood, “An Investigation on Identifying SSL Traffic”, in Proceedings Computational Intelligence for Security and Defense Applications (CISDA), 2011 IEEE Symposium , Paris, 11-15 April 2011, pp. 115-122.
1577
N. Lammari , J. S. Bucumi , J. Akoka and I. C. Wattiau, “A Conceptual Meta-Model for Secured Information Systems”, in Proceedings of the 7th International Workshop on Software Engineering for Secure Systems ACM New York, NY, USA, 2011.
1578
S. Kannan , S. Karthik and V.P. Arunachalam, “An Enhanced Packet Retransmission Method for Improving TCP-Aware Source Routing in Mobile Ad-Hoc Network”, Asian Journal of Information Technology, 10(1), pp. 20 – 25, 2011.
1579
H. A. Hujailan, M. A. Rodhaan and A. A. Dhelaan, , “A Cooperative Intrusion Detection Scheme for Clustered Mobile Ad Hoc Networks ”, in Proceedings of Information Assurance and Security (IAS), 2011 7th International Conference , Melaka, 5-8 Dec. 2011, pp. 179-185.
1580
K. Patel, T. Vasavada and M. Vegad, “Effect of Hello Message on Performance of Ad-hoc On-demand Routing Protocol”, in Proceedings of National Conference on Recent Trends in Engineering & Technology, B.V.M. Engineering College, V.V.Nagar,Gujarat,India , 13-14 May 2011.
1581
S. D. Pandya and P. V. Virparia, “Context Free Data Cleaning and its Application in Mechanism for Suggestive Data Cleaning”, International Journal of Information Science, 1(1), pp. 32-35, 2011.
1582
E.M. Mohamed, Y.M.Y. Hasan, H. Furukawa, “Novel Remotely Keyed Encryption Schemes for Smart Card Applications”, in Proceedings, Communications (ICC), 2011 IEEE International Conference, Kyoto, pp. 1-5, 5-9 June 2011.
1583
E. Zanaj and I. Enesi, “Wireless Sensor Networks and nodes information collecting ability”, Asian Transactions on Engineering, 01(03), pp. 8-13, 2011.
1584
P.Nithyanandam , T.Ravichandran , N.M.Santron and E. Priyadharshini, “A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding”, International Journal of Computer Science and Security (IJCSS), 5(5), pp. 456 – 468, 2011.
1585
M. Subhedar and G. Birajdar, “Block Level Entropy Thresholding Technique for High Volume Image Adaptive Data Hiding”, International Journal on Graphics, Vision and Image Processing, 11(III), pp. 31--38, 2011.
1586
F. Zhang, P. Li, Z. G. Hou, Y. Chen, F. Xu, J. Hu, Q. Li. and M. Tan, “SEMG feature extraction methods for pattern recognition of upper limbs”, in Proceedings of Advanced Mechatronic Systems (ICAMechS), 2011 International Conference , Zhengzhou, 11-13 Aug. 2011, pp. 222-227.
1587
A. Singh and R. Gilhotra, “Data Security Using Private Key Encryption System Based on Arithmetic Coding”, International Journal of Network Security & Its Applications, 3(3), pp. 58-67, 2011.
1588
N. Belghini, A. Zarghili, J. Kharroubi and A. Majda, , “A Color Facial Authentification System Based On Semi Supervised Backporpagation Neural Network”, in Proceedings, Multimedia Computing and Systems (ICMCS), 2011 International Conference , Ouarzazate, 7-9 April 2011, pp. 1-4.
1589
A. B. Tomar and Dr.V. M. Thakare, “A Systematic Study of Software Quality Models”, International Journal of Software Engineering & Applications (IJSEA), 2(4), pp. 61-70, October 2011.
1590
A. O.Bajeh, “A Novel Metric for Measuring the Readability of Software Source Code”, Journal of Emerging Trends in Computing and Information Sciences, 2(10), pp. 492-497, October 2011.
1591
Z. H. Ahmed, “A Data-Guided Lexisearch Algorithm for the Bottleneck Travelling Salesman Problem”, International Journal of Operational Research, 12(1), pp. 20-33, 2011.
1592
Yamini, S. (2011). Gaze-based Password Entry Systems. Networking and Communication Engineering, 3(6), 401-403.
1593
Gkarafli, S., & Economides, A. A. (2011). Comparing the proof by knowledge authentication techniques. International Journal of Computer Science and Security (IJCSS), 4(2), 237-255.
1594
M. Hussain, “Efficient Data Hiding Techniques with Enhanced Capacity”, Thesis For The Degree Of Master Of Sciences In Information Technology, Department Of Computer Science, Shaheed Zulfiqar Ali Bhutto Institute Of Sciences And Technology (SZABIST), July, 2011.
1595
K. V. Ramana, Dr.B.R. Babu and S. C.R. Babu, “A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security”, International Journal on Computer Science and Engineering (IJCSE), 3(5), pp. 1878-1889, May 2011.
1596
E. B. Harb, “A Distributed Architecture for Spam Mitigation on 4g Mobile Networks”, Thesis For Master Of Applied Science (Information Systems Security), The Concordia Institute For Information Systems Engineering (Ciise), Concordia University Montréal, Québec, Canada, September 2011.
1597
AKL Ahmed, T. Gayraud and P. Berthou, “A New Wireless Architecture for In-Flight Entertainment Systems Inside Aircraft Cabin”, International Journal on Advances in Networks and Services, 4(1 & 2), pp. 159-175, 2011.
1598
M. Jangid , “Devanagari Isolated Character Recognition by using Statistical features”, International Journal on Computer Science and Engineering (IJCSE), 3(6), pp. 2400-2407, June 2011.
1599
M. Jangid, K. Singh, R.Dhir and R. Rani, “Performance Comparison of Devanagari Handwritten Numerals Recognition”, International Journal of Computer Applications, 22(1), pp. 1-6, May 2011.
1600
S. L. S. Vadivu and M. Rajaram, “Optimization of Web Caching and Response Time in Semantic Based Multiple Web Search Engine”, European Journal of Scientific Research, 56(2), pp. 244-255, 2011.
1601
H. Sukoco and K. Okamura, “Grouping Packet Scheduling for Virtual Networks by Genetic Algorithm”, inProceedings of the 6th International Conference on Future Internet Technologies ACM New York, USA, 2011.
1602
M. R. Mohamed and M. H. A. Awadalla, “Hybrid Algorithm for Multiprocessor Task Scheduling”, International Journal of Computer Science Issues, 8(3), pp. 79-89, May 2011.
1603
K. Muthumayil, V. Rajamani, S. Manikandan and M. Buvana, , “A Group Key Agreement Protocol Based on Stability and Power Using Elliptic Curve Cryptography”, in Proceedings of Emerging Trends in Electrical and Computer Technology (ICETECT), 2011 International Conference, Tamil Nadu, 23-24 March 2011, pp. 1051-1056.
1604
Ms. P. K. Karmore and Ms. S. T. Bodkhe, “A Survey on Intrusion in Ad Hoc Networks and its Detection Measures”, International Journal on Computer Science and Engineering (IJCSE), 3(5), pp. 1896- 1903, May 2011.
1605
P. K. Karmore and S. M. Nirkhi, “Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering Method of Data Mining”, International Journal of Computer Science and Information Technologies, 2 (4) , pp. 1774-1779, 2011.
1606
J. Singh, A. Singh and R. Shree. “An Assessment of Frequently Adopted Unsecure Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective”. International Journal of Computer Applications 24(9), pp. 34–39, June 2011.
1607
S. P. Manikandan and Dr. R. Manimegalai, “Evaluation of Intrusion Detection Algorithms for Interoperability Gateways in Ad Hoc Networks”, International Journal on Computer Science and Engineering (IJCSE), 3(9), pp. 3243-3249, September 2011.
1608
R. Khan and A. K. Vatsa, “Detection and Control of DDOS Attacks over Reputation and Score Based MANET”, Journal of Emerging Trends in Computing and Information Sciences, 2(11), pp. 646-655, October 2011.
1609
J. Singh, A. Singh and Ms. R. Shree, “An Assessment of Frequently Adopted Security Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective”, Int Jr of Advanced Computer Engineering and Architecture, 1(1), pp. 111-120, June 2011.
1610
M. AL-Bzoor , L. Almazaydeh and S. S. Rizvi , “Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks”, International Journal of Computer Science and Security (IJCSS), 5(5), pp. 443 – 455, 2011.
1611
B. J. Oberer1 and A. Erkollar, “Electronic Government Services in Europe: Strategies, Projects and Applications”, African Journal of Business Management, 5(16), pp. 6991-7005, August 2011.
1612
Modi, R., & Kaur, K. Thwarting from SQL Injection Attack would Secure Database Server Functions in SQL Server over the Public Network.
1613
M.U. Kumar, Dr. D. S. Kumar, Dr. B. P. Rani and K. V. Rao, “Designing Dependable Agile Layered Web Services Security Architecture Solutions”, Indian Journal of Computer Science and Engineering (IJCSE), 2(3), pp. 128-436, June-July 2011.
1614
H. B. Kekre and V. Kulkarni. “Automatic Speaker Recognition using Circular Sectorization of the DFT Complex Plane”, in Proceedings of International Conference and workshop on Emerging Trends in Technology (ICWET), (5), 2011, pp. 35-41.
1615
G. Sladic, M. Vidakovic and Z. Konjovic, “Agent Based System for Network Availability and Vulnerability Monitoring”, in Proceedings of Intelligent Systems and Informatics (SISY), 2011 IEEE 9th International Symposium, Subotica, 8-10 Sept. 2011, pp. 53 – 58.
1616
T. Harsono and K. Arai, “Deceleration in The Micro Traffic Model and Its Application to Simulation for Evacuation from Disaster Area”, in Proceedings of The 13th Industrial Electronics Seminar 2011 (IES 2011) Electronic Engineering Polytechnic Institute of Surabaya (EEPIS), Indonesia, October 26, 2011, pp. 463- 468.
1617
I. O. Ademu, Dr. C. O. Imafidon and Dr D. S. Preston, “A New Approach of Digital Forensic Model for Digital Forensic Investigation”, International Journal of Advanced Computer Science and Applications (IJACSA), 2(12), pp. 175-178, 2011.
1618
M. F. Saleh, “The Three Dimensions of Security”, International Journal of Security (IJS), 5(2), pp. 85 – 93, 2011.
1619
P. B. B. Petlu, N. L. K. Anantapalli, D. Pendlimarri and M. M. Rao, “Novel Methodologies to Avert Hacker”, Trends in Computer Science, Engineering and Information Technology Communications in Computer and Information Science, 204(1), pp. 112-120, 2011.
1620
P. K. Karmore and G. L. Girhe, “DETECTION OF BLACKHOLE ATTACK ON AODV BASED MOBILE AD HOC NETWORKS USING K-MEANS CLUSTERING TECHNIQUE OF DATA MINING”, International Journal of Research in Engineering & Applied Sciences, 2(2), pp. 464-478.
1621
YungCheng, L. E. E., HSIEH, Y., & PeiJu, L. E. E. (2011). Improvement on the Password Authenticated Three-Party Key Agreement Protocol. Journal of Computational Information Systems, 7(1), 42-48.
1622
Garg, S., Kahlon, K. S., & Bansal, P. K. How to Measure Coupling in AOP from UML Diagram.
1623
Aramudhan, M. (2011). A Survey on Mobile Agents Based Load Balancing Based in Distributed Web Servers. Networking and Communication Engineering, 3(2), 121-127.
1624
Kent, C. K., & Salim, N. (2011, December). Web Based Cross Language Semantic Plagiarism Detection. In Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on (pp. 1096-1102). IEEE.
1625
Vigneswaran, P., & Dhanasekaran, D. R. (2011). A Dynamic Approach for Anomaly Detection in AODV. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol, 2.
1626
Kiddie, P. D. (2011). Decentralised soft-security in distributed systems (Doctoral dissertation, University of Birmingham).
1627
Sharma, R. (2011). Towards a Strategic Tool for the Business Modeling of IDM Startups-Implementing the Advisor Framework. International Journal of Applied Engineering and Technology (Online), 1(1).
1628
Calvert, C., Hamza-Lup, G. L., Agarwal, A., & Alhalabi, B. (2011, April). An integrated component selection framework for system-level design. In Systems Conference (SysCon), 2011 IEEE International (pp. 261-266). IEEE.
1629
Shukla, D. (2011). elasticity of internet traffic distribution in computer network in two market environment. Journal of Global Research in Computer Science, 2(6), 6-12.
1630
Kumar, G., Mangla, N., & Mahajan, A. (2011). Improved Data Mining Based on Semantic Similarity to Mine New Association Rules. Data Mining and Knowledge Engineering, 3(4), 223-230.
1631
Gkarafli, S., & Economides, A. A. (2011). Comparing the proof by knowledge authentication techniques. International Journal of Computer Science and Security (IJCSS), 149(2), 237.
1632
Shukla, D., Gangele, S., Verma, K., & Trivedi, M. (2011). Two call based cyber-crime elasticity analysis of Internet traffic sharing in computer network. International Journal of Computer Application (IJCA), 2(1), 27-38.
1633
Shukla, D. (2011). elasticity of internet traffic distribution in computer network in two market environment. Journal of Global Research in Computer Science, 2(6), 6-12.
1634
Shukla, D., Gangele, S., Singhai, R., & Verma, K. (2011). Elasticity analysis of web-browsing behavior of users. International Journal of Advanced Networking And Application (IJANA), 3(3), 1162-1168.
1635
Shukla, D., & Singhai, R. (2011). Analysis of user web browsing behavior using Markov chain model. International Journal of Advanced Networking And Application (IJANA), 2(5), 824-830.
1636
Shukla, D., Gangele, S., Verma, K., & Thakur, S. (2011). A Study on Index Based Analysis of Users of Internet Traffic Sharing in Computer Networking. World Applied Programming (WAP), 1(04), 278-287.
1637
Shukla, D., Gangele, S., Verma, K., & Trivedi, M. (2011). Elasticity variation under rest state environment in case of Internet traffic sharing in computer network. International Journal of Computer Technology and Application (IJCTA), 2, 2052-2060.
1638
Tiwari, V. K., Thakur, S., & Shukla, D. (2011). Analysis of Internet Traffic Distribution for user Behavior based Probability in Two-Market Environment. International Journal of Computer Applications, 30(8).
1639
Jain, S., & Ojha, S. (2011). elasticity of internet traffic distribu behaviorial study of single level tree network with the help of markov chain modeltion in computer network in two market environment. Computer Science & Telecommunications, 30(1).
1640
Gkarafli, S., & Economides, A. A. (2011). Comparing the proof by knowledge authentication techniques. International Journal of Computer Science and Security (IJCSS), 149(2), 237.
1641
Zhang, F., Li, P., Hou, Z. G., Chen, Y., Xu, F., Hu, J., ... & Tan, M. (2011, August). SEMG feature extraction methods for pattern recognition of upper limbs. In Advanced Mechatronic Systems (ICAMechS), 2011 International Conference on (pp. 222-227). IEEE.
1642
Christaline, J. A., & Vaishali, D. (2011, June). Image steganographic techniques with improved embedding capacity and robustness. In Recent Trends in Information Technology (ICRTIT), 2011 International Conference on (pp. 97-101). IEEE.
1643
Subhedar, M., & Birajdar, G. (2011). Block Level Entropy Thresholding Technique for High Volume Image Adaptive Data Hiding. ICGST-GVIP Journal, 11(3).
1644
Swetha, V., Prajith, V., & Kshema, V. Data Hiding Using Video Steganography-A Survey.
1645
Cauvery, N. K. Empirical Computation Of Rs-Analysis For Building Robust Steganography Using Integer Wavelet Transform And Genetic Algorithm.
1646
Kumar, D., & Anand, B. Evaluation of RS-Analysis Proficiency by Genetic Algorithm for Robust Steganography using IWT.
1647
Chaturvedi, P., & Bairwa, R. K. Image Steganography Method for Hiding Secret Message in Colored Images by Using IWT.
1648
Vyas, A., & Mondikathi, C. international journal of engineering sciences & research technology steganography image in color image using wavelet transform.
1649
Girdhar, A., & Kaur, A. Secret Image Sharing Scheme with Steganography and Authentication Based on Discrete Wavelet Transform.
1650
Merritt, C. (2011). Mobile money transfer services: The next phase in the evolution of person-to-person payments. Journal of Payments Strategy & Systems, 5(2), 143-160.
1651
Singh, A., & Gilhotra, R. (2011). Data security using private key encryption system based on arithmetic coding. International Journal of Network Security & Its Applications (IJNSA), 3(3), 58-67.
1652
Kayande, D., & Shrawankar, U. (2011). SMS Lingo: Memory Storage Optimization Utility for Mobile Phones. In Annual Symposium.
1653
Ahmed, Z. H. (2011). A data-guided lexisearch algorithm for the asymmetric traveling salesman problem. Mathematical Problems in Engineering, 2011.
1654
Jayadevan, R., Kolhe, S. R., Patil, P. M., & Pal, U. (2011). Offline recognition of Devanagari script: A survey. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 41(6), 782-796.
1655
Dongre, V. J., & Mankar, V. H. (2011). A review of research on Devnagari character recognition. arXiv preprint arXiv:1101.2491.
1656
Singh, M. J. K., Dhir, R., & Rani, R. (2011). Performance Comparison of Devanagari Handwritten Numerals Recognition. International Journel of Computer Application (0975-8887) volume-22 No.-1.
1657
Jangid, M. (2011). Devanagari isolated character recognition by using statistical features. International Journal of Computer Science and Engg, 3(2), 2400-2407.
1658
Jangid, M., Dhir, R., & Rani, R. (2011). A Novel Approach: Recognition of Devanagari Handwritten Numerals. International Journal of Electrical, Electronics and Computer Science (IJEECS), ISSN, 2221-7258.
1659
Manal, A. B., Almazaydeh, L., & Rizvi, S. (2011). Hierarchical coordination for data gathering (HCDG) in wireless sensor networks. International Journal of Computer Science and Security (IJCSS), 5(5), 443.
1660
Rizvi, S. R., Lokesh, C., Weigle, M. C., & Olariu, S. A Next-Generation Emergency Response System for First Responders using Retasking of Wireless Sensor Networks.
1661
Khan, R., & Vatsa, A. K. (2011). Detection and control of DDOS attacks over reputation and score based MANET. Journal of Emerging Trends in Computing and Information Sciences, 2(11).
1662
Karmore, P. K., & Bodkhe, S. T. (2011). A survey on intrusion in ad hoc networks and its detection measures. International Journal on Computer Science and Engineering, 3(5), 1896-1903.
1663
Manikandan, S. P., & Manimegalai, D. R. (2011). Evaluation of Intrusion Detection Algorithms for Interoperability Gateways in Ad Hoc Networks. International Journal on Computer Science and Engineering (IJCSE), ISSN, 0975-3397.
1664
Karmore, P. K., & Nirkhi, S. M. (2011). Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering method of Data Mining. International Journal of Computer Science and Information Technologies, 2(4), 1774-1779.
1665
Singh, J., Singh, A., & Shree, R. (2011). An Assessment of Frequently Adopted Unsecure Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective. International Journal of Computer Applications (0975–8887), 24(9).
1666
Petlu, P. B. B., Anantapalli, N. K., Pendlimarri, D., & Rao, M. M. (2011). Novel Methodologies to Avert Hacker. In Trends in Computer Science, Engineering and Information Technology (pp. 112-120). Springer Berlin Heidelberg.
1667
I ndirani, G., & Selvakumar, K. Performance of Swarm Based Intrusion Detection System Under Different Mobility Conditions in MANET. International Journal of Emerging Technology and Advanced Engineering, ISSN, 2250-2459.
1668
Kumara, L., & Sharmab, V. An Overview of MANETs: Issues and Security Solutions.
1669
Singh, J., Singh, A., & Shree, R. Article: An Assessment of Frequently Adopted Unsecure Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective}. International Journal, 24, 34-39.
1670
Kumar, S., & Malhotra, S. A Survey on security flaws and attacks over wireless ad hoc network.
1671
Chen, P. Y., & Lin, F. Y. S. Recovery and Resource Allocation Strategies to Maximize Mobile Network.
1672
Juneja, V., & Rani, M. E. Survey for Optimal Solution to resolve “Big Hole Attack” in AODV.
1673
Bagga, G. S., & Rai, M. K. Bandwidth Efficient Multicasting Operation in AODV Protocol for Mobile Ad-Hoc Networks.
1674
Pure, R. S., Patil, G., & Hussain, M. M. Trust based solutions using counter strategies for Routing attacks in MANET.
1675
Anantharaj, B., & Satheeshkumar, N. An Algorithm for Secure routed creation and Data Transfer in MANETs.
1676
Yadav, Y., Kumar, S., & Saxena, V. Intrusion Detection and Classification in MANET using Network Characteristics and PNN Algorithm.
1677
NaseimoDaikpor, M., & Adegbenro, O. (2011, December). Concurrent realization of the multiply-by-7 Elliptic Curve Scalar Multiplication algorithm. In Internet Technology and Secured Transactions (ICITST), 2011 International Conference for (pp. 797-804). IEEE.
1678
Kekre, D. H., Kulkarni, V., Venkatraman, S., Priya, A., & Narashiman, S. (2011). Speaker Identification using Row Mean of DCT and Walsh Hadamard Transform. International Journal on Computer Science and Engineering, 3(1).
1679
Kekre, H. B., & Kulkarni, V. (2011, February). Automatic speaker recognition using circular DFT sectors. In Proceedings of the International Conference & Workshop on Emerging Trends in Technology (pp. 1280-1285). ACM.
1680
Kekre, H. B., & Kulkarni, V. (2011). Performance Comparison of Speaker Identification using circular DFT and WHT Sectors. International Journal of Computer Science and Information Security, 9(3), 139.
1681
Alvi, A. K., & Zulkernine, M. (2011, December). A natural classification scheme for software security patterns. In Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on (pp. 113-120). IEEE.
1682
Shravani, D., Varma, P. S., Rani, B. P., Kumar, M. U., & Prasad, A. K. (2011). Designing Dependable Web Services Security Architecture Solutions. In Advances in Network Security and Applications (pp. 140-149). Springer Berlin Heidelberg.
1683
Shikha, d., & dhandra, b. v. abnormality detection in endoscopic images of.
1684
Ilic, S. S., Lazic, L., & Spalevic, P. (2011, July). One approach to the testing of security of proposed database application software. In Proc. of the 15th WSEAS Intern. Conf. on Computers, Corfu Island, Greece (pp. 475-480).
1685
LE, H. T., & LOH, P. K. K. Identification of Performance Issues in Contemporary Black-Box Web Application Scanners in SQLI.
1686
Nithyanandam, P., Ravichandran, T., Santron, N. M., & Priyadarshini, E. (2011). A spatial domain image steganography technique based on matrix embedding and huffman encoding. International Journal of Computer Science and Security (IJCSS), 5(5), 456.
1687
Nag, A., Singh, J. P., Khan, S., Ghosh, S., Biswas, S., Sarkar, D., & Sarkar, P. P. (2011). A Weighted Location Based LSB Image Steganography Technique. In Advances in Computing and Communications (pp. 620-627). Springer Berlin Heidelberg.
1688
Tri, H., & Kohei, A. (2011). Deceleration in The Micro Traffic Model and Its Application to Simulation for Evacuation from Disaster Area.
1689
Aldasouqi, I., & Awajan, A. (2011). Black Box Backup System. International Journal of Computer Science and Security (IJCSS), 5(3), 368.
1690
Ismail, M. A., Mirza, S. H., & Altaf, T. (2011). A Parallel and Concurrent Implementation of Lin-Kernighan Heuristic (LKH-2) for Solving Traveling Salesman Problem for Multi-Core Processors using SPC 3 Programming Model. International Journal of Advanced Computer Science and Applications, USA, 2(6).
1691
Saleh, M. F. (2011). The Three Dimensions of Security. International Journal of Security (IJS), 5(2), 85.
1692
Rizvi, S. R., Lokesh, C., Weigle, M. C., & Olariu, S. A Next-Generation Emergency Response System for First Responders using Retasking of Wireless Sensor Networks.
1693
Andriansyah¹, F., Baizal, Z. A., & Kurniati, A. P.Analisis peningkatan kualitas peringkasan teks menggunakan metode fuzzy dan algoritma genetika.
1694
Liu, c., & h eljueidi, m. A. (2011). Towards an analysis framework to facilitate informal mobile colleborative learning with context awareness. Mobile, 19.
1695
Basoglu, n., & özdogan, k. (2011). Exploring the major determinants of mobile learning adoption.bogazici university training journal, 28(1).
1696
Kantore, a. (2011). User-interface evaluation metrics for a typical m-learning application. The school of information communication and technology. Nelson mandela metropolitan university.[accessed march 2013]. Available from: http://books. Google. Com. Br/books.
1697
Vinu, p. V., sherimon, p. C., & krishnan, r. (2011). Towards pervasive mobile learning–the vision of 21st century. Procedia-social and behavioral sciences, 15, 3067-3073.
1698
Dunne, K. J. (2011). From vicious to virtuous cycle. Translation and Localization Project Management: The Art of the Possible, 16, 153.
1699
Dunne, K. I. (2011). From vicious to virtuous cycle Customer-focused translation quality management. Translation and Localization Project Management: The art of the possible, 153.
1700
vardhan Dwivedi, H. (2011). Analysis and Implementation of Room Assignment Problem and Cannon's Algorithm on General Purpose Programmable Graphical Processing Units with CUDA. Analysis, 1, 1-2011.
1701
Gawdan, I. S., Chow, C. O., Zia, T., & Sarhan, Q. I. (2011, September). A novel secure key management module for hierarchical clustering wireless sensor networks. In Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on (pp. 312-316). IEEE.
1702
Wuzong Tao, Chen Haiyan, & Song Feng. (2011). Wireless sensor networks tufted hierarchical key management scheme design. Ship Electronic Engineering, 31 (11), 108-111.
1703
Musibau, A. A., Eyinnaya, E. S., Edward, D. E., Wantrudis, M. C., & Nojeem, L. A. (2011). The implications of social networking sites in education in Nigeria. Interdisciplinary Journal of Contemporary Research in Business, 3(7), 93.
1704
Johar, M. G. M., & Gunavardhana, C. Impact of Innovation Attributes and Psychological Wellbeing Towards E-Learning Acceptance of Postgraduate Students: Comparison of Sri Lanka and Malaysia. The Online Journal of Distance Education and e-Learning, 20.
1705
Sehrawat, M., & Sharma, P. Review on Attacks in Mobile Ad-hoc Networks (MANET).
1706
Hung, J. Y. C. (2011). Investigation of methods for increasing the energy efficiency on unmanned aerial vehicles (UAVS).
1707
Zhang, J. H., Peng, H., & Shao, F. J. (2011, July). Energy consumption analysis of MANET routing protocols based on mobility models. In Fuzzy Systems and Knowledge Discovery (FSKD), 2011 Eighth International Conference on (Vol. 4, pp. 2275-2280). IEEE.
1708
Jisha, G., & Samuel, P. (2011). Impact of Node Density on Node Connectivity in MANET Routing Protocols. In Advances in Computing and Communications (pp. 1-8). Springer Berlin Heidelberg.
1709
Deshmukh, R. K., & Ambhaikar, A. (2011). Comparative Analysis of AODV and DSR with Reference to Mobility Models and Mobility Speed. International Journal of Advanced Research in Computer Science, 2(3).
1710
Kaur, P., & Mittal, G. (2011). Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Heavy Application Traffic flow. International Journal of Advanced Research in Computer Science, 2(4).
1711
Fujara, M. (2011). Methode zur rechnerunterstützten Auslegung und Optimierung der Geometrie des Vollhartmetall-Spiralbohrers. epubli.
1712
Yang Gang , Kang & clean . (2011). CB Morphological Pyramid and Its Application to Image Matching information technology , ( 8 ) , 6-9.
1713
Almeida, F. L. F., & Calistru, C. M. (2011). Assessing Quality Issues in Component Based Software Development. International Journal of Advanced Research in Computer Science, 2(2).
1714
Xenakis, C., Panos, C., & Stavrakakis, I. (2011). A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. Computers & Security, 30(1), 63-80.
1715
Manikandan, S. P., & Manimegalai, R. (2011). Evaluation of Intrusion Detection Algorithms for Interoperability Gateways in Ad Hoc Networks. International Journal on Computer Science and Engineering, 3(9), 3243.
1716
Saraydayran, J., Benali, F., & Paffumi, L. (2011). A Survey on new Threats and Countermeasures on Emerging Networks. INTECH Open Access Publisher.
1717
Vuppala, S., Banerjee, A., Pal, A., & Choudhury, P. (2011). An Attack Identification Scheme Using Hierarchical Data Clustering in MANET. In International Conference on Computer Engineering and Technology, 3rd (ICCET 2011). ASME Press.
1718
Grbavac, s. Eliminisanje sql Injection napada–mehanizmi odbrane elimination of the sql injection attacks–defense mechanisms.
1719
ALKAWAS, S. (2011). Textisms: The Pragmatic Evolution Among Students in Lebanon and Its Effect on English Essay Writing (Doctoral dissertation, LEBANESE AMERICAN UNIVERSITY).
1720
Malik, A., & Kumar, S. (2011). A Review on Mobile Ad-hoc Network (MANET) Security Issues: Its Vulnerabilities and Solutions. Wireless Communication, 3(16), 1134-1137.
1721
Santos, J. M. V. D. F. (2011). Desenvolvimento de uma infra-estrutura de software para suportar conceitos de eficiência energética usando sistemas móveis pró-activos.
1722
Muda, Z., Yassin, W., Sulaiman, M. N., & Udzir, N. I. (2011). A K-Means and Naive Bayes learning approach for better intrusion detection. Information technology journal, 10(3), 648-655.
1723
Ramana, K. V., Babu, B. R., & Babu, C. R. (2011). A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security. International Journal on Computer Science and Engineering, 3(5), 1878-1889.
1724
Hussain, M. (2011). Efficient Data Hiding Techniques with Enhanced Capacity.
1725
Björkkvist, P. (2011). Comparative study of metrics for IPTV transport in the access network.
1726
Omara, E., El Said, T., & Mousa, M. (2011). Employing Neural Networks for Assessment of Data Quality with Emphasis on Data Completeness. ICGST International Journal on Artificial Intelligence and Machine Learning, AIML, 11(1), 21-28.
1727
. Wangjian Ling, Li Wenbin, & Jia Chunsheng (2011) Design and build a data warehouse literature acupuncture and moxibustion acupuncture magazine world: English, 21 (3), 41-45.
1728
Sharma, P., Karkhanawala, Y., & Kotecha, K. (2011). Bandwidth constrained routing of multimedia traffic over hybrid MANETs using ant colony optimization. International Journal of Machine Learning and Computing, 1(3), 242-246.
1729
Gangele, S., & Gangele, S. Nav view search.
1730
Gangele, S. An Approach for Area Estimation towards Conjunction Control of Internet Traffic Sharing by Using Simpson 1/Rule.
1731
Sahni, V., Thapar, V., & Jain, B. (2011). Security Implications of Ad-hoc Routing Protocols against Wormhole Attack using Random Waypoint Mobility Model in Wireless Sensor Network. International Journal of Computer Science and Information Security, 9(11), 138.
1732
Singamsetty, R. S. (2011). Detection of malicious nodes in mobile ad hoc networks (Doctoral dissertation, University of Toledo).
1733
Seyyedtaj, M., & Jamali, M. A. J. Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network. International Journal of Computer Applications Technology and Research, 3(9), 541-546.
1734
Magardey, A., & Arjariya, T. Secure Detection and Prevention Scheme for Jamming Attack in MANET.
1735
SATHEESH, N., & PRASADH, K. (2014). TRUST BASED AD HOC ON DEMAND DISTANCE VECTOR ROUTING PROTOCOL AGAINST WORMHOLE ATTACK. Journal of Theoretical and Applied Information Technology, 70(3).
1736
Guptha, A. S., & Reshma, S. Minimizing Routing Attacks in MANET Using Extended Dempster-Shefer Theory.
1737
Paramasiven, A. (2011). Rendering Wormhole Attacks Trivial using the Scalability Features of a Geocasting Protocol. International Journal of Computer Applications, 19(5), 24-28.
1738
RAGHU, R., & SARAVANAN, V. Classification of routing Protocol.
1739
Peddi, R. D. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.
1740
Pal, K., Sofat, S., & Bansal, D. (2011). Comparison of Secure OLSR Routing Protocol. International Journal of Engineering Science and Technology, 3(6).
1741
Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2011). A novel and Efficient Secured Routing Algorithm in Mobile Ad hoc Network. International Journal of Wireless & Mobile Networks, 3(5), 245.
1742
Pal, K., & Bansal, D. (2011). Simulation Analysis of Secure OLSR Routing Protocol. Networking and Communication Engineering, 3(8), 532-537.
1743
Anwar, Y. (2011). spectre footnotes. SURVIVAL, 6, 10.
1744
Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2011). Minimized Overhead and Administrator based Secure Routing Protocol. International Journal of Computer Applications, 25(9).
1745
SHARMA, K., & SINGLA, P. A SURVEY ON VARIOUS SECURITY ATTACKS IN MANET.
1746
Sravani, B. S., Jagadeepak, T., Devi, B. R., & Rao, B. P. Examining the performance of AODV routing protocol under black hole attack with varied node densities and mobilities.
1747
Vuppala, S., Banerjee, A., Pal, A., & Choudhury, P. (2011). An Attack Identification Scheme Using Hierarchical Data Clustering in MANET. In International Conference on Computer Engineering and Technology, 3rd (ICCET 2011). ASME Press.
1748
Shendurkar, M. A. M., Chopde, N. R., & Chopde, N. R. Nav view search.
1749
Yaghmaei , & F . Hospital Information System to Use willingness to study the system based on innovation diffusion model Razi hospital . Journal of Health Administration.
1750
Kachurka, P., & Golovko, V. (2011, September). Neural network approach to real-time network intrusion detection and recognition. In Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2011 IEEE 6th International Conference on (Vol. 1, pp. 393-397). IEEE.
1751
Kukielka, R., & KOTuLSKI, Z. (2011). Systemy wykrywania intruzów wykorzystujace metody sztucznej inteligencji. Przeglad Telekomunikacyjny+ Wiadomosci Telekomunikacyjne, (4), 114-121.
1752
Alebachew, K. (2011). Designing a Hybrid Classifier for Network Intrusion Detection System (Doctoral dissertation, AAU).
1753
Chauhan, A., Rani, P., & Student, M. T. A Detail Review of Routing Attacks in Mobile Ad Hoc Networks.
1754
Chen, Y., Jaekel, A., & Bari, A. (2011). A new model for allocating resources to scheduled lightpath demands. Computer Networks, 55(13), 2821-2837.
1755
Yesilyurt, h. adli bilisim sorusturma metotlarinin standartlastirilmasi ve etkinlik-verimlilik perspektifinde degerlendirilmesi.
1756
Mohamed, F., Rahman, M. N. A., & Abdullah, M. L. (2011, November). The development of temporal-based multimedia data management application using web services. In Intelligent Systems Design and Applications (ISDA), 2011 11th International Conference on (pp. 487-492). IEEE.
1757
Bhowmik, M. K., Bhattacharjee, D., Nasipuri, M., Basu, D. K., & Kundu, M. (2010). A Parallel Framework for Multilayer Perceptron for Human Face Recognition. arXiv preprint arXiv:1007.0627.
1758
Awad, M., & Occupied, P. (2010). Optimization RBFNNs Parameters using Genetic Algorithms: Applied on Function Approximation Full text.
1759
S. Menaria, Prof S. Valiveti and Dr K. Kotecha, “Comparative study of Distributed Intrusion Detection in Ad-hoc Networks”, International Journal of Computer Applications, 8(9), pp. 11–16, October 2010.
1760
Y. Singh, A. Kaur, P. K. Bhatia and O. Sangwan, “Predicting Software Development Effort Using Artificial Neural Network”, International Journal of Software Engineering and Knowledge Engineering (IJSEKE), 20(3), pp. 367-375, 2010.
1761
N. Daniel. “An Exploratory Study of Different Perception on The Usage of Text Message Lingo Among Male and Female College Students”, Presented at 2010 China Communication Forum, pp. 37-49., 10-12, Dec. 2010
1762
N. Bawane and C. V. Srikrishna, “A Novel Method for Quantitative Assessment of Software Quality”, International Journal of Computer Science and Security (IJCSS), 3(6) pp. 508 - 517, 2010.
1763
R. Kumar, P.S. Grover and A. Kumar, “A Fuzzy Logic Approach to Measure Complexity of Generic Aspect-Oriented Systems” Journal of Object Technology, 9(3), pp. 43-57, May 2010.
1764
K. Avadhesh, K. Rajesh and P.S.Grover, “Analysis and Design of Metrics for Aspect-Oriented Systems”, Doctor of Philosophy Thesis, School of Mathematics and Computer Applications, Thapar University, Patiala, 147 004 (Punjab), India. 2010.
1765
J. K. Gupta and R. Kumar. “An Efficient ANN Based Approach for Latent Fingerprint Matching” International Journal of Computer Applications 7(10), pp. 18–21, Oct. 2010.
1766
S. Mandala, M. A. Ngadi, A. H. Abdullah and A. S. Ismail, “A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol”, Computer Science Recent Trends in Wireless and Mobile Networks Communications in Computer and Information Science, 84(1), pp. 87-98, 2010.
1767
Qasem, M. A. Rassam, “Anomaly intrusion detection system using immune network with reduced network traffic features”. Thesis Masters, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, 2010.
1768
Baragada, S. R., Ramakrishna, S., Rao, M. S., & Purushothaman, S. (2010). Polynomial Vector Discriminant Back Propagation Algorithm Neural Network for Steganalysis. IJCSNS, 10(5), 73.
1769
H. Farsi, “Improvement of Minimum Tracking in Minimum Statistics Noise Estimation Method”, Signal Processing: An International Journal (SPIJ), 4(1), pp. 17 – 22, 2010.
1770
K. Y. Foo and P. R. Atkins, “A Relative-Localization Algorithm Using Incomplete Pairwise Distance Measurements for Underwater Applications”, Journal on Advances in Signal Processing - Special Issue on Advances in Signal Processing for Maritime Applications Archive, Volume 2010, January 2010.
1771
N. Bawane and C. V. Srikrishna , “A Novel Method for Quantitative Assessment of Software Quality”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 508 – 517, Jan. 2010.
1772
M. S. Binwahlan, N. Salim and L. Suanmalui, “Fuzzy Swarm Diversity Hybrid Model for Text Summarization”, Information Processing & Management, 46(5), pp. 571–588, 2010.
1773
R. Ahmad and A. Khanum , “Document Topic Generation in Text Mining by Using Cluster Analysis with EROCK”, International Journal of Computer Science and Security (IJCSS), 4(2), pp. 176 – 182, 2010.
1774
S. Aljahdali and A.F. Sheta, “Software Effort Estimation by Tuning COOCMO Model Parameters Using Differential Evolution” Presented at Computer Systems and Applications (AICCSA), 2010 IEEE/ACS International Conference , Hammamet, (16-19 May 2010.
1775
L. Gheorghe, R. Rughinis and N. Tapus, “Attack Evaluation and Mitigation Framework”, in Proceedings, Networking and Services (ICNS), 2010 Sixth International Conference , Cancun, 7-13 March 2010, pp. 243 – 252.
1776
C. Manusankar, S. Karthik and T. Rajendran, “Intrusion Detection System with Packet Filtering for IP Spoofing”, in Proceedings of Communication and Computational Intelligence (INCOCCI), 2010 International Conference, Erode, 27-29 Dec. 2010, pp. 563 – 567.
1777
S. G. Sadasivam , V. Ruckmani , A. K. Kumari , “Secure Group Communication in Grid Environment”, International Journal of Security (IJS), 4(1), pp. 17 – 27, 2010.
1778
S. Gkarafli and A. A. Economides, “Comparing The Proof By Knowledge Authentication Techniques”, International Journal of Computer Science and Security (IJCSS), 4(2) pp. 149-264, 2010.
1779
X. Zhao, “Adaptive Content Delivery Based on Contextual and Situational Model”, Thesis For The Degree of Doctor of Philosophy in Engineering, The Graduate School of Information Systems, The University of Electro-Communications Tokyo, Japan, September 2010.
1780
M.K. Bhowmik, D. Bhattacharjee, M. Nasipuri, D. K. Basu and M. Kundu, (Jul 2010), “A Parallel Framework for Multilayer Perceptron for Human Face Recognition”, International Journal of Computer Science and Security (IJCSS), 3(6). pp. 491 – 507, 2010.
1781
Tapaswi, S., & Kushwah, V. S. (2010, June). Securing Nodes in MANETs Using Node Based Key Management Scheme. In Advances in Computer Engineering (ACE), 2010 International Conference on (pp. 228-231). IEEE.
1782
Mamatha, G. S., & Sharma, S. C. (2010). A robust approach to detect and prevent network layer attacks in MANETS. International Journal of Computer Science and Security, 4(3), 275-284.
1783
He, F., Hao, K., & Ma, H. (2010, July). S-MAODV: A trust key computing based secure Multicast Ad-hoc On Demand Vector routing protocol. In Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on (Vol. 6, pp. 434-438). IEEE.
1784
M. Majed, “Coexistence between the Mobile Service and Terrestrial - Digital Video Broadcasting in the 790-862 MHz frequency band”. Master’s Thesis, Faculty of Electrical Engineering, Universiti Teknologi Malaysia, 2010.
1785
T.R. Gopalakrishnan Nair (SM-IEEE), R. Selvarani, M. Vaidehi, (2010), “Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks”, CoRR, Vol. abs/1001.3777, 2010.
1786
R. R. Aggarwal and Dr. L. Kaur, “Fault-Tolerance and Permutation Analysis of ASEN and its Variant”, International Journal of Computer Science and Information Technologies, 1(1), pp. 24-32, 2010.
1787
M. Zhao, P. Zhu, T. He, “An Intelligent Topic Web Crawler Based on DTB”, in Proceedings, Web Information Systems and Mining (WISM), International Conference, Sanya, 23-24 Oct. 2010, pp. 84-86.
1788
S. Gkarafli and A. A. Economides, "Comparing The Proof By Knowledge Authentication Techniques", International Journal of Computer Science and Security (IJCSS), 4(2), pp. 237 - 255, 2010.
1789
http://ieeexplore.ieee.org/A. Vinay, P. Saxena and T. N. Anitha, “Architectural Solution for Improving Performance of Video-on-Demand Systems”, in Proceedings, Internet Multimedia Services Architecture and Application, IEEE 4th International Conference, Bangalore, 15-17 Dec. 2010, pp. 1-6.
1790
T. R. G. Nair and P. Jayarekha, “A Rank Based Replacement Policy for Multimedia Server Cache Using Zipf-Like Law”, Journal of Computing, 2(3), 2010.
1791
M.K. Bhowmik, D. Bhattacharjee, M. Nasipuri, D. K. Basu and M. Kundu, (2010), “A Parallel Framework for Multilayer Perceptron for Human Face Recognition”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 448-594, 2010.
1792
M. S. Binwahlan, N. Salim and L. Suanmali, “Fuzzy Swarm Diversity Hybrid Model for Text Summarization”, Information Processing & Management, 46(5), pp. 571-588, 2010.
1793
S. Gkarafli and A. A. Economides, “Comparing the Proof by Knowledge Authentication Techniques’, International Journal of Computer Science and Security (IJCSS), 4(2), pp. 237 – 255, 2010.
1794
G. S. Mamatha and S. C. Sharma, “A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS”, International Journal of Computer Science and Security (IJCSS), 4(3), pp. 275 – 284, 2010.
1795
Awad, M. (2010). Optimization RBFNNs parameters using genetic algorithms: applied on function approximation. International Journal of Computer Science and Security (IJCSS), 4(3), 295.
1796
Miao, H. (2010). A multi-operator based simulated annealing approach for robot navigation in uncertain environments. International Journal of Computer Science and Security, 4(1), 50-61.
1797
S. Ortolani, M. Conti and B. Crispo, “Censorship-Resilient Communications Through Information Scattering”, in Proceedings of the 18th International Workshop on Security Protocols (IWSP 2010), Cambridge, UK, March 24-26, 2010.
1798
S. Patil and A. Kumar, “Implemented Cryptographic Symmetric Algorithm with Binary Addition/Subtraction Approach”, Journal of Computer Science and Engineering, 3(2), pp. 52-55, 2010.
1799
V. J. Vivek , N. Chandrasekar and Y. Srinivas, “Improving Seismic Monitoring System for Small to Intermediate Earthquake Detection”, International Journal of Computer Science and Security (IJCSS), 4(3), pp. 308 – 315, 2010.
1800
J. Barker, P. Hannay and C. Bolan, “Using Traffic Analysis to Identify Tor Usage – A Proposed Study”, in Proceedings of the International Conference on Security & Management, Las Vegas, Nevada, USA. 2010, pp. 620-623.
1801
D. Shukla and A. Jain, “Estimation of Ready Queue Processing Time under Systematic Lottery Scheduling Scheme”, International Journal of Computer Science and Security (IJCSS), 4(1), pp. 74 – 81, 2010.
1802
J. Laassiri , S. E. Hajji and M. Bouhdadi, “Verifying ODP Computational Behavioral Specification by using B-Method”, International Journal of Computer Science and Security (IJCSS), 4(1), pp. 31 – 39, 2010.
1803
P. Reddy P.V.G. D , “Particle Swarm Optimization in the fine-tuning of Fuzzy Software Cost Estimation Models”, International Journal of Software Engineering (IJSE), 1(2), pp. 12 – 23, 2010.
1804
S. Asghar and M. Umar, “Requirement Engineering Challenges in Development of Software Applications and Selection of Customer-off-the-Shelf (COTS) Components”, International Journal of Software Engineering (IJSE), 1(2), pp. 32 – 50, 2010.
1805
P. Reddy , K.R. Sudha , P. R. Sree and Ramesh, “Fuzzy Based Approach for Predicting Software Development Effort”, International Journal of Software Engineering (IJSE), 1(1), pp. 1 - 11, 2010.
1806
B. D. Satoto, D. O. Siahaan and A. Saikhu, “Perbaikan Struktur Weighted Tree Dengan Metode Partisi Fuzzy Dalam Pembangkitan Frequent Itemset”, Journal Ilmiah, KURSOR, Menuju Solusi Teknologi Informasi, 5(3), pp. 175-185, 2010.
1807
S.Kannan, Karthik.S and Dr.V.P.Arunachalam, “Performance Analysis and Comparison of Mobile Ad-Hoc Network Routing Protocols”, Research Journal of Applied Sciences, 5(6), pp. 424-428, 2010.
1808
S. Kannan , S. Karthik and V.P. Arunachalam, “An Investigation on Performance Analysis and Comparison of Proactive and Reactive Routing Protocols in Mobile Ad-Hoc Network”, International Journal of Soft Computing, 5(5), pp. 194 – 199, 2010.
1809
2. Tarek , B. A. Abdel-latef , A. A. Ahmed and A. M. Mahfouz, “Hybrid Compression Encryption Technique for Securing SMS”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 473 – 481, 2010.
1810
M. K. Shan and L. Y. Wei, “Algorithms for Discovery of Spatial Co-Orientation Patterns from Images”, Expert Systems with Applications: An International Journal, 37(8), pp. 5795–5802, 2010.
1811
V. J. Vivek , N. Chandrasekar and Y. Srinivas, “Improving Seismic Monitoring System for Small to Intermediate Earthquake Detection”, International Journal of Computer Science and Security (IJCSS), 4(3), pp. 308 – 315, 2010.
1812
A. M. Kane, “On the use of Continued Fractions for Electronic Cash”, International Journal of Computer Science and Security (IJCSS), 4(1), pp. 136 – 148, 2010.
1813
A. Goel , A.K. Singh , R. K. Sethi and V. J. Gond, “Performance Analysis of Continuous Wavelength Optical Burst Switching Networks”, International Journal of Engineering (IJE), 3(6), pp. 609 – 621, 2010.
1814
R. Ramraj , “Bandwidth Allocation and Routing Information for Wireless Mobile Ad-Hoc Networks’, in Proceedings of Fuzzy Systems and Knowledge Discovery (FSKD), 2010 Seventh International Conference, Yantai, Shandong, 10-12 Aug. 2010, pp. 2968 – 2972.
1815
Laxmi, Vijaya, Pendse and Ravindra, “Trust Based QOS-Aware Packet Forwarding Model For Ad Hoc Network Independent Of Routing Protocol”, Thesis (M.S.), College of Engineering, Dept. of Electrical Engineering and Computer Science., Wichita State University, 2010.
1816
S. Saxena , A. S. Pandya , R. Stone , S. Rajput and S. Hsu , “Knowledge Discovery Through Data Visualization Of Drive Test Data”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 559 – 568, 2010.
1817
A. Ambhaikar, H.R. Sharma and V.K.Mohabey, “Scalability Performance of MANET Routing Protocols with Reference to Variable Pause Time”, International Journal on Computer Science and Engineering, 02(09), pp. 3021-3024, 2010.
1818
R. Deshmukh and A. Ambhaikar, “Performance Evaluation of AODV and DSR with Reference to Network Size”, International Journal of Computer Applications, 11(8), pp. 27-32, 2010.
1819
R. Ahmad and A. Khanum, “Document Topic Generation in Text Mining by using Cluster Analysis with EROCK”, International Journal of Computer Science and Security (IJCSS), 4(2), pp. 176 – 182, 2010.
1820
Oyelade, O. J., & Oladipupo, O. O. Knowledge Discovery from Students’ Result Repository: Association Rule Mining Approach.
1821
OO, O. Knowledge Discovery from Students’ Result Repository: Association Rule Mining Approach. International Journal of Computer Science and Security (IJCSS), 149(2), 199.
1822
Elayidom, S., Idikkula, S. M., & Alexander, J. Applying Statistical Dependency Analysis Techniques In a Data Mining Domain.
1823
E. M. Mohamed , Y. Mahmoud and H. Furukawa, “A Secured Smart Card using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES”, International Journal of Computer Science and Security (IJCSS), 4(1), pp. 9 – 22, 2010.
1824
S. Gkarafli and A. A. Economides, “Comparing The Proof By Knowledge Authentication Techniques”, International Journal of Computer Science and Security (IJCSS), 4(2), pp. 237 – 255, 2010.
1825
Tarek , B. A. Abdel-latef , A. A. Ahmed and A. M. Mahfouz, “Hybrid Compression Encryption Technique for Securing SMS”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 473 – 481, 2010.
1826
D. Shukla, S. Ojha and S. Jain, “Effect of Data Model Approach in State Probability Analysis of Multi-Level Queue Scheduling”, Int. J. of Advanced Networking and Application, 02(01), pp. 419-427, 2010.
1827
D. Shukla and A. Jain, “Estimation of Ready Queue Processing Time Under Systematic Lottery Scheduling Scheme”, International Journal of Computer Science and Security (IJCSS), 4(1), pp. 74 – 81, 2010.
1828
S. Saxena , A. S. Pandya , R. Stone , S. Rajput and S. Hsu, “Knowledge Discovery Through Data Visualization Of Drive Test Data”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 559 – 568, 2010.
1829
M. Sheikhan, K. Asadollahi and E. Hemmati, “High Quality Audio Steganography by Floating Substitution of Lsbs in Wavelet Domain”, World Applied Sciences Journal, 10(12), pp. 1501-1507, 2010.
1830
V. J. Vivek , N. Chandrasekar and Y. Srinivas, “Improving Seismic Monitoring System for Small to Intermediate Earthquake Detection”, International Journal of Computer Science and Security (IJCSS), 4(3), pp. 308 – 315, 2010.
1831
M. K. Bhowmik , D. Bhattacharjee , M. Nasipuri , D. K. Basu and M. Kundu, “Fusion of Wavelet Coefficients from Visual and Thermal Face Images for Human Face Recognition – A Comparative Study”, International Journal of Image Processing (IJIP), 4(1), pp. 12 – 23, 2010.
1832
Miao Haibo , Liu Sheng Huang , Chen Zhili , & Yang Wei . ( 2010 ) . For text analysis and detection of hidden tools Stegparty . COMMUNICATIONS , (9A), 37-258.
1833
Z. H. Ahmed, “Solution Algorithms for A Deterministic Replacement Problem”, International Journal of Engineering (IJE), 4(3), pp. 233 – 242, 2010.
1834
J. Laassiri, “Spécification et Vérification des Systèmes Informatiques Distribuées Conformément au Modèle de Référence du Traitement Réparti Ouvert (RM-ODP)”, Thèse De Doctorat, Université Mohammed V – Agdal Faculté Des Sciences Rabat, 24 juin 2010.
1835
I. Aldasouqi and W. Salameh, “Determining an Optimal Number of Access Points Using GPS data to Secure a Wireless Network Environment”, International Journal of Security (IJS), 4(5), pp. 85 – 99, 2010.
1836
V. J. Dongre and V. H. Mankar, “A Review of Research on Devnagari Character Recognition”, International Journal of Computer Applications, 12(2), pp. 8-15, November 2010.
1837
M.B.Chandak, Dr.R.V.Dharaskar and Dr.V.M.Thakre, “Text to Speech Synthesis with Prosody Feature: Implementation of Emotion in Speech Output using Forward Parsing”, International Journal of Computer Science and Security, 4(3), pp. 352-360, July 2010.
1838
Prof. M. Abo-Zahhad , S. M. Ahmed , N. Sabor and A. F. Al-Ajloun, “The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based Optimization Problems”, Signal Processing: An International Journal (SPIJ) , 4(5), pp. 247 – 266, 2010.
1839
J. N. Begum, K. Kumar and V. Sumathy, “A Novel Approach towards Multilevel Access Control for Secure Group Communication Using Symmetric Polynomial Based Elliptic Curve Cryptography”, in Proceedings of Computational Intelligence and Communication Networks, 2010 International Conference, Bhopal, 26-28 Nov. 2010, pp. 454-459.
1840
M. Darbari , R. Asthana and V. K. Singh, “Integrating Fuzzy Mde- AT Framework For Urban Traffic Simulation”, International Journal of Software Engineering (IJSE), 1(2), pp. 24 – 31, 2010.
1841
P. M. Jawandhiya, M. M. Ghonge, DR. M.S.ALI and PROF. J.S. DESHPANDE, “A Survey of Mobile Ad Hoc Network Attacks”, International Journal of Engineering Science and Technology, 2(9), pp. 4063-4071, 2010.
1842
R. M. Patil, M. R. Patil, Dr. K. V. Ramakrishnan and Dr. T.C.Manjunath. “IDDP: Novel Development of an Intrusion Detection System through Design Patterns”. International Journal of Computer Applications, 7(12), pp. 22–29, October 2010.
1843
R.Gobi, P. Sathya, E.G.D.P Raj and T. Sasikumar, “ComEn- a mobile device compression and encryption approach”, in Proceedings of Communication and Computational Intelligence (INCOCCI), 2010 International Conference. Erode, 27-29 Dec. 2010, pp. 609 – 612.
1844
Awad, M. (2010). Optimization RBFNNs parameters using genetic algorithms: applied on function approximation. International Journal of Computer Science and Security (IJCSS), 4(3), 295.
1845
Singh, Y., Kaur, A., Bhatia, P. K., & Sangwan, O. (2010). Predicting software development effort using artificial neural network. International Journal of Software Engineering and Knowledge Engineering, 20(03), 367-375.
1846
Bawane, N., & Srikrishna, C. V. (2010). A novel method for quantitative assessment of software quality. International Journal of Computer Science and Security (IJCSS), 3(6), 508.
1847
Kumar, R., Grover, P. S., & Kumar, A. (2010). A Fuzzy Logic Approach to Measure Complexity of Generic AspectOriented Systems. Journal of Object Technology, 9(3), 59-77.
1848
Kumar, A. (2010). Analysis and Design of Metrics for Aspect-Oriented Systems (Doctoral dissertation, Thapar University, Patiala).
1849
Srikrishna, C. V., & Bawane, N. (2010). A Novel Method for Quantitative Assessment of Software Quality.
1850
Zhao, M. S., Zhu, P., & He, T. C. (2010, October). An Intelligent Topic Web Crawler Based on DTB. In Web Information Systems and Mining (WISM), 2010 International Conference on (Vol. 1, pp. 84-86). IEEE.
1851
Saxena, P., & Anitha, T. N. (2010, December). Architectural solution for improving performance of Video-on-Demand systems. In Internet Multimedia Services Architecture and Application (IMSAA), 2010 IEEE 4th International Conference on (pp. 1-6). IEEE.
1852
Mann, F. (2010). Filmdistribution über internetbasierte Abrufdienste: Gestaltungsoptionen und intermediale Wechselwirkungen. epubli.
1853
Nair, T. R., & Jayarekha, P. (2010). A rank based replacement policy for multimedia server cache using zipf-like law. arXiv preprint arXiv:1003.4062.
1854
Shukla, D., Jain, A., & Choudhary, A. (2010). Estimation of ready queue processing time under SL-Scheduling scheme in multiprocessors environment. International Journal of Computer Science and Security (IJCSS), 4(1), 74-81.
1855
Asghar, S., & Umar, M. (2010). Requirement engineering challenges in development of software applications and selection of customer-off-the-shelf (COTS) components. International Journal of Software Engineering, 1(1), 32-50.
1856
PVGD, P. R. (2010). Particle swarm optimization in the fine-tuning of fuzzy software cost estimation models. International Journal of Software Engineering (IJSE), 1(2), 12-23.
1857
Kane, A. M. (2010). On the use of continued fractions for electronic cash. International Journal of Computer Science and Security, 4(1), 136-148.
1858
Sanjay, T., & Diwakar, S. (2010). Iso-Share Analysis of Internet Traffic Sharing in the Presence of Favoured Disconnectivity. Computer Science & Telecommunications, 27(4).
1859
Shukla, D., & Thakur, S. (2010). Stochastic Analysis of Marketing Strategies in internet Traffic. INTERSTAT (June 2010).
1860
Sarma, S. K., Choudhury, S. D., Ahmed, F. U., & Hannan, A. (2010). Efficiency analysis of routing protocols for mobile ad hoc networks for heterogeneity. International Journal of Computer Networks, 2(1), 1-8.
1861
Saxena, S., Pandya, A. S., Stone, R., Rajput, S., & Hsu, S. (2010). Knowledge Discovery through Data Visualization of Drive Test Data. International Journal of Computer Science and Security (IJCSS), 3(6), 559.
1862
Shukla, D., & Jain, A. (2010). Estimation of Ready Queue Processing Time Under Systematic Lottery Scheduling Scheme.
1863
Mahmoud, T. M., Abdel-Latef, B. A., Ahmed, A. A., & Mahfouz, A. M. (2010). Hybrid compression encryption technique for securing SMS. International Journal of Computer Science and Security (IJCSS), 3(6), 473.
1864
Tarek, B. A., Ahmed, A. A., & Mahfouz, A. M. (2010). Hybrid Compression Encryption Technique for Securing SMS.
1865
Chandra, E., & Nandhini, K. (2010). Knowledge mining from student data. European Journal of Scientific Research, 47(1), 156-163.
1866
Anandhavalli, M., Ghose, M. K., Gauthaman, K., & Boosha, M. (2010). Global search analysis of spatial gene expression data using genetic algorithm. In Recent Trends in Network Security and Applications (pp. 593-602). Springer Berlin Heidelberg.
1867
Bhattacharyya, S., & Sanyal, G. (2010). Data hiding in images in discrete wavelet domain using PMM. World Academy of Science, Engineering and Technology, 68, 597-605.
1868
Joevivek, V., Chandrasekar, N., & Srinivas, Y. (2010). Improving seismic monitoring system for small to intermediate earthquake detection. International Journal of Computer Science and Security (IJCSS), 4(3), 308.
1869
Thorat, S., & Bokare, M. M. A Dymanic Method To Secure Confidential Data Using Signcryption With Steganography. IJESAT] International Journal Of Engineering Science & Advanced Technology, 2, 183-191.
1870
Prajapati, H. A., & Chitaliya, N. G. Secured and Robust Dual Image Steganography: A Survey.
1871
Barukab, O. M., Shaik, M. S., Khan, S., & Thorat, S. Signcrypted Audio Steganography: A Sophisticated Technique for Data Security.
1872
Bhattacharyyaa, S., & Sanyalb, G. A Robust Video Steganography using DWTDM.
1873
Gobi, R., Sathya, P., Raj, E., & Sasikumar, T. (2010, December). ComEn-a mobile device compression and encryption approach. In Communication and Computational Intelligence (INCOCCI), 2010 International Conference on (pp. 609-612). IEEE.
1874
Ahmed, Z. H. (2010). Solution algorithms for a deterministic replacement problem Full text.
1875
Ahmed, Z. H. (2010). A hybrid sequential constructive sampling algorithm for the bottleneck traveling salesman problem.
1876
Bhattacharjee, S. A. D., Nasipuri, M., Kundu, M., Basu, D. K., & Malik, L. Handwritten Devnagari Numeral Recognition using SVM & ANN.
1877
Jawandhiya, P. M., Ghonge, M. M., Ali, M. S., & Deshpande, J. S. (2010). A survey of mobile ad hoc network attacks. International Journal of Engineering Science and Technology, 2(9), 4063-4071.
1878
Sehrawat, M., & Sharma, P. Review on Attacks in Mobile Ad-hoc Networks (MANET).
1879
Kapdi, m. n. b., detroja, m. b. b., & hansaliya, m. b. h. simulation based study of attacks on different layerin mobile ad hoc network (manet).
1880
Vishwakarma, D., Maheshwari, S., & Joshi, S. Efficient Information Hiding Technique Using Steganography.
1881
Jhaveri, R. H., Patel, A. D., Parmar, J. D., & Shah, B. I. (2010). MANET routing protocols and wormhole attack against AODV. International Journal of Computer Science and Network Security, 10(4), 12-18.
1882
Chandra, E., & Nandhini, K. (2010). Knowledge mining from student data. European journal of scientific research, 47(1), 156-163.
1883
Sarvaiya, J., Patnaik, S., & Goklani, H. (2010). Image registration using NSCT and invariant moment. International Journal of Image Processing (IJIP), 4(2), 119.
1884
AbuShawar, B. A., & Al-Sadi, J. A. (2010). Learning management systems: Are they knowledge management tools?. International Journal of Emerging Technologies in Learning, 5(1), 4-10.
1885
Sheta, A. F., & Al-Afeef, A. (2010).Software Effort Estimation for NASA Projects Using Genetic Programming. Journal of Intelligent Computing Volume, 1(3), 147.
1886
Xu arms, & Wang Fengjian.( 2010 )A timing workflow management systems research (Doctoral dissertation) analysis.
1887
Abbas, A. I. (2010). Face identification using multiwavelet-based neural network (Doctoral dissertation, University of Baghdad).
1888
Bawane, N., & Srikrishna, C. V. (2010). A novel method for quantitative assessment of software quality. International Journal of Computer Science and Security (IJCSS), 3(6), 508.
1889
Bilodeau, V. P. (2010). Intelligent parking technology adoption (Doctoral dissertation, University of Southern Queensland).
1890
Liulong Long. (2010). I have several views of software engineering teaching computer education, 23, 007.
1891
Ismail, Z., & Hassan, R. (2010, June). Performance of AODV routing protocol in mobile ad hoc network. In Information Technology (ITSim), 2010 International Symposium in (Vol. 1, pp. 1-5). IEEE.
1892
Sarma, S. K., Choudhury, S. D., Ahmed, F. U., & Hannan, A. (2010). Efficiency analysis of routing protocols for mobile ad hoc networks for heterogeneity. International Journal of Computer Networks, 2(1), 1-8.
1893
Ramraj, R. (2010, August). Bandwidth allocation and routing information for wireless mobile ad-hoc networks. In Fuzzy Systems and Knowledge Discovery (FSKD), 2010 Seventh International Conference on (Vol. 6, pp. 2968-2972). IEEE.
1894
Mamatha, G. S., & Sharma, S. C. (2010). A robust approach to detect and prevent network layer attacks in MANETS. International Journal of Computer Science and Security, 4(3), 275-284.
1895
Husain, S., Gupta, S. C., Chand, M., & Mandoria, H. L. (2010, September). A proposed model for Intrusion Detection System for mobile adhoc network. In Computer and Communication Technology (ICCCT), 2010 International Conference on (pp. 99-102). IEEE.
1896
Menaria, S., Valiveti, S., & Kotecha, K. (2010). Comparative study of distributed intrusion detection in ad-hoc networks. International Journal of Computer Applications, 8(9), 11-16.
1897
Lacey, T. H. (2010). Reputation-based internet protocol security: a multilayer security framework for mobile Ad Hoc networks (No. AFIT/DCS/ENG/10-07). AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH SCHOOL OF ENGINEERING AND MANAGEMENT.
1898
Fasola, J., & Mataric, M. J. (2010). A Socially Assistive Robot Exercise Coach for the Elderly. Journal of Human-Robot Interaction, 1(1), 1-16.
1899
Tirdad, K. (2010). Developing pseudo random number generator based on neural networks and neurofuzzy systems.
1900
Penteado, D. (2010). redes acusticas subaquaticas na monitorac ao de correntes marítimas (doctoral dissertation, universidade federal do rio de janeiro).
1901
Gandhi, M., & Srivatsa, S. K. (2010). Combination of RBF Algorithm and Filters Applied to Prevent Attacks in a Web Server. International Journal of Computational Intelligence Research, 6(2).
1902
Sudha Sadasivam, G., & Kumari, A. Secure Group Communication in Grid Environment. International Journal Of Security (IJS), 4(1), 17.
1903
Joevivek, V., Chandrasekar, N., & Srinivas, Y. (2010). Improving seismic monitoring system for small to intermediate earthquake detection. International Journal of Computer Science and Security (IJCSS), 4(3), 308.
1904
Oyelade, O. J., & Oladipupo, O. O. (2010). Knowledge Discovery from Students’ Result Repository: Association Rule Mining Approach.
1905
Awad, M., & Occupied, P. (2010). Optimization RBFNNs Parameters using Genetic Algorithms: Applied on Function Approximation Full text.
1906
Garofalo, M. GPU Computing for Machine Learning Algorithms.
1907
Divya, P., & Rajalakshmi, M. S. Classifying Spyware Files Using Data Mining Algorithms and Hexadecimal Representation.
1908
OO, O. Knowledge Discovery from Students’ Result Repository: Association Rule Mining Approach. International Journal of Computer Science and Security (IJCSS), 149(2), 199.
1909
Prasanna, Y. L., & reddy, p. c. analysis of anthocnet and aodv performance using ns2.
1910
Nair, T. R., Selvarani, R., & Vaidehi, M. (2010). Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks. arXiv preprint arXiv:1001.3777.
1911
Baloda, S., & Aggarwal, R. Reliability Analysis of Regular Multistage Interconnection Networks.
1912
Shendurkar, M. A. M., & Chopde, N. R. A Review of Black Hole and Worm Hole Attack on AODV Routing Protocol in MANET. International Journal of Engineering Trends and Technology (IJETT)–Volume, 9, 394-399.
1913
Pavani, K., & Avula, D. Injection of Attacks in MANETs. IOSR Journal of Computer Engineering (IOSRJCE), ISSN, 2278-0661.
1914
JAIN, S., & GUPTA, H. Detection and Prevention of Flooding in MANET Using Behavioral Rating.
1915
Meyer, D. TOWARDS a SATELLITE COMMONS.
1916
Raja, R., Sharmili, M., & Scholar, P. G. ENHANCED CO-OPERATIVE BAIT DETECTION SCHEME FOR DOS IN MANET’s.
1917
Gosavi, M., & Jayanthi, E. A Survey on Different Available Detection Techniques of IDS and Attacks at Different Layers of MANET.
1918
SARAVANAN, V., & RAGHU, R. A survey on Different Security Attacks in MANET.
1919
GODE, M. N. R. INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY.
1920
Biswas, M., Jana, A., Paul, R., & Saha, H. N. A Secure Routing Protocol Based On Fidelity.
1921
VAGHELA, M. R. D., & GOSWAMI, N. J. A MODIFIED HYBRID PROTOCOL (ZRP) USED FOR DETECTION AND REMOVAL OF BLACK HOLE NODE IN MANET.
1922
Babu, M. R., & Selvan, S. A Reliable Attack-Resistant Authenticated Routing Protocol for Mobile Adhoc Networks.
1923
Sinnreich, A. Weaving a New ‘Net: A Mesh-Based Solution for Democratizing Networked Communications Aram Sinnreich, Nathan Graham, and Aaron Trammell Rutgers University.
1924
Basuray, C., Giri, D., Chatterjee, S., & Ganguly, S. Minimized Overhead and Administrator based Secured Routing Protocol.
1925
Sukoco, H., & Okamura, K. (2010, March). Genetic Algorithm for Optimizing and Arrangement of Queue in Virtual Networks. In World Congress on Engineering 2012. July 4-6, 2012. London, UK. (Vol. 2188, pp. 670-675). International Association of Engineers.
1926
Keole, R. R., & Bamnote, G. R. (2010). Clustering Techniques in Web Content Mining. International Journal of Advanced Research in Computer Science, 1(4).
1927
Keole, R. R., & Bamnote, G. R. (2010). Fuzzy Clustering in Web Content Mining. International Journal of Advanced Research in Computer Science, 1(4).
1928
Laassiri, J. (2010). Spécification et vérification des systèmes informatiques distribuées conformément au modèle de référence du traitement réparti ouvert (RM-ODP).
1929
Dr. M. R. Raybhan. "Bio-Data". IEEE Sponsored International Conference Future Computer and Communication, 2009
1930
S. Nema, A. Goel, R.P. Singh. "Integrated DWDM and MIMO-OFDM System for 4G High Capacity Mobile Communication System". Signal Processing: An International Journal (SPIJ), 3(5):132 - 143, 2009
1931
B. Raju MSVS, V. B Vishnu, G. A. Naidu, R. L. Pratap and B. A Vinaya, “A Noval Security Model for Indic Scripts- A Case Study on Telugu”, International Journal of Computer Science and Security, (IJCSS), 3(4), pp. 303 – 313, 2009.
1932
S. Karthik, Dr.V.P.Arunachalam, Dr.T.Ravichandran , “A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback” , International Journal of Computer Science and Security (IJCSS), 3( 4) , pp. 272 – 279, 2009.
1933
A. Kumar, P. S Grover and R. Kumar, “A Quantitative Evaluation of Aspect-Oriented Software Quality Model (AOSQUAMO)”, ACM SIGSOFT Software Engineering Notes, 34(5), Sep. 2009.
1934
L. L. Liu, “Embedding Software Engineering Disciplines in Entry-Level Programming”, International Journal of Computer Science and Security (IJCSS), 3(2), pp. 76 – 82, 2009.
1935
Bhattacharjee, D., Bhowmik, M. K., Nasipuri, M., Basu, D. K., & Kundu, M. (2009). A Parallel Framework for Multilayer Perceptron for Human Face Recognition. International Journal of Computer Science and Security (IJCSS), 3(6), 491-507.
1936
A. V. Aquino and Y. J. A. Barria, “Change Detection in Time Series Using the Maximal Overlap Discrete Wavelet Transform”. Lat. Am. appl. res. 39(2), pp. 145-152., 2009.
1937
R. Sabah and R.N. Ainon, “Isolated Digit Speech Recognition in Malay Language Using Neuro-Fuzzy Approach”, in Modelling & Simulation, AMS '09. Third Asia International Conference , Bali, 25-29 May 2009, pp.no. 336 – 340.
1938
L. L. Liu, “Embedding Software Engineering Disciplines in Entry-Level Programming”, International Journal of Computer Science and Security (IJCSS), 3(2), pp. 76 – 82, May. 2009.
1939
G.N.K.S. Babu and DR.S.K.Srivatsa, “Analysis and Measures of Software Reusability”, International Journal of Reviews in Computing, 1, pp. 41-46, 2009.
1940
S. Lee and H. J. Choi; (15-18 Feb. 2009), “Software Component Reusability Measure In Component Grid ”, in Advanced Communication Technology, 11th International Conference , Phoenix Park, pp. 576 – 578, 15-18 Feb. 2009.
1941
W. A. Ahmed and S. M. Shamsuddin , “Integration of Least Recently Used Algorithm and Neuro-Fuzzy System into Client-side Web Caching” , International Journal of Computer Science and Security (IJCSS), 3(1), pp. 1 – 15, 2009.
1942
S. Mansor , R. B. Din and A. Samsudin , “Analysis of Natural Language Steganography”, International Journal of Computer Science and Security (IJCSS), 3(2), pp. 113 – 125, 2009.
1943
B. A. AbuShawar and J. A. Al-Sadi, “Learning Management Systems: Are They Knowledge Management Tools?” presented at IJET, 2010, pp.4-10.
1944
S. Karthik, V. P. Arunachalam and T. Ravichandran, “A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback”, International Journal of Computer Science and Security (IJCSS), 3(4), pp. 272 - 279, 2009.
1945
S. P. T. Vinay and A. Shanmugam, “Behavior Based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET”, International Journal of Computer Science and Security (IJCSS), 3(2), pp. 62 – 75, 2009.
1946
E. Nikolova and V. Jecheva, “Anomaly Based Intrusion Detection Using Data Mining and String Metrics”, in Proceedings of Communications and Mobile Computing, CMC '09. WRI International Conference , Yunnan, 6-8 Jan. 2009, pp. 440 – 444.
1947
A. S. Hosam, A. Mustafa, S. Ahmad and M. Abbas, “Exception Agent Detection System for IP Spoofing Over Online Environments”, International Journal of Computer Science and Information Security, 6(1), pp. 158-164, 2009.
1948
Sehgal, P. K., & Nath, R. (2009). A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network. International Journal of Computer Science and Security (IJCSS), 3(1), 16.
1949
Karthik, S., Arunachalam, V. P., & Ravichandran, T. (2009). A novel Direction ratio sampling algorithm (DRSA) approach for multi directional geographical traceback.
1950
Z. A. Shamsan and T. A, Rahman, “Intersystem Interference Scenarios between Fixed and IMT-Advanced Services in Different Terrestrial Regions”, in Proceedings, Future Computer and Communication, International Conference, Kuala Lumpar, 3-5 April 2009, pp. 237 – 240.
1951
Sehgal, P. K., & Nath, R. (2009). A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network. International Journal of Computer Science and Security (IJCSS), 3(1), 16.
1952
Goel, A., & Sharma, A. (2009). Performance Analysis of Mobile Ad-hoc Network Using AODV Protocol. International Journal of Computer Science and Security (IJCSS), 3(5), 334-343.
1953
D. Shukla , V. K. Tiwari , S. Thakur and A. K. Deshmukh, “Share Loss Analysis of Internet Traffic Distribution in Computer Networks”, International Journal of Computer Science and Security (IJCSS), 3(5), pp. 414 – 426, 2009.
1954
D. Shukla, V. K. Tiwari, S. Thakur and M. Tiwari , “A Comparison of Methods for Internet Traffic Sharing in Computer Network”, Int. J. of Advanced Networking and Applications, 01(03), pp. 164-169, 2009.
1955
I. S. Saeh and A. Khairuddin, “Implementation of Artificial Intelligence Techniques for Steady State Security Assessment in Pool Market”, International Journal of Engineering (IJE), 3(1), pp. 1 – 11, 2009.
1956
P. L. E. Ekmobo , M. Oumsis and M. Meknassi, “Motion Tracking in MRI by Harmonic State Model: Case of Heart Left Ventricle”, International Journal of Computer Science and Security (IJCSS), 3(5), pp. 428 – 447, 2009.
1957
H. S. Guruprasad and Dr. H D Maheshappa, “Efficient Resource Allocation in a Distributed VoD Using Agent Technology”, International Journal of Engineering and Technology, 1(5), pp. 461-466, 2009.
1958
H. S. Guruprasad and H. D. Maheshappa, “Dynamic Bandwidth Management in Distributed VoD Based on the User Class Using Agents”, International Journal of Computer Science and Information Security, 3(1), 2009.
1959
A. Waleed and S. M. Shamsuddin, “Integration of Least Recently Used Algorithm and Neuro-Fuzzy System into Client-Side Web Caching”. International Journal of Computer Science and Security, 3 (1). pp. 1-15, 2009.
1960
M. S. Binwahlan, N. Salim and L. Suanmali, “Swarm Diversity Based Text Summarization”, Computer Science Neural Information Processing Lecture Notes in Computer Science, Vol. 5864/2009, pp. 216-225, 2009.
1961
D. Shukla , V. K. Tiwari , S. Thakur and A. K. Deshmukh, “Share Loss Analysis of Internet Traffic Distribution in Computer Networks”, International Journal of Computer Science and Security (IJCSS), 3(5), pp. 414 – 426, 2009.
1962
D. Shukla, V. K. Tiwari, S. Thakur and M. Tiwari, “A Comparison of Methods for Internet Traffic Sharing in Computer Network”, Int. J. of Advanced Networking and Applications, 1(3), pp. 164-169, 2009.
1963
A. Y. Dahab , A. M. Said and H. Hasbullah“Applications of Extreme Value Theory to Burst Predictions”. Signal Processing: An International Journal, 3 (4), pp. 55 – 63, 2009.
1964
A. B. Mohammed and S. M. Nor, “Near Real Time Online Flow-Based Internet Traffic Classification Using Machine Learning (C4.5)”, International Journal of Engineering (IJE), 3(4), pp. 370 – 379, 2009.
1965
D. Shukla , V. K. Tiwari , S. Thakur and A. K. Deshmukh, “Share Loss Analysis of Internet Traffic Distribution in Computer Networks”, International Journal of Computer Science and Security (IJCSS), 3(5), pp. 414 – 426, 2009.
1966
D. Shukla , V. K. Tiwari, S. Thakur and M. Tiwari , “A Comparison of Methods for Internet Traffic Sharing in Computer Network”, Int. J. of Advanced Networking and Applications, 01(03), pp. 164-169, 2009.
1967
S. J. Aboud, “Secure E-payment Protocol”, International Journal of Security (IJS), 3(5), pp. 85 – 92, 2009.
1968
J. Kar and B. Majhi, “An Efficient Password Security of Multi-Party Key Exchange Protocol Based on ECDLP”, International Journal of Computer Science and Security (IJCSS), 3(5), pp. 405 – 413, 2009.
1969
S. J. Aboud, “Secure E-payment Protocol”, International Journal of Security (IJS), 3(5), pp. 85 – 92, 2009.
1970
M. Z. Rahman , R. A. Shaik and D. V. R. K. Reddy, “Noise Cancellation in ECG Signals using Computationally”, Signal Processing: An International Journal (SPIJ), 3(5), pp. 120 – 131, 2009.
1971
S. Nema , A. Goel and R.P. Singh, “Integrated DWDM and MIMO-OFDM System for 4G High Capacity Mobile Communication System”, Signal Processing: An International Journal (SPIJ), 3(5), pp. 132 – 143, 2009.
1972
Kumar, A., Grover, P. S., & Kumar, R. (2009). A quantitative evaluation of aspect-oriented software quality model (AOSQUAMO). ACM SIGSOFT Software Engineering Notes, 34(5), 1-9.
1973
Liu, L. L. (2009). Embedding Software Engineering Disciplines in Entry-Level Programming. International Journal of Computer Science and Security (IJCSS), 3(2), 76.
1974
EKOMBO, P. L. E., Oumsis, M., & Meknassi, M. (2009). Motion tracking in MRI by Harmonic State Model: Case of heart left ventricle. International Journal of Computer Science and Security (IJCSS), 3(5), 428.
1975
Guruprasad, H. S., & Maheshappa, H. D. (2009). Efficient Resource Allocation in a Distributed VoD Using Agent Technology. the proceedings of International Journal of Engineering and Technology, 1(5), 461-466.
1976
Binwahlan, M. S., Salim, N., & Suanmali, L. (2009, June). Integrating of the diversity and swarm based methods for text summarization. In The 5th postgraduate annual research seminar (PARS) (pp. 17-19).
1977
Shukla, D., Tiwari, V., Thakur, S., & Deshmukh, A. K. (2009). Share loss analysis of internet traffic distribution in computer networks. International Journal of Computer Science and Security (IJCSS), 3(5), 414-427.
1978
Ahmed, W. A., & Shamsuddin, S. M. Integration of Least Recently Used Algorithm and Neuro-Fuzzy System into Client-side Web Caching.
1979
Nair, S. Privacy and Security Automation for Cloud Computing.
1980
Goto, K., Okabe, H., Shimizu, S., Onoda, M., & Fujioka, Y. (2009). Evaluation method of novel absorbents for CO 2 capture. Energy Procedia, 1(1), 1083-1089.
1981
ICACT 2009. 11th International Conference on (Vol. 1, pp. 576-578). IEEE.
1982
Arunachalam, V. P., & Ravichandran, T. A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback. International Journal of Computer Science and Security (IJCSS), 3(4), 272.
1983
Baragada, S. R., Ramakrishna, S., Rao, M. S., & Purushothaman, S. (2009). Polynomial Discriminant Radial Basis Function for Steganalysis. International Journal of Computer Science and Network Security, IJCSNS, 9(2), 209-218.
1984
Mansor, S., Din, R., & Samsudin, A. (2009). Analysis of natural language steganography. International Journal of Computer Science and Security (IJCSS), 3(2), 113-125.
1985
Sundararajan, T. V. P., & Shanmugam, D. A. (2009). Behavior based anomaly detection technique to mitigate the routing misbehavior in manet. International Journal of Computer Science and Security, 3(2), 62-75.
1986
Mohd, A. B., & bin Mohd Nor, S. (2009). Near Real Time Online Flow-Based Internet Traffic Classification Using Machine Learning (C4. 5). Abuagla Babiker Mohammed, Assoc. Prof. Dr. Sulaiman Mohd Nor., 3(4), 370.
1987
Dahab, A. Y., bin Md Said, A., & bin Hasbullah, H. (2009). Application of extreme value theory to bursts prediction. SPIJ, 3(4), 55.
1988
Nath, R., & Sehgal, P. K. (2009). A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network.
1989
Aggarwal, R., Kaur, L., & Aggarwal, H. (2009). Design and reliability analysis of a new fault-tolerant multistage interconnection network. Icgst-cnir journal, 8(2), 17-23.
1990
Nath, R., & Sehgal, P. K. (2009). A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network.
1991
Shanthi, K., & Murugan, D. Pair-wise key agreement and hop-by-hop authentication protocol for MANET. Wireless Networks, 1-9.
1992
H. Mittal, P. Bhatia, P. Goswami. "Software Quality Assessment Based on Fuzzy Logic Technique". International Journal of Soft Computing Applications,(3):105-112, 2008
1993
A. H. A. Hashim, A. N. Ahmed, A. B. Mahfouz, S. Khan , “A Context Transfer Approach to Enhance Mobile Multicast”, International Journal of Computer Science and Security (IJCSS), 2(4), pp. 9 – 17, 2008.
1994
A. Kumar, R. Kumar and P. S. Grover, “Towards a Unified Framework for Cohesion Measurement in Aspect-Oriented Systems”, in Proceedings of the 19th Australian Conference on Software Engineering IEEE Computer Society Washington, DC, USA, 2008.
1995
A. Kumar, R. Kumar and P. S. Grover, “Towards a Unified Framework for Complexity Measurement in Aspect-Oriented Systems”, in Proceedings of the International Conference on Computer Science and Software Engineering - Volume 02 IEEE Computer Society Washington, DC, USA, 2008.
1996
A. Kumar, R. Kumar and P.S. Grover, “Notice of Violation of IEEE Publication Principles Towards a Unified Framework for Complexity Measurement in Aspect-Oriented Systems”, in Computer Science and Software Engineering, 2008 International Conference, Hubei, 12-14 December 2008.
1997
A. Kumar, R. Kumar and P.S. Grover, “Notice of Violation of IEEE Publication Principles Towards a Unified Framework for Cohesion Measurement in Aspect-Oriented Systems”, in Software Engineering, ASWEC 2008. 19th Australian Conference, Perth, WA, 26-28 Mar, 2008.
1998
K. Avadhesh, K. Rajesh and P.S Grover, “A Critical Review of Cohesion Measures and Measurement Frameworks in Aspect-Oriented Systems”, in Proceedings of 2nd National Conference: INDIACom- 2008, Computing for National Development, New Dehli, India, 2008.
1999
M. S Salam, D. Mohamad and S. H Salleh, “Insertion Reduction in Speech Segmentation Using Neural Network”, in Information Technology, 2008. ITSim International Symposium, Kuala Lumpur, 26-28 Aug. 2008, pp.no. 1-7.
2000
A. H. A. Hashim , A. N. Ahmed , A. B. Mahfouz and S. Khan, “A Context Transfer Approach to Enhance Mobile Multicast”, International Journal of Computer Science and Security (IJCSS), 2(4), pp. 9 – 17, 2008.
2001
R. Abdolee, T. A. Rahman and V. Vakilan, “Elements Space and Amplitude Perturbation Using Genetic Algorithm for Antenna Array Sidelobe Cancellation”, Signal Processing: An International Journal (SPIJ), 2(2), pp. 10 – 16, 2008.
2002
E. Atwell, B. A. Shawar, “An AI-Inspired Intelligent Agent/Student Architecture to Combine Language Resources Research and Teaching”, in Proceedings of LREC, 2008.
2003
B. A. Shawar, “Developing an online library system for AOU as a knowledge management tool”, Presented at CSREA EEECSREA Press (2008), pp. 427-431.
2004
H. S. Guruprasad and H. D. Maheshappa , “Dynamic Load Balancing Architecture for Distributed VoD using Agent Technology”, International Journal of Computer Science and Security (IJCSS), 2(5), pp. 13 – 22, 2008.
2005
Z. A. Shamsan and T. B. A. Rahman, “On The Comparison of Intersystem Interference Scenarios Between Imt-Advanced and Fixed Services Over Various Deployment Areas At 3500 MHZ”, PIER C Progress In Electromagnetics Research C, 5, pp. 169-185, 2008.
2006
Guruprasad, H. S., & Maheshappa, H. D. (2008). Dynamic load balancing architecture for distributed VoD using agent technology. International Journal of Computer Science & Security (IJCSS), 2(5), 14-20.
2007
M. N. Tahir, "Purpose Engineering for Contextual Role-Based Access Control (C-RBAC)", International Journal of Engineering (IJE), 2(3), pp. 41 - 50, 2008.
2008
Shaban, D. N., Ibrahim, M. H., & Nossair, Z. B. enhanced verifier-based password authenticated key agreement protocol for three-parties.
2009
Kumar, A., Kumar, R., & Grover, P. S. (2008, March). Notice of Violation of IEEE Publication Principles Towards a Unified Framework for Cohesion Measurement in Aspect-Oriented Systems. In Software Engineering, 2008. ASWEC 2008. 19th Australian Conference on (pp. 57-65). IEEE.
2010
Patiala, P., Bahadur, G. T., & Indraprastha, G. G. S. (2008). Towards a unified framework for cohesion measurement in aspect-oriented systems.
2011
Kumar, A., Kumar, R., & Grover, P. S. (2008, December). Towards a unified framework for complexity measurement in aspect-oriented systems. In 2008 International Conference on Computer Science and Software Engineering (pp. 98-103). IEEE.
2012
Kumar, A., Kumar, R., & Grover, P. S. (2008). A Critical Review of Cohesion Measures and Measurement Frameworks in Aspect-Oriented Systems. In Proc. 2nd National Conference on Computing for National Development (INDIACom-2008) (pp. 415-420).
2013
Kumar, A., Kumar, R., & Grover, P. S. (2008, December). Notice of Violation of IEEE Publication Principles Towards a Unified Framework for Complexity Measurement in Aspect-Oriented Systems. In Computer Science and Software Engineering, 2008 International Conference on (Vol. 2, pp. 98-103). IEEE.
2014
Shawar, B. A. (2008). Developing an Online Library System for AOU as a Knowledge Management Tool. In CSREA EEE (pp. 427-431).
2015
Hashim, A. H. A., Ahmed, A. N., MAHFOUZ, A. B., & Khan, S. (2008). A Context Transfer Approach to Enhance Mobile Multicast. International Journal of Computer Science and Security (IJCSS), 2(4), 9.
2016
V. B. Paul and H.P. Yeow, “Hand-Size Variations Effect on Mobile Phone Texting Satisfaction”, Ubiquitous Computing and Communication Journal, 2 (5), pp. 115-122, 2007.
2017
M. Devare and A. Kumar, “Clustering and Classification (Time Series analysis) Based Congestion Control Algorithm: Data Mining Approach”, International Journal of Computer Science and Network Security (IJCSNS), 7 (9), pp. 241-246, Mar. 2007.
2018
Radouane, m., boujiha, t., messoussi, r., & touahni, R. (2007). seerable pyramid transform and opimals blocks to ensure robustness of images watermarking.
2019
M. Andrade and M. A. M. Ferreira, “Criminal and Civil Identification with DNA Databases Using Bayesian Networks”, International Journal of Security (IJS), 3(4), pp. 65 – 74, 2009.
2020
M. K. Shan, “Discovering Color Styles from Fine Art Images of Impressionism”, International Journal of Computer Science and Security (IJCSS), 3(4), pp. 314 – 324, 2009.
2021
D. Lavanya and Dr. K.U. Rani, “Performance Evaluation of Decision Tree Classifiers on Medical Datasets”, International Journal of Computer Applications, 26(4), pp. 1-4, 2011.
2022
S. Soni and S. Shrivastava, “Classification of Indian Stock Market Data Using Machine Learning Algorithms”, International Journal on Computer Science and Engineering, 02(09), pp. 2942-2946, 2010.
2023
T.N. Tsai, “Development of a Soldering Quality Classifier System Using a Hybrid Data Mining Approach”, Expert Systems with Applications, 39(5), pp. 5727–5738, December 2011.
2024
W. Okori and J. Obua, “Machine Learning Classification Technique for Famine Prediction”, in Proceedings of the World Congress on Engineering 2011 Vol. II WCE 2011, London, U.K., July 6 - 8, 2011.
2025
S. M. Elayidom , S. M. Idikkula and J. Alexander, “Applying Statistical Dependency Analysis Techniques in A Data Mining Domain”, International Journal of Data Engineering (IJDE), 1(2), pp. 14 – 24, 2010.
2026
W. Okori and J. Obua, “Supervised Learning Algorithms for Famine Prediction”, Applied Artificial Intelligence: An International Journal, 25(9), pp. 822-835, 2011.
2027
Y. M. Lazim and F. Mohamed, “Applying Rough Set Theory in Multimedia Data Classification”, International Journal on New Computer Architectures and Their Applications, 1(3), pp. 706 - 716, 2011.
2028
K.Vaitheki and R.Tamijetchelvy, “A Havoc Proof for Secure and Robust Audio Watermarking”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 536 – 549, 2010.
2029
E. M. Mohamed, Y. M. Y. Hasan and H. Furukawa, “Novel Remotely Keyed Encryption Schemes for Smart Card Applications”, in Proceedings, Communications (ICC), 2011 IEEE International Conference, Kyoto, 5-9 June 2011, pp. 1-5.
2030
R. Shakerian, T. M. Pour, S.H. Kamali and M. Hedayati, “An Identity Based Public Key Cryptography Blind Signature Scheme from Bilinear Pairings”, in Proceedings, Computer Science and Information Technology, 3rd IEEE International Conference, Chengdu, pp. 28-32, 9-11 July 2010.
2031
Raghuvamshi, A., & Premchand, P. Cryptanalysis of Verifier-Based Password Authenticated Key Agreement Protocol for Three Parties. Research Journal of Recent Sciences ______________________________________________________________ ISSN, 2277, 2502.
2032
de Oliveira, R. R., Sanchez, R. V. V., & Estrella, J. C. Evaluation of Maintainability among RESTful and SOAP-WSDL web services approaches.
2033
Antonio, T., & Paramita, A. S. (2015). Feature Selection Technique Impact for Internet Traffic Classification Using Naïve Bayesian. Jurnal Teknologi, 72(5).
2034
Suryaputra, A., Samopa, F., & Hindayanto, B. C. (2014). klasterisasi dan analisis trafik internet menggunakan fuzzy c mean dengan ekstraksi fitur data. Jurnal Informatika, 12(1), 33-39.
2035
Paramita, A. S., Samopa, F., & Hindayanto, B. C. (2014). Klasterisasi dan Analisis Trafik Internet Menggunakan Fuzzy C Mean Dengan Ekstraksi Fitur Data.
2036
Paramita, A. S. (2014). Feature Selection Technique Using Principal Component Analysis For Improving Fuzzy C-Mean Internet Traffic Classification. Australian Basic and Applied Sciences (AJBAS): 2014 International on Engineering Conference on Sciences and Technology Innovation–ISSN: 1997-8178–American-Eurasian Network for Scientific Information (AENS
2037
Ghaffari, M., & Ghadiri, N. (2014). Ambiguity-Driven Fuzzy C-Means Clustering: How to Detect Uncertain Clustered Records. arXiv preprint arXiv:1409.2821.
2038
Finsterbusch, M., Richter, C., Rocha, E., Muller, J. A., & Hanssgen, K. (2014). A survey of payload-based traffic classification approaches. Communications Surveys & Tutorials, IEEE, 16(2), 1135-1156.
2039
Li, B., Springer, J., Bebis, G., & Gunes, M. H. (2013). A survey of network flow applications. Journal of Network and Computer Applications, 36(2), 567-581.
2040
Arndt, D. J. (2012). An Investigation of Using Machine Learning with Distribution Based Flow Features for Classifying SSL Encrypted Network Traffic.
2041
Björkkvist, P. (2011). Comparative study of metrics for IPTV transport in the access network.
2042
Barker, J., Hannay, P., & Szewczyk, P. (2011, October). Using traffic analysis to identify the second generation onion router. In Embedded and Ubiquitous Computing (EUC), 2011 IFIP 9th International Conference on (pp. 72-78). IEEE.
2043
McCarthy, C. (2011, April). An investigation on identifying ssl traffic. In Computational Intelligence for Security and Defense Applications (CISDA), 2011 IEEE Symposium on (pp. 115-122). IEEE.
2044
Barker, J., Hannay, P., & Bolan, C. (2010). Using Traffic Analysis to Identify Tor Usage-A Proposed Study. In Security and Management (pp. 620-623).
2045
McCarthy, C. (2010). An Investigation on Detecting Applications Hidden in SSL Streams using Machine Learning Techniques.
2046
Joevivek, V., Chandrasekar, N., & Srinivas, Y. (2010). Improving seismic monitoring system for small to intermediate earthquake detection. International Journal of Computer Science and Security (IJCSS), 4(3), 308.
2047
Shukla, D., Tiwari, V., Thakur, S., & Deshmukh, A. K. (2009). Share loss analysis of internet traffic distribution in computer networks. International Journal of Computer Science and Security (IJCSS), 3(5), 414-427.
2048
Shukla, D., Tiwari, V. K., Thakur, S., & Tiwari, M. (2009). A comparison of methods for internet traffic sharing in computer network. International Journal of Advanced Networking,(IJANA), 1(3), 164-169.
2049
Dahab, A. Y., bin Md Said, A., & bin Hasbullah, H. (2009). Application of extreme value theory to bursts prediction. Signal Processing: An International Journal (SPIJ), 3(4), 55.
2050
Mohd, A. B., & bin Mohd Nor, S. (2009). Near Real Time Online Flow-Based Internet Traffic Classification Using Machine Learning (C4. 5). Abuagla Babiker Mohammed, Assoc. Prof. Dr. Sulaiman Mohd Nor., 3(4), 370.
2051
Mohammed, A. B., & Nor, S. M. Near Real Time Online Flow-based Internet Traffic Classification Using Machine Learning (C4. 5). International Journal of Engineering (IJE), 3(4), 370.
2052
Shojanazeri, H., Adnan, W. A. W., & Ahmad, S. M. S. (2013). Video Watermarking Techniques for Copyright protection and Content Authentication. International Journal of Computer Information Systems and Industrial Management Applications, 5, 652-660.
2053
Shojanazeri, H., Adnan, W. A. W., Ahmad, S. M. S., & Saripan, M. I. (2011, December). Analysis of watermarking techniques in video. In Hybrid Intelligent Systems (HIS), 2011 11th International Conference on (pp. 486-492). IEEE.
2054
Padmanabhan, S. A., & Chandramathi, S. (2011, December). A proficient video encoding system through a novel motion estimation algorithm. In Advanced Computing (ICoAC), 2011 Third International Conference on (pp. 151-156). IEEE.
2055
Vaitheki, K., & Tamijetchelvy, R. (2010). A Havoc Proof For Secure And Robust Audio Watermarking. International Journal of Computer Science and Security (IJCSS), 3(6), 536.
2056
Oueslati, S., Cherif, A., & Solaiman, B. A new scheme of image Watermarking based on method Fuzzy C-means.
2057
Namazi, F., Karami, M. R., & Ghaderi, R. Robust Image Watermarking by Finite Radon, Wavelet and SVD.
2058
Ntalianis, K., & Tsapatsoulis, N. Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks.
2059
Kulkarni, A., & Jagtap, S. V. Email encryption based on elliptic curve cryptography for Android mobile devices.
2060
Nusra, A., & Adiwijaya, u. n. w. penyisipan data pada citra medis menggunakan vector quantization dan pewarnaan graf menggunakan algoritma genetika.
2061
Kishore, N. (2015). Parllel hashing algorithms for security and Forensic Applicatons.
2062
Hoelz, B. W., & Ralha, C. G. (2013, March). A framework for semantic annotation of digital evidence. In Proceedings of the 28th Annual ACM Symposium on Applied Computing (pp. 1966-1971). ACM.
2063
Al-Fedaghi, S., & Al-Babtain, B. (2012). Modeling the forensics process. Int. J. Security Appl, 6(4).
2064
Tanner, A., Dampier, D., & Thompson, J. (2012, November). On developing a conceptual modeling report management tool for digital forensic investigations. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 445-450). IEEE.
2065
Buang, M. F. M., & Daud, S. M. (2012, May). A web-based KM system for digital forensics-knowledge sharing capability. In Multimedia Computing and Systems (ICMCS), 2012 International Conference on (pp. 528-533). IEEE.
2066
Tanner, A., & Duncan, S. On Integrating Mobile Applications into the Digital Forensic Investigative Process.
2067
Ayokunle, T. B., Ogah, U. S., & Binitie, A. P. (2015). Encryption and Decryption of Messages Using Advanced Encryption Standard and System of Nonlinear Equations. International Journal of Pure and Applied Sciences and Technology, 27(1), 1.
2068
Aishwarya, J., Palanisamy, V., & Kanagaram, K. (2014). An Extended Version of Four-Square Cipher using 10 X 10 Matrixes. International Journal of Computer Applications, 97(21).
2069
Jain, R., Jejurkar, R., Chopade, S., Vaidya, S., & Sanap, M. (2014). AES Algorithm Using 512 Bit Key Implementation for Secure Communication. International journal of innovative Research in Computer and Communication Engineering, 2(3).
2070
Acharya, K., Sajwan, M., & Bhargava, S. (2014). Analysis of Cryptographic Algorithms for Network Security. International Journal of Computer Applications Technology and Research, 3(2), 130-135.
2071
Shukla, S., & Kumar, D. (2014). Cloud’s Software-Security as a Service (S-SaaS) via Biometrics.
2072
Kaur, A., & Singh, H. (2014). Security in WLAN-Review of Security and Throughput Tradeoff.
2073
Rajanbabu, D. T., & Raj, C. (2014). Multi level encryption and decryption tool for secure administrator login over the network. Indian Journal of Science and Technology, 7(4), 8-14.
2074
Singh, D., & Shukla, S. (2014). Cloud’s SaaS Security by Biometric Concept. International Journal of Computer Science and Engineering.
2075
Acevedo, E., Martínez, Á., Acevedo, M., & Martínez, F. (2013). A Novel Text Encryption Algorithm. Advances in Soft Computing Techniques, 91.
2076
Zirra, P. B., Wajiga, G. M., & Boukari, S. (2012). Generating Ciphertext Using Systems of Equations: An Asymmetric Key Approach. Int. J. Pure Appl. Sci. Technol, 8(2), 47-53.
2077
Golestani, M. R., Khademi, M., & Moeini, A. A New Approach to Segmentation of On-Line Persian Cursive Words. International Journal of Computer Applications Technology and Research, 3(2), 88-92.
2078
Aishwarya, J., Palanisamy, V., & Kanagaram, K. Comparative Analysis of Extended Version of Four-Square Cipher Using 8 X 8 and 10 X 10 Matrices.
2079
Chuchuen, C., & Chanvarasuth, P. Relationship between Phishing Techniques and User Personality Model of Bangkok Internet Users.
2080
Taalohi, M., Langari, N., & Tabatabaee, H. (2015). identifying phishing websites by techniques hyper heuristic and machine learning. Science International, 27(3).
2081
Abu-Shawar, B., & Al-Sadi, J. Knowledge management view extracted from learning management system used at AOU.
2082
Hiary, H., & Abu-Shawar, B. JU Computerized Systems and its Impact on E-Learning.
2083
Castro, g. G., domínguez, e. L., velasquez, y. H., & matla, y. R. Sistema de aprendizaje móvil consciente de contexto.
2084
Anwar, r. W., sherimon, p. C., & vinu, p. V. A semantic web approach for searching and accessing information in blended learning systems.
2085
Singh, U., Kumar, V., & Kaur, K. Experimental Implementation of AODV Routing Protocol in Mobile Adhoc Networks.
2086
Addanki, U. K. Simulation and study of Reacting Routing Protocols in MANETs.
2087
Sruthi, T. S. SURVEY ON POWER AWARE AND ENERGY EFFICIENT ROUTING PROTOCOL IN MANET.
2088
Hoc, o. k. p. r. a. pada mobile ad hoc network (manet) menggunakan algoritma semut performance optimization of ad hoc on demand distance vector (aodv) using ant algorithm at mobile ad hoc network.