SR |
M-CODE |
CITATION |
|
1 |
|
Al-Hawari, F., Alufeishat, A., Alshawabkeh, M., Barham, H., & Habahbeh, M. (2017). The software engineering of a three-tier web-based student information system (MyGJU). Computer Applications in Engineering Education, 25(2), 242-263. |
|
2 |
|
Al-Hawari, F. H. (2017). MyGJU Student View and its Online and Preventive Registration Flow. International Journal of Applied Engineering Research, 12(1), 119-133. |
|
3 |
|
Thompson, R. C. (2017). Determining critical success factors for implementation of on-line registration systems (Doctoral dissertation). |
|
4 |
|
Agwa-Ejon, J. F., & Pradhan, A. (2017, July). Technology Connectivity: A Tool for the Selection, Recruitment and Enrolment of Potential Students in South African Universities. In Management of Engineering and Technology (PICMET), 2017 Portland International Conference on (pp. 1-8). IEEE. |
|
5 |
|
Wahaba, N. A., Marimuthub, R., Othmana, J., & SaifulNizamWarrisa, C. S. P. (2017). Evaluating the Usability of COREs-an Online Conference Registration System. DEPARTMENT OF COMPUTER AND MATHEMATICAL SCIENCES UNIVERSITI TEKNOLOGI MARA CAWANGAN PULAU PINANG PENANG, MALAYSIA, 38. |
|
6 |
|
Jabbar, M. A., Deekshatulu, B. L., & Chandra, P. (2016). A Novel Algorithm for Utility-Frequent Itemset Mining in Market Basket Analysis. In Innovations in Bio-Inspired Computing and Applications (pp. 337-345). Springer International Publishing. |
|
7 |
|
Renza , D., Ballesteros , D. M., & Rincon, R. (2016 ) . Concealment method for steganography image pixel grayscale on color images . Engineering and Science , 12 ( 23) , 145-162. |
|
8 |
|
Stephanie, F. L., & Sharma, R. S. (2016). Health on a Cloud: Modeling Digital Flows in an E-health Ecosystem. Journal of Advances in Management Sciences & Information Systems, 2, 1-20. |
|
9 |
|
Pillai, J. S., & Padma, T. (2016). The Analysis of PQ Sequences Generated from Continued Fractions for Use as Pseudorandom Sequences in Cryptographic Applications. In Artificial Intelligence and Evolutionary Computations in Engineering Systems (pp. 633-644). Springer India. |
|
10 |
|
Singh, K. (2016). Image Steganography Scheme Using Parent Child Relationship in Wavelet Domain. British Journal of Applied Science & Technology, 14(4), 1. |
|
11 |
|
Barve, S., Desai, S., & Sardinha, R. (2016).Query-Based Extractive Text Summarization for Sanskrit. In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 (pp. 559-568). Springer India. |
|
12 |
|
Shanmuganathan, S. (2016). A Hybrid Artificial Neural Network (ANN) Approach to Spatial and Non-spatial Attribute Data Mining: A Case Study Experience. In Artificial Neural Network Modelling (pp. 443-472). Springer International Publishing. |
|
13 |
|
Dhveya, R., & Amudha, T. (2016). Role of Bio-Inspired Optimization in Disaster Operations Management Research. In Innovations in Bio-Inspired Computing and Applications (pp. 565-575). Springer International Publishing. |
|
14 |
|
Iwasokun, G. B., & Akinyokun, O. C. Singular-minutiae points relationship-based approach to fingerprint matching. |
|
15 |
|
Jamont, J. P. (2016). Démarche, modèles et outils multi-agents pour l'ingénierie des collectifs cyber-physiques (Doctoral dissertation, Université Grenoble Alpes). |
|
16 |
|
Adewumi, A. O., & Arasomwan, M. A. (2016). On the performance of particle swarm optimisation with (out) some control parameters for global optimisation. International Journal of Bio-Inspired Computation, 8(1), 14-32. |
|
17 |
|
Gkartzonikas , A . , & Theoharatos , D . ( 2016 ) . Discovery Framework Information : particle swarm optimization and optimum stop theory. |
|
18 |
|
Viola, A. V., Ese, O. D., & Charles, S. O. A Proposed Hybrid Component Complexity Metrics For Component Based Software Development. |
|
19 |
|
Rathore, M. M., Ahmad, A., & Paul, A. (2016). Real time intrusion detection system for ultra-high-speed big data environments. The Journal of Supercomputing, 1-22. |
|
20 |
|
Ruuhwan, R., Riadi, I., & Prayudi, Y. (2016). Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone. Jurnal Edukasi dan Penelitian Informatika (JEPIN), 2(1). |
|
21 |
|
Al-Fayoumi, A., & Hassan, M. (2016). Interactive Visual Search System Based onMachine Learning Algorithm. International Arab Journal of Information Technology (IAJIT), 13. |
|
22 |
|
Tarek, M., Ouda, O., & Hamza, T. (2016). Robust cancellable biometrics scheme based on neural networks. IET Biometrics. |
|
23 |
|
Al-Dmour, H., & Al-Ani, A. (2016). Quality optimized medical image information hiding algorithm that employs edge detection and data coding. Computer Methods and Programs in Biomedicine, 127, 24-43. |
|
24 |
|
Jahantigh , F Firuzi , due to race , R. , Jahantigh , & M. Firuzi . (2016 ) . Identify , evaluate and rank the risk factors Weight & # 1705 ... Journal of Mazandaran University of Medical Sciences (JMUMS), 25 (133). |
|
25 |
|
Rashid, F., Miri, A., & Woungang, I. (2016). Secure image deduplication through image compression. Journal of Information Security and Applications. |
|
26 |
|
Md Yunus, N. A., Othman, M., Mohd Hanapi, Z., & Lun, K. Y. (2016). Reliability Review of Interconnection Networks. IETE Technical Review, 1-11. |
|
27 |
|
Khanna, N. (2016). Mitigation of Collaborative Blackhole Attack using TRACEROUTE Mechanism with Enhancement in AODV Routing Protocol. |
|
28 |
|
Jung, S., & Kumar, R. (2016). Security of Routing Protocols in MANETs: A Survey. Global Sci-Tech, 8(1), 22-36. |
|
29 |
|
Pop, F., Tutueanu, R. I., Barbieru, C., Vasile, M. A., & Kolodziej, J. (2016). Adaptive Resource Allocation in Cloud Computing Based on Agreement Protocols. In Intelligent Agents in Data-intensive Computing (pp. 193-213). Springer International Publishing. |
|
30 |
|
Anju, P. S., Kuriakose, B., & Paul, V. A Survey On Steganographic Methods Used in Information Hiding. |
|
31 |
|
Mubeen, S., Srinath, N. K., & Subramanya, K. N. (2016). Double Securing from Hackers in B2B E-commerce. |
|
32 |
|
Opoku-Ansah, J., Eghan, M. J., Anderson, B., Boampong, J. N., & Buah-Bassuah, P. K. (2016). Laser-Induced Autofluorescence Technique for Plasmodium falciparum Parasite Density Estimation. Applied Physics Research, 8(2), 43. |
|
33 |
|
Ramesh, M. R., & Reddy, C. S. (2016). a survey on security requirement elicitation methods: classification, merits and demerits. International Journal of Applied Engineering Research, 11(1), 64-70. |
|
34 |
|
Bistouni, F., & Jahanshahi, M. (2015). Pars network: a multistage interconnection network with fault-tolerance capability. Journal of Parallel and Distributed Computing, 75, 168-183. |
|
35 |
|
Li, D., & Wang, Y. (2015). The Image Retrieval Based on the Hybrid Algorithm of the Primary Color and Color Layout Descriptor. |
|
36 |
|
Anchor , & Abdul race. ( 2015). Identify phishing in online banking site using the optimization algorithm inclined plates . Journal of electronic and cyber defense , 3 ( ??1 ). |
|
37 |
|
Uzunov, A. V., Falkner, K., & Fernandez, E. B. (2015). A comprehensive pattern-oriented approach to engineering security methodologies. Information and Software Technology, 57, 217-247. |
|
38 |
|
Veshkurtsev ,JM model management and monitoring of network elements Telecommunication network using theory of fuzzy sets. |
|
39 |
|
Nayebi, F., Abran, A., & Desharnais, J. M. (2015). Automated selection of a software effort estimation model based on accuracy and uncertainty. Artificial Intelligence Research, 4(2), p45. |
|
40 |
|
Tripathy, A., Agrawal, A., & Rath, S. K. (2015). Classi?cation of Sentimental Reviews Using Machine Learning Techniques. Procedia Computer Science, 57, 821-829. |
|
41 |
|
Bhatia, S., & Attri, V. K. Estimation of Software Development Effort with Machine Learning Approaches: A Review. |
|
42 |
|
Tripathya, A., Agrawalb, A., & Rathc, S. K. Classification of Sentimental Reviews Using Machine Learning Techniques. |
|
43 |
|
Chen, N. (2015). Research on Detection of Business Constraints based on AOP. International Journal of u-and e-Service, Science and Technology, 8(2), 243-250. |
|
44 |
|
An, B., Qu, T., & Qi, H. (2015). Chinese MOOC Search Engine. In Intelligent Computation in Big Data Era (pp. 453-458). Springer Berlin Heidelberg. |
|
45 |
|
Kapur, R. K., & Khatri, S. K. (2015, March). Analysis of attacks on routing protocols in MANETs. In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in (pp. 791-798). IEEE. |
|
46 |
|
Al-Saeedan, W., & Menai, M. E. B. (2015). Swarm intelligence for natural language processing. International Journal of Artificial Intelligence and Soft Computing, 5(2), 117-150. |
|
47 |
|
Alguliyev, R. M., Aliguliyev, R. M., & Isazade, N. R. (2015). an unsupervised approach to generating generic summaries of documents. Applied Soft Computing. |
|
48 |
|
Mohamed, K., Pauzi, M. N. M., Ali, F. H. H. M., & Ariffin, S. (2015, August). Linearity Test Framework for S-Box in Block Cipher. In IT Convergence and Security (ICITCS), 2015 5th International Conference on (pp. 1-5). IEEE. |
|
49 |
|
McIntosh, H. (2015). Vevo and the Business of Online Music Video Distribution. Popular Music and Society, (ahead-of-print), 1-14. |
|
50 |
|
Fatima, M., Ahmad, S. F., & Hasan, M. (2015). Fuzzy Based Software Cost Estimation Methods: A Comparative Study. International Journal for Innovative Research in Science and Technology, 1(7), 287-290. |
|
51 |
|
Iraji, M. S. (2015). Fuzzy Agent Oriented Software Effort Estimate with COCOMO. |
|
52 |
|
Mohammadpoor, M., & Mehdizadeh, A. An Efficient ECC-based Authentication and Key Agreement Protocol. |
|
53 |
|
Verma, K., Shukla, D., & Gangele, S. (2015). Approximating the Probability of Traffic Sharing by Numerical Analysis Techniques between Two Operators in a Computer Network. Open Journal of Computer Science and Information Technology, 3(1), 026-039. |
|
54 |
|
Persson, J., & Lundbladh, M. (2015). Våga vara dig själv: Att fo¨rsta° och skapa en illusion av ljus med digitala medier. |
|
55 |
|
Olaniyi, O. M., Arulogun, O. T., Omidiora, O. E., & Okediran, O. O. (2015). Implementing generic security requirements in e–voting using modified stegano–cryptographic approach. International Journal of Information and Computer Security, 7(1), 64-90. |
|
56 |
|
Omotosho, A., Adegbola, O., Mikail, O. O., & Emuoyibofarhe, J. (2015). A Secure Electronic Prescription System Using Steganography with Encryption Key Implementation. arXiv preprint arXiv:1502.01264. |
|
57 |
|
Sathisha, N., Babu, K. S., Raja, K. B., & Venugopal, K. R. (2015). Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT. International Journal of Image Processing (IJIP), 9(2), 41. |
|
58 |
|
Patil, P. (2015). encryption for secure sms transmission. Compusoft, 4(6), 1876. |
|
59 |
|
Jasuja, B., & Pandya, A. (2015). Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding. International Journal of Computer Applications, 116(21). |
|
60 |
|
Kumar, V., & Purusotham, S. (2015). A Lexi-Search Approach of Variant Vehicle Routing Problem. International Journal of Advanced Research in Computer Science, 6(1). |
|
61 |
|
Babu, K. S. international journal of engineering sciences & research technology a data guided lexi-serach approach for time dependent travelling salemsman problem. |
|
62 |
|
Kundaikar, T. C., & Laxminarayana, J. A. (2015). Efficient Recognition of Devanagari Handwritten Text. In Computational Intelligence in Data Mining-Volume 2 (pp. 81-88). Springer India. |
|
63 |
|
Kulkarni, P. P., Patil, S., & Dhanokar, G. (2015). Marathi And Sanskrit Word Identification By Using Genetic Algorithm. |
|
64 |
|
Singh, P., Verma, A., & Chaudhari, N. S. (2015). On the Performance Improvement of Devanagari Handwritten Character Recognition. Applied Computational Intelligence and Soft Computing, 2015. |
|
65 |
|
Jayakumar, A., Babu, G. S., Raman, R., & Nedungadi, P. (2015, October). Integrating Writing Direction and Handwriting Letter Recognition in Touch-Enabled Devices. In Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015 (Vol. 2, p. 393). Springer. |
|
66 |
|
Joshi, D., & Pansare, S. (2015, February). Combination of Multiple Image Features along with KNN Classifier for Classification of Marathi Barakhadi. In Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on (pp. 607-610). IEEE. |
|
67 |
|
Dhaka, V. P., & Sharma, M. K. An efficient segmentation technique for Devanagari offline handwritten scripts using the Feedforward Neural Network. Neural Computing and Applications, 1-13. |
|
68 |
|
Kabir, K. L., Shafin, M. K., Anannya, T. T., Debnath, D., Kabir, M. R., Islam, M. A., & Sarwar, H. Projection-Based Features: A Superior Domain for Handwritten Bangla Basic Characters Recognition. |
|
69 |
|
Ajmire, P. E., Dharaskar, R. V., & Thakare, V. M. Feature Extraction and recognition of Modifiers in Handwritten Marathi (Devanagari) Text. |
|
70 |
|
Shing, L., Astacio, J., Figueroa, A., & Shing, C. C. (2015, August). Vulnerabilities of radio frequencies. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on (pp. 2682-2686). IEEE. |
|
71 |
|
Kannan, D., & Gobi, M. (2015). An extensive research on robust digital image watermarking techniques: a review. International Journal of Signal and Imaging Systems Engineering, 8(1-2), 89-104. |
|
72 |
|
Roy, A. J., & Student, F. Y. U. Emotional Text to Speech Synthesis in Indian Language. |
|
73 |
|
Anil, M. C., & Shirbahadurkar, S. D. Expressive Speech Synthesis using Prosodic Modification for Marathi Language. |
|
74 |
|
Shrivastava, S., Agrawal, C., & Jain, A. (2015). An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET. arXiv preprint arXiv:1502.04801. |
|
75 |
|
Maheswari, R., MCA, M. S. R., & PHIL, M. (2015, March). A Review on Types of Jamming Attack In Mobile Ad-Hoc Network. In Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications. |
|
76 |
|
Pandhare, S. S., & Jawandiya, P. M. (2015, March). Security Goals and Attacks in Mobile Ad Hoc Networks: An exclusive survey. In National Conference “CONVERGENCE (Vol. 2015, p. 28). |
|
77 |
|
Filipek, J., & Hudec, L. (2015, January). Distributed firewall in Mobile Ad Hoc Networks. In Applied Machine Intelligence and Informatics (SAMI), 2015 IEEE 13th International Symposium on (pp. 233-238). IEEE. |
|
78 |
|
Mohammed, A., Sofiane, B. H., & kamel Mohamed, F. (2015). A Cross Layer for Detection and Ignoring Black Hole Attack in MANET. |
|
79 |
|
Mittal, V. (2015). Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach. Prevention, 4(5). |
|
80 |
|
Paliwal, G., Mudgal, A. P., & Taterh, S. (2015, January). A Study on Various Attacks of TCP/IP and Security Challenges in MANET Layer Architecture. In Proceedings of Fourth International Conference on Soft Computing for Problem Solving (pp. 191-203). Springer India. |
|
81 |
|
Dorri, A., Kamel, S. R., & Kheirkhah, E. (2015). Security challenges in mobile ad hoc networks: a survey. arXiv preprint arXiv:1503.03233. |
|
82 |
|
Singh, J., Singh, A., & Shree, M. R. (2015). An Assessment of Frequently Adopted Security Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective. Journal of Wireless Network and Microsystems, 4(1-2). |
|
83 |
|
Suja, K. R., & Raglend, J. (2015). Cuckoo search (CS)-NFC-based UPQC for compensating voltage sag of nonlinear load. Journal of Experimental & Theoretical Artificial Intelligence, (ahead-of-print), 1-18. |
|
84 |
|
Priest, B. W., Vuksani, E., Wagner, N., Tello, B., Carter, K. M., & Streilein, W. W. (2015, April). Agent-based simulation in support of moving target cyber defense technology development and evaluation. In Proceedings of the 18th Symposium on Communications & Networking (pp. 16-23). Society for Computer Simulation International. |
|
85 |
|
Wagner, N., Lippmann, R., Winterrose, M., Riordan, J., Yu, T., & Streilein, W. W. (2015, April).Agent-based simulation for assessing network security risk due to unauthorized hardware. In Proceedings of the Symposium on Agent-Directed Simulation (pp. 18-26). Society for Computer Simulation International. |
|
86 |
|
Singh, Y., & Chugh, U. Clustering, Information Fusion and Event Detection in Wireless Sensor Networks: A Review. |
|
87 |
|
Houngbo, P. J., & Hounsou, J. T. (2015). Measuring Information Security: Understanding And Selecting Appropriate Metrics. International Journal of Computer Science and Security (IJCSS), 9(2), 108. |
|
88 |
|
Rani, C., & Goel, S. CSAAES: An Expert System for Cyber Security Attack Awareness. |
|
89 |
|
Rasheed, Z. A. S. (2015). ’Steganography Technique for Binary Text Image. International Journal of Science and Research (IJSR) ISSN (Online), 2319-7064. |
|
90 |
|
Rubab, S., & Javed, Y. (2015). Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption. International Journal of Computer Network and Information Security (IJCNIS), 7(2), 15. |
|
91 |
|
Sahu, P., & Chourasia, B. (2015). State of the Art in Modern Steganography-A review. International Journal of Advanced Electronics and Communication Systems, 4(1). |
|
92 |
|
Houngbo, P. J., & Hounsou, J. T. (2015). Measuring Information Security: Understanding And Selecting Appropriate Metrics. International Journal of Computer Science and Security (IJCSS), 9(2), 108. |
|
93 |
|
Sen, P., Ahmed, R. A., & Islam, M. R. (2015). A Study on E-Commerce Security Issues and Solutions. |
|
94 |
|
Aigbe, P., & Onibere, A. (2015). An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System. International Journal of Computer Applications, 122(18). |
|
95 |
|
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handling in the cloud. Computers & Security, 49, 45-69. |
|
96 |
|
Amann, P., & James, J. I. (2015). Designing robustness and resilience in digital investigation laboratories. Digital Investigation, 12, S111-S120. |
|
97 |
|
Agarwal, R., & Kothari, S. (2015). Review of Digital Forensic Investigation Frameworks. In Information Science and Applications (pp. 561-571). Springer Berlin Heidelberg. |
|
98 |
|
Jafari, F., & Satti, R. S. (2015). Comparative Analysis of Digital Forensic Models. Journal of Advances in Computer Networks, 3(1). |
|
99 |
|
Satti, R. S., & Jafari, F. (2015). Domain Specific Cyber Forensic Investigation Process Model. Journal of Advances in Computer Networks, 3(1). |
|
100 |
|
Jiang, J. G., Yang, B., Lin, S., Zhang, M. X., & Liu, K. Y. (2015, April). A Practical Approach for Digital Forensic Triage. In Applied Mechanics and Materials (Vol. 742, pp. 437-444). |
|
101 |
|
Prayudi, Y., & Sn, A. (2015). Digital Chain of Custody: State of the Art. International Journal of Computer Applications, 114(5), 1-9. |
|
102 |
|
Satti, R. S., & Jafari, F. (2015). Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes. |
|
103 |
|
Saleem, S. (2015). Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics. |
|
104 |
|
Mushtaque, K., Ahsan, K., & Umer, A. (2015). DIGITAL FORENSIC INVESTIGATION MODELS: AN EVOLUTION STUDY. JISTEM-Journal of Information Systems and Technology Management, 12(2), 233-243. |
|
105 |
|
Mushtaque, K., Ahsan, K., & Umer, A. (2015).Digital Forensic investigation models:an evolution study. JISTEM-Journal of Information Systems and Technology Management, 12(2), 233-243. |
|
106 |
|
Kurniati, F. T., Santoso, A. J., & Suyoto, S. (2015).printer forensik untuk identifikasi dokumen cetak. semnasteknomedia online, 3(1), 5-10. |
|
107 |
|
Prayudi, Y., & Ashari, A. A Study on Secure Communication for Digital Forensics Environment. |
|
108 |
|
KHAWASE, M. D. S.,deshmukh, m., kuche, s., & mahalle, a. international journal of pure and applied research in engineering and technology. |
|
109 |
|
Swamy, V., Sampath, S., Nanjesh, B. R., & Sagar, B. B. (2015). Development of Common Parallel Programming Platform for MPI and PVM. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 95-103). Springer India. |
|
110 |
|
Yadav, M. R., & Gill, N. S. (2015). Improvement in Performance of RSA Algorithm Using SLSB. |
|
111 |
|
Bhanot, R., & Hans, R. (2015). A Review and Comparative Analysis of Various Encryption Algorithms. International Journal of Security & Its Applications, 9(4). |
|
112 |
|
Farajallah, M. (2015). Chaos-based crypto and joint crypto-compression systems for images and videos (Doctoral dissertation, UNIVERSITE DE NANTES). |
|
113 |
|
Ayokunle, T. B., Ogah, U. S., & Binitie, A. P. (2015). Encryption and Decryption of Messages Using Advanced Encryption Standard and System of Nonlinear Equations. International Journal of Pure and Applied Sciences and Technology, 27(1), 1. |
|
114 |
|
Kulkarni, s. international journal of pure and applied research in engineering and technology. |
|
115 |
|
Razzak, I. (2015). Malarial Parasite Classification using Recurrent Neural Network. International Journal of Image Processing (IJIP), 9(2), 69. |
|
116 |
|
DAS, D., Mukherjee, R., & Chakraborty, C. (2015). Computational microscopic imaging for malaria parasite detection: a systematic review. Journal of microscopy. |
|
117 |
|
Razzak, M. I. (2015). Automatic Detection and Classification of Malarial Parasite. International Journal of Biometrics and Bioinformatics (IJBB), 9(1), 1. |
|
118 |
|
Savkare, S. S., & Narote, S. P. (2015, January). Automated system for malaria parasite identification. In Communication, Information & Computing Technology (ICCICT), 2015 International Conference on (pp. 1-4). IEEE. |
|
119 |
|
Chayadevi, M. L., & Raju, G. T. (2015). Automated Colour Segmentation of Malaria Parasite with Fuzzy and Fractal Methods. In Computational Intelligence in Data Mining-Volume 3 (pp. 53-63). Springer India. |
|
120 |
|
Hutagalung, B. T., & Syahputra, A. watermarking citra digital dengan information dispersal algorithm (ida) dan algoritma huffman. |
|
121 |
|
Alabaichi, A. M. (2015). A Dynamic 3D S-Box based on Cylindrical Coordinate System for Blowfish Algorithm. Indian Journal of Science and Technology, 8(30). |
|
122 |
|
Alabaichi, A., & Salih, A. I. (2015, October). Enhance security of advance encryption standard algorithm based on key-dependent S-box. In Digital Information Processing and Communications (ICDIPC), 2015 Fifth International Conference on (pp. 44-53). IEEE. |
|
123 |
|
Pourahmad, S., Azad, M., & Paydar, S. (2015). Diagnosis of Malignancy in Thyroid Tumors by Multi-Layer Perceptron Neural Networks With Different Batch Learning Algorithms. Global Journal of Health Science, 7(6), p46. |
|
124 |
|
Jasim, O. K., Abbas, S., Horbaty, E. S. M., & Salem, A. B. M. (2015). Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm. arXiv preprint arXiv:1503.04796. |
|
125 |
|
Kazlauskas, K., Vaicekauskas, G., & Smaliukas, R. (2015). An Algorithm for Key-Dependent S-Box Generation in Block Cipher System. INFORMATICA, 26(1), 51-65. |
|
126 |
|
Shing, L. P., Shing, L. H., Shing, M. L., & Shing, C. C. (2015). modeling data integrity under stochastic linear constraints. International Journal of Electronic Commerce Studies, 6(2), 233-242. |
|
127 |
|
Kariuki, P. (2015). generic process model for android smartphones live memory forensics (Doctoral dissertation). |
|
128 |
|
Jeon, S., Fujita, H., & Toshiyoshi, H. (2015). A MEMS-based interactive laser scanning display with a collocated laser range finder. IEICE Electronics Express, 12(10), 20150072-20150072. |
|
129 |
|
Fister, I., Ljubic, K., Suganthan, P. N., & Perc, M. (2015). Computational intelligence in sports: Challenges and opportunities within a new research domain. Applied Mathematics and Computation, 262, 178-186. |
|
130 |
|
Korhonen, H. (2015). Improving Transparency in Demand-Supply Chain With Visual Business Intelligence Tools. |
|
131 |
|
Alhirz, H., & Sajeev, A. S. M. (2015). Do cultural dimensions differentiate ERP acceptance? A study in the context of Saudi Arabia. Information Technology & People, 28(1), 163-194. |
|
132 |
|
Almishal, A., & Alsaud, M. A. (2015). Implementing ERP Systems in Government: Case Study of Saudi Organization. Lecture Notes on Software Engineering, 3(2), 120. |
|
133 |
|
Hammad, J. (2015). A Comparative Study between Various Sorting Algorithms. IJCSNS, 15(3), 11. |
|
134 |
|
Bjeljac, P., Zecevic, I., & Perisic, B. (2015, May). Integrating Learning Management System and Faculty Information System-service oriented approach. In Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2015 38th International Convention on (pp. 773-777). IEEE. |
|
135 |
|
Kavila, S. D., & Radhika, Y. (2015).Extractive Text Summarization Using Modified Weighing and Sentence Symmetric Feature Methods. |
|
136 |
|
Loto, m., & durán, e. B. (2015). Diseño de una aplicación móvil personalizada de apoyo al aprendizaje de redes de computadoras. In x congreso sobre tecnología en educación & educación en tecnología (te & et)(corrientes, 2015). |
|
137 |
|
Koondhar, m. Y., rind, m. M., chandio, f. H., & shah, a. (2015). Pervasive learning environment with emerging technologies and learning transformation. In international multi-topic conference. |
|
138 |
|
Mohy, N. N., Mokhtar, H. M., & El-Sharkawi, M. E. (2015, July).Delegation enabled provenance-based access control model. In Science and Information Conference (SAI), 2015 (pp. 1374-1379). IEEE. |
|
139 |
|
Dewi, D. (2015).Identifikasi goresan dasar mandarin dengan metode multilayer perceptron.CSRID Journal, 7(1), 12-23. |
|
140 |
|
Yadav, M., & Dhankhar, A. (2015). A-Review on Image Steganography. International Journal for Innovative Research in Science and Technology, 2(2), 243-248. |
|
141 |
|
Yahlali, M., & Chouarfia, A. (2015). Towards a software component assembly evaluation. Software, IET, 9(1), 1-6. |
|
142 |
|
Aigbe, P., & Onibere, A. (2015).An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System. International Journal of Computer Applications, 122(18). |
|
143 |
|
Alhazmi, O. H. Evaluating Disaster Recovery Plans Using Computer Aided Disaster Recovery Tools. |
|
144 |
|
Das, S., & Ghosh, R. (2015). Study of randomness in AES ciphertexts produced by various types of dynamic S-boxes. International Journal of Information and Communication Technology, 7(6), 537-561. |
|
145 |
|
Kaur, P. J., Kaul, V., Bharadi, V. A., & Narayankhedkar, S. K. Article: Development of Security Enhancement Techniques for 3G/4G Networks}. In IJAIS Proceedings on International Conference and Workshop on Communication, Computing and Virtualization} (pp. 41-46). |
|
146 |
|
Kalaiselvi, K., & Mangalam, H. (2015). Power efficient and high performance VLSI architecture for AES algorithm. Journal of Electrical Systems and Information Technology. |
|
147 |
|
Vaicekauskas, G. BLOKINIŲ ŠIFRŲ ANALIZĖ IR KOKYBĖS PAGERINIMAS. |
|
148 |
|
Ahamed, S. K., Naidu, M. M., & Reddy, C. S. R. (2015). MOST INFLUENTIAL OBSERVATIONS-SUPER EFFICIENCY. International Journal on Computer Science and Engineering, 7(9), 82. |
|
149 |
|
Ibrahim, M. H. AATCT: Anonymously Authenticated Transmission on the Cloud with Traceability. International Journal of Advanced Computer Science & Applications, 1(6), 251-259. |
|
150 |
|
Pan Lan Lan Yuchi school Biao , Huan Lei , institutions, & statistics . (2015 ) . A rapid assessment authoritative DNS DDoS attacks impact on the way services Computer Application Research , 32 ( 11 ) , 3456-3459 |
|
151 |
|
Nagarajan, P., & Perumal, G. (2015). Detection of Denial of Service Attack in Cloud using Fuzzy Time Series Analysis and EM Algorithm. International Journal of Advancements in Computing Technology, 7(5), 25. |
|
152 |
|
KARIMIZADEH, M. M., RAFEAZADEH, E., AMIRI, P., & KHOLGHNIK, D. (2015). Enhancing and Optimization Sorting Algorithms: An Empirical Study. Cumhuriyet Science Journal, 36(6), 254-266. |
|
153 |
|
Faujdar, N., & Ghrera, S. P. (2015, April). Analysis and Testing of Sorting Algorithms on a Standard Dataset. In Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on (pp. 962-967). IEEE. |
|
154 |
|
Biedermann, S. (2015). Transparent Security Services for an Infrastructure-as-a-Service Cloud. |
|
155 |
|
Redundancy, m. (2015). selection of robust feature subsets for phish webpage prediction using maximum relevance and minimum redundancy criterion. journal of theoretical and applied information technology, 81(2). |
|
156 |
|
Yaramasa, T., & Kishore, G. K. (2015, January). Enhanced Privacy and Surveillance for Online Social Networks. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 189-196). Springer International Publishing. |
|
157 |
|
Khalane, V. P., & Bhadade, U. S. A Review on Encryption Techniques in Signal Processing. |
|
158 |
|
Khan, M., Jamil, A., Haleem, F., Zahoor, J., Muhammad, S., & Sung Wook, B. (2015). A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. KSII Transactions on Internet and Information Systems (TIIS), 9(5), 1938-1962. |
|
159 |
|
Muhammad, K., Ahmad, J., Sajjad, M., & Zubair, M. (2015). Secure Image Steganography using Cryptography and Image Transposition. arXiv preprint arXiv:1510.04413. |
|
160 |
|
Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., & Baik, S. W. (2015). A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications, 1-27. |
|
161 |
|
Al-Dmour, H., & Al-Ani, A. (2015, November). A Medical Image Steganography Method Based on Integer Wavelet Transform and Overlapping Edge Detection. In Neural Information Processing (pp. 436-444). Springer International Publishing. |
|
162 |
|
Olaniyi, O. M., Arulogun, O. T., Omidiora, O. E., & Okediran, O. O. (2015). Implementing generic security requirements in e–voting using modified stegano–cryptographic approach. International Journal of Information and Computer Security, 7(1), 64-90. |
|
163 |
|
Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., & Okediran, O. O. (2015). Enhanced Stegano-Cryptographic Model for Secure Electronic Voting. Journal of Information Engineering and Applications, 5(4), 1-15. |
|
164 |
|
Badhan, S., & Juneja, M. (2015). A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks. In Intelligent Computing, Communication and Devices (pp. 183-190). Springer India. |
|
165 |
|
Mehndiratta, A. (2015). Data Hiding System Using Cryptography & Steganography: A Comprehensive Modern Investigation. |
|
166 |
|
Wahab, O. F. A., Badawy, M. B., Elshakankiry, O. A., & El-sayed, H. S. (2015). Utilizations of Reversible Lossless Data Hiding Techniques in Video Sequences. Int. J. Com. Net. Teach, 3(1). |
|
167 |
|
Din, R., Yusof, S. A. M., Amphawan, A., Hussain, H. S., Yaacob, H., Jamaludin, N., & Samsudin, A. (2015). Performance Analysis on Text Steganalysis Method Using A Computational Intelligence Approach. Proceeding of the Electrical Engineering Computer Science and Informatics, 2(1). |
|
168 |
|
Azizifard, A., Qermezkon, M., & Farshidi, R. Information Steganography within 3D Images Using Residue Number System. |
|
169 |
|
Deepa, S., & Umarani, R. (2015). A Prototype for Secure Information using Video Steganography. image, 4(8). |
|
170 |
|
Liu, L., Chang, C. C., & Wang, A. (2015). Reversible data hiding scheme based on histogram shifting of n-bit planes. Multimedia Tools and Applications, 1-16. |
|
171 |
|
Ahmad, M., Jung, L. T., & Bhuiyan, M. A. A. (2015). On Fuzzy Semantic Similarity Measure for DNA Coding. Computers in Biology and Medicine. |
|
172 |
|
Anvary, M. D., Feshki, M. G., & Ahrabi, A. A. A. (2015). Efficient Security Alert Management System. International Journal of Computer Science and Security (IJCSS), 9(4), 218. |
|
173 |
|
Feshki, M. G., Sojoodi, O., & Anvary, M. D. (2015). Managing Intrusion Detection Alerts Using Support Vector Machines. International Journal of Computer Science and Security (IJCSS), 9(5), 266. |
|
174 |
|
Rai, P. K., & Singh, P. (2015). Studies and Analysis of Popular Database Models. |
|
175 |
|
Khadka, I. The accuracy of location services and the potential impact on the admissibility of GPS Based evidence in court cases. |
|
176 |
|
Chuchuen, C., & Chanvarasuth, P. (2015). Relationship between Phishing Techniques and User Personality Model of Bangkok Internet Users. |
|
177 |
|
Jain, A., & Buksh, B. Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques. |
|
178 |
|
Babatunde, I. G. (2015). Fingerprint Matching Using Minutiae-Singular Points Network. International Journal of Signal Processing, Image Processing and Pattern Recognition, 8(2), 375-388. |
|
179 |
|
Narayanan, R. C. Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Recognition Biometric System. |
|
180 |
|
Patel, A. (2015). Risk based prioritization of Asthma Burden Using Artificial Neuro Fuzzy Inference System. |
|
181 |
|
Chowdhury, C. R., & Saha, B. (2015). Efficient Fingerprint Matching Based Upon Minutiae Extraction. International Journal of Advanced Computer Research, 5(21), 347. |
|
182 |
|
Ahmad, F., Darbari, M., & Asthana, R. (2015). Different Approaches of Soft Computing Techniques (Inference System) which are used in Clinical Decision Support System for Risk based Prioritization. Asian Journal of Computer and Information Systems, 3(1). |
|
183 |
|
Iwasokun, G. B., Udoh, S. S., & Akinyokun, O. K. (2015). Multi-Modal Biometrics: Applications, Strategies and Operations. Global Journal of Computer Science and Technology, 15(2). |
|
184 |
|
Owusu, E., Gavua, E. K., & Zhan, Y. Z. (2015). Facial Expression Recognition–A Comprehensive Review. The Fourth Edition of the International Journal of Technology and Management Research, 1(4), 29-46. |
|
185 |
|
Tamimi, A. A., AL-Allaf, O. N., & Alia, M. A. (2015). Real-Time Group Face-Detection for an Intelligent Class-Attendance System. |
|
186 |
|
Anissa, B., Naouar, B., Arsalane, Z., & Jamal, K. (2015, March). Face recognition:Compar ative study between linear and non linear dimensionality reduction methods. In Electrical and Information Technologies (ICEIT), 2015 International Conference on (pp. 224-228). IEEE. |
|
187 |
|
Vijayalakshmi, V., Sharmila, R., & Shalini, R. (2015, March). Hierarchical key management scheme using Hyper Elliptic Curve Cryptography in Wireless Sensor Networks. In Signal Processing, Communication and Networking (ICSCN), 2015 3rd International Conference on (pp. 1-5). IEEE. |
|
188 |
|
Tomar, G. S., Kevre, P., & Shrivastava, L. Energy model based Performance Analysis of cluster based wireless sensor network. |
|
189 |
|
Ye, F., Qian, Y., & Hu, R. Q. (2015). HIBaSS: hierarchical identity-based signature scheme for AMI downlink transmission. Security and Communication Networks. |
|
190 |
|
Aboud, S., & Al-fayoumi, M. (2012). proxy signature scheme for warrant partial delegation. In The International Conference on Computing, Networking and Digital Technologies (ICCNDT2012) (pp. 107-113). The Society of Digital Information and Wireless Communication. |
|
191 |
|
Jain, M., & Tripathi, K. C. Auto Associative Neural Networks for Nonlinear Principal Components Analysis of Sea Surface Temperature Anomalies in Indian Ocean. |
|
192 |
|
Fayed, S., Youssef, S. M., El-Helw, A., Patwary, M., & Moniri, M. (2015). Adaptive compressive sensing for target tracking within wireless visual sensor networks-based surveillance applications. Multimedia Tools and Applications, 1-25. |
|
193 |
|
Kishore, N. (2015). Parllel hashing algorithms for security and Forensic Applicatons. |
|
194 |
|
Fasola, O. S. (2015). Perceptions and acceptance of librarians towards using Facebook and Twitter to promote library services in Oyo State, Nigeria. The Electronic Library, 33(5), 870-882. |
|
195 |
|
Claybaugh, C. C., Haried, P., & Yu, W. B. (2015). Diffusion of a Professional Social Network: Business School Graduates in Focus. International Journal of Human Capital and Information Technology Professionals (IJHCITP), 6(4), 80-96. |
|
196 |
|
Caldwell, J. M. (2015). Going where students are: comparing faculty and student uses and perceptions of social networking in higher education. |
|
197 |
|
Borena, B., Belanger, F., & Egigu, D. (2015, January). Information Privacy Protection Practices in Africa: A Review Through the Lens of Critical Social Theory. In System Sciences (HICSS), 2015 48th Hawaii International Conference on (pp. 3490-3497). IEEE. |
|
198 |
|
Larsen, E. S. H., & Seim, G. G. (2015). Entering a Developing Country with a Solar Cooker: Strategies for Start-ups. |
|
199 |
|
Jhaveri, R. H., & Patel, N. M. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks, 1-18. |
|
200 |
|
Mahajan, N., Bedi, R., & Gupta, S. K. Defending Against Byzantine and Resource Consumption Attacks by Malicious Nodes in MANETs. |
|
201 |
|
Mittal, V. (2015). Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach. Prevention, 4(5). |
|
202 |
|
Yadav, N. A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks. |
|
203 |
|
Sharma, M., & Singla, R. Impact of Jamming Attack in Performance of Mobile Ad hoc Networks. |
|
204 |
|
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1. |
|
205 |
|
Caselli, M., Zambon, E., & Kargl, F. (2015, April). Sequence-aware Intrusion Detection in Industrial Control Systems. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (pp. 13-24). ACM. |
|
206 |
|
Feshki, M. G., Sojoodi, O., & Anvary, M. D. (2015). Managing Intrusion Detection Alerts Using Support Vector Machines. International Journal of Computer Science and Security (IJCSS), 9(5), 266. |
|
207 |
|
Anvary, M. D., Feshki, M. G., & Ahrabi, A. A. A. (2015). Efficient Security Alert Management System. International Journal of Computer Science and Security (IJCSS), 9(4), 218. |
|
208 |
|
Gunduz, S., Arslan, B., & Demirci, M. (2015, December).A Review of Machine Learning Solutions to Denial-of-Services Attacks in Wireless Sensor Networks. In 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA) (pp. 150-155). IEEE. |
|
209 |
|
Chaudhry, M. T., & Sher, M. Secure Group Based Biometric Authentication Approach for Mobile Ad hoc Networks. |
|
210 |
|
Padma, T., Pillai, J. S., & Ambili, P. S. Continued Fraction Based Sequences for Content Based Image Authentication. |
|
211 |
|
Pillai, J. S., & Padma, T. ParQuoSCI: Pseudorandom Partial Quotient Sequences for Content based Image Authentication. |
|
212 |
|
Tazir, M. L., Azouaoui, O., Hazerchi, M., & Brahimi, M. (2015, July). Mobile robot path planning for complex dynamic environments. In Advanced Robotics (ICAR), 2015 International Conference on (pp. 200-206). IEEE. |
|
213 |
|
Mobadersany, P., Khanmohammadi, S., & Ghaemi, S. A fuzzy multi-stage path-planning method for a robot in a dynamic environment with unknown moving obstacles. Robotica, 1-17. |
|
214 |
|
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1. |
|
215 |
|
Anchor, Nafisa, & Abdul race. (2015). Identify phishing websites in internet banking using optimization algorithm inclined pages. Electronic and cyber defense Journal, 3 (1). |
|
216 |
|
Idris, M. I. A., Elsid, A. G., & Alhady, M. N. (2015). Enhancement the Ad-hoc On-demand Distance Vector of Network. |
|
217 |
|
Elizabeth Jim, L., & Gregory, M. A. (2015, November). State analysis of Mobile Ad Hoc Network nodes. In Telecommunication Networks and Applications Conference (ITNAC), 2015 International (pp. 314-319). IEEE. |
|
218 |
|
Yibyeonggwan , and jeongeunhui . (2015) . Efficient wormhole attack detection and removal techniques designed for the safe route on VANET. Security Engineering Research Institute Journal of Security Engineering, 12 (4), 415-426. |
|
219 |
|
Bhatta, J., & Pandey, L. P. (2015, December). Performance analysis of various optimization techniques for elliptic curve cryptosystems on resource-constrained devices. In 2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA) (pp. 1-7). IEEE. |
|
220 |
|
Zellagui, M., Benabid, R., Boudour, M., & Chaghi, A. (2015). Mixed Integer Optimization of IDMT Overcurrent Relays in the Presence of Wind Energy Farms Using PSO Algorithm. Periodica Polytechnica-Electrical Engineering and Computer Science, 59(1), 7-19. |
|
221 |
|
Khurana, M., & Massey, K. (2015). Swarm algorithm with adaptive mutation for airfoil aerodynamic design. Swarm and Evolutionary Computation, 20, 1-13. |
|
222 |
|
Neshat, M., & Sepidname, G. (2015). A new hybrid optimization method inspired from swarm intelligence: Fuzzy adaptive swallow swarm optimization algorithm (FASSO). Egyptian Informatics Journal, 16(3), 339-350. |
|
223 |
|
Adewumi, A. O., & Arasomwan, M. A. (2015). Improved Particle Swarm Optimizer with Dynamically Adjusted Search Space and Velocity Limits for Global Optimization. International Journal on Artificial Intelligence Tools. |
|
224 |
|
Chenshou Wen. (2015) based on the centroid and adaptive inertia weight index improved particle swarm optimization. Computer Engineering and Applications, 51 (5). |
|
225 |
|
Chenshou Wen . ( 2015 ) . Based on the centroid and adaptive inertia weight index improved particle swarm algorithm . Journal of Computer Applications , 35 ( 3 ) , 675-679. |
|
226 |
|
Kessentini, S., & Barchiesi, D. Particle Swarm Optimization with Adaptive Inertia Weight.Chen, R. M., & Huang, S. C. (2015, August). Particle swarm optimization for scheduling problems by curve controlling based global communication topology. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on (pp. 1716-1720). IEEE. |
|
227 |
|
Yang, C. T. (2015). Based on plant location and to adapt to deviate from the value of the governor enhanced particle swarm optimization method . Kung University Thesis Institute of Information Management , 1-60 . |
|
228 |
|
Iwasokun, G. B., Udoh, S. S., & Akinyokun, O. K. (2015). Multi-Modal Biometrics: Applications, Strategies and Operations. Global Journal of Computer Science and Technology, 15(2). |
|
229 |
|
Mijac, M., & Stapic, Z. (2015, January). Reusability Metrics of Software Components: Survey. In Central European Conference on Information and Intelligent Systems (p. 221). Faculty of Organization and Informatics Varazdin. |
|
230 |
|
Mijac, M., & Stapic, Z. (2015, January). Reusability Metrics of Software Components: Survey. In 26th Central European Conference on Information and Intelligent Systems (CECIIS 2015). |
|
231 |
|
Mandala, S., Ngadi, M. A., Sharif, J. M., Zahid, M. S. M., & Mohamed, F. (2015). Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks. International Journal of Embedded Systems, 7(3-4), 296-305. |
|
232 |
|
Hussain, M. A. (2015). Energy Efficient Intrusion Detection Scheme with Clustering for Wireless Sensor Networks. TELKOMNIKA Indonesian Journal of Electrical Engineering, 15(1), 128-141. |
|
233 |
|
masoud Javidi, M., & Aliahmadipour, L. (2015). Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs. Computer Engineering and Applications, 4(1). |
|
234 |
|
Samaras, N. S., Kokkinos, K., Chaikalis, C., & Vlachos, V. (2015). On intrusion detection in opportunistic networks. International Journal of Innovation and Regional Development, 6(3), 222-242. |
|
235 |
|
Meenatchi, I., & Palanivel, K. An Enhanced Cross layer intrusion detection and adaptive response mechanism for MANETs. |
|
236 |
|
EL MOURABIT, Y. O. U. S. E. F., toumanari, a., bouirden, a., & el moussaid, n. a. d. i. a. (2015). a comparative evaluation of intrusion detection techniques in wireless sensor network. journal of theoretical & applied information technology, 76(1). |
|
237 |
|
Jacobs, M., Chang, L. C., Pulkkinen, A., & Romano, M. (2015). Automatic analysis of double coronal mass ejections from coronagraph images. Space Weather, 13(11), 761-777. |
|
238 |
|
RAVI, M., & basavaprasad, b. a comparative study on segmentation methods for medical imaging. |
|
239 |
|
Alimi, I. A., & Aboderin, O. (2015). Enhanced encryption algorithm based on a modified confusion and diffusion scheme. American Journal of Mobile Systems, Applications and Services, 1(1), 20-29. |
|
240 |
|
Saqib, Z., Shahid, M. A., & Ashraf, M. U. Encryption and Decryption Using Automata Theory. |
|
241 |
|
Gandhi, R. A., & Gosai, A. M. (2015). A Study on Current Scenario of Audio Encryption. International Journal of Computer Applications, 116(7), 13-17. |
|
242 |
|
Amounas, f. international journal of engineering sciences & research technology a multi-level approach of elliptic curve cryptosystem for enhanced security of amazigh alphabet using cellular automata. |
|
243 |
|
Prasad, M. R. (2015). Improving RGB Data Security with Advance Cryptography Algorithm. |
|
244 |
|
Gosai, D. A. M. (2015). International Journal of Computer Applications. |
|
245 |
|
Kalidasan, S., & Pandian, P. Available Online through Research Article www. ijptonline. com. |
|
246 |
|
Wong, C. H. H. (2015). A study of mobile learning for Guangzhou’s University students. |
|
247 |
|
Srivastava, S., & Misra, M. (2015). Tracking technology trajectory through regression modelling: a retrospective techno-analysis. Technology Analysis & Strategic Management, 27(4), 420-436. |
|
248 |
|
Sumathi, A., & Sundaram, B. V. (2015). An ANN Approach in Ensuring CIA Triangle using an Energy based Secured Protocol E-AODV for Enhancing the Performance in MANETS. Indian Journal of Science and Technology, 8(34). |
|
249 |
|
Das, J., & Das, P. (2015). An Overview of Wireless Ad hoc Networks. International Journal of Advanced Research in Computer Science, 6(1). |
|
250 |
|
Naheed, M., Mahmood, H., & Murtza, I. (2015, October). Secure multipath routing using link compromise metric in mobile ad hoc networks. In Electrical Engineering (RAEE), 2015 Symposium on Recent Advances in (pp. 1-5). IEEE. |
|
251 |
|
Chauhan, A., Rani, P., & Student, M. T. A Detail Review of Routing Attacks in Mobile Ad Hoc Networks. |
|
252 |
|
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1. |
|
253 |
|
Jin-peng, Q., Jie, Q., Fang, P., & Tao, G. (2015, July). Multi-channel detection for abrupt change based on the Ternary Search Tree and Kolmogorov statistic method. In Control Conference (CCC), 2015 34th Chinese (pp. 4968-4973). IEEE. |
|
254 |
|
Akila, A., & Chandra, E. (2015). Word based tamil speech recognition using temporal feature based segmentation. ictact Journal on Image & Video Processing, 5(4). |
|
255 |
|
Ramli, I. (2015). Regular paper Sentence boundary detection without speech recognition: A case of an under-resourced language. J. Electrical Systems, 11(3), 308-318. |
|
256 |
|
Das, A. P., & Thampi, S. M. (2015, August). Secure communication in mobile underwater wireless sensor networks. In Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on (pp. 2164-2173). IEEE. |
|
257 |
|
Ramezani, H., Fazel, F., Stojanovic, M., & Leus, G. (2015). Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization. |
|
258 |
|
Carneiro, J. H. C. C. (2015). localização de emissores acústicos em ambientes submarinos com redes de sensores móveis (doctoral dissertation, universidade federal do rio de janeiro). |
|
259 |
|
Dell'Erba, R. (2015). Determination of Spatial Configuration of an Underwater Swarm with Minimum Data. Int J Adv Robot Syst, 12, 97. |
|
260 |
|
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1. |
|
261 |
|
Emam, M. M., Aly, A. A., & Omara, F. A. A Modified Image Steganography Method based on LSB. |
|
262 |
|
Thanekar, S. A. (2015). Eight Pixel Pairs Value Differencing Image Steganography. IJETT, 2(1). |
|
263 |
|
Sakthivel, S. M., & Ravi Sankar, A. (2015, February). A VLSI architecture for watermarking of grayscale images using weighted median prediction. In Electronics and Communication Systems (ICECS), 2015 2nd International Conference on (pp. 1128-1131). IEEE. |
|
264 |
|
Amsaveni, A., & Vanathi, P. T. (2015). A comprehensive study on image steganography and steganalysis techniques. International Journal of Information and Communication Technology, 7(4-5), 406-424. |
|
265 |
|
Deshmukh, M. A. P., & Suralkar, S. R. (2015). Literature Survey-Digital Watermarking on Camera Captured Color Images. |
|
266 |
|
Manjula, G. R., & Danti, A. (2015). A novel hash based least significant bit (2-3-3) image steganography in spatial domain. arXiv preprint arXiv:1503.03674. |
|
267 |
|
Swain, G., & Lenka, S. K. (2015). A novel steganography technique by mapping words with LSB array. International Journal of Signal and Imaging Systems Engineering, 8(1-2), 115-122. |
|
268 |
|
Al-Hada, M., Naser, A. M., & Al-Thamary, M. Hide Image in Image Based on LSB Replacement and Arnold Transform. |
|
269 |
|
Tajuddin, T. B., & Manaf, A. A. Forensic Investigation and Analysis on Digital Evidence Discovery through Physical Acquisition on Smartphone. |
|
270 |
|
Martin, K. K. (2015). An Investigation of Digital Forensic Models Applicable in the Public Sector (A case of Kenya National Audit Office) (Doctoral dissertation). |
|
271 |
|
Lin, T. S., Lin, I. L., & Leu, F. Y. (2015, July). Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015 9th International Conference on (pp. 420-425). IEEE. |
|
272 |
|
Rauter, S., Fister, I., & Fister Jr, I. (2015). How to Deal with Sports Activity Datasets for Data Mining and Analysis: Some Tips and Future Challenges. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 7(2), 27-37. |
|
273 |
|
Antonio, T., & Paramita, A. S. (2015). Feature Selection Technique Impact for Internet Traffic Classification Using Naïve Bayesian. Jurnal Teknologi, 72(5). |
|
274 |
|
Paramita, A. S. (2014). Feature Selection Technique Using Principal Component Analysis For Improving Fuzzy C-Mean Internet Traffic Classification. Australian Basic and Applied Sciences (AJBAS): 2014 International on Engineering Conference on Sciences and Technology Innovation–ISSN: 1997-8178–American-Eurasian Network for Scientific Information (AENS |
|
275 |
|
Paramita, A. S. (2016). Principal Feature Selection Impact for Internet Traffic Classification Using Naïve Bayes. In Proceedings of Second International Conference on Electrical Systems, Technology and Information 2015 (ICESTI 2015) (pp. 475-480). Springer Singapore. |
|
276 |
|
Mayilvaganan, M., & Geethamani, G. S. A Preliminary Survey on Genetic Algorithm Techniques. |
|
277 |
|
Persis, D. J., & Robert, T. P. (2015). Ant Based Multi-objective Routing Optimization in Mobile AD-HOC Network. Indian Journal of Science and Technology, 8(9), 875-888. |
|
278 |
|
Joardar, S., Bhattacherjee, V., & Giri, D. (2015). SiCaL: a swarm inspired congestion aware probabilistically load balance routing in MANETs. International Journal of Information and Communication Technology, 7(6), 585-606. |
|
279 |
|
Sensarma, D. (2015). AQTR: The Ant Based Qos Aware Improved Temporally Ordered Routing Algorithm for Manets. Available at SSRN 2556278. |
|
280 |
|
Karthikeyan, P., & Baskar, S. (2015). Genetic algorithm with ensemble of immigrant strategies for multicast routing in Ad hoc networks. Soft Computing, 19(2), 489-498. |
|
281 |
|
Cao, M. S., Pan, L. X., Gao, Y. F., Novák, D., Ding, Z. C., Lehký, D., & Li, X. L. Neural network ensemble-based parameter sensitivity analysis in civil engineering systems. Neural Computing and Applications, 1-8. |
|
282 |
|
Ravi, V., Koparkar, S., Raju, N. P., & Sridher, S. (2015). Improving retail banking loans recovery via data mining techniques: a case study from Indian market. International Journal of Electronic Customer Relationship Management, 9(2-3), 189-201. |
|
283 |
|
Teshnizi, S. H., & Ayatollahi, S. M. T. (2015). A Comparison of Logistic Regression Model and Artificial Neural Networks in Predicting of Student’s Academic Failure. Acta Informatica Medica, 23(5), 296. |
|
284 |
|
Senthilkumar, D., & Paulraj, S. Prediction of Low Birth Weight Infants and Its Risk Factors Using Data Mining Techniques. |
|
285 |
|
Jain, N., Sharma, A., & Sharma, A. Nav view search. |
|
286 |
|
Yunus, N. A. M., & Othman, M. (2015). Reliability Evaluation for Shuffle Exchange Interconnection Network. Procedia Computer Science, 59, 162-170. |
|
287 |
|
Gangele, S., & Dongre, A. (2015). Area Estimation for Web Browsing Performance of Users by Applying Numerical Method. International Journal of Computer Applications, 120(9), 6-11. |
|
288 |
|
Patidar, B., & Shivhare, R. R. (2015). Detection of Wormhole Attack using Round Trip Time and Node Workload. International Journal of Computer Applications, 112(11). |
|
289 |
|
Ramana, V. V., & Reddy, A. R. M. (2015). Secure routing in MANETs: a bio–inspired approach with honey bees. International Journal of Wireless and Mobile Computing, 8(1), 82-89. |
|
290 |
|
Lakshmi, A. A., & Valluvan, K. R. (2015). Support vector machine and fuzzy-based intrusion detection and prevention for attacks in MANETs. International Journal of Mobile Network Design and Innovation, 6(2), 63-72. |
|
291 |
|
Schoofs, M. HIV VULNERABILITY FOUND via STOCK MARKET ANALYSIS. |
|
292 |
|
Singh, N., & Shrivastava, L. (2015). Impact of Antenna model with the variation of speed for Reactive and Hybrid routing protocols in Mobile Ad-Hoc Networks. |
|
293 |
|
Rajkumar, B., & Narsimha, G. (2015). Trust-based light weight authentication routing protocol for MANET. International Journal of Mobile Network Design and Innovation, 6(1), 31-39. |
|
294 |
|
Sardana, A., Saini, A., Bedwal, T., & Tayal, R. (2015, March). Black hole attack's effect mobile ad-hoc networks (MANET). In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in (pp. 966-970). IEEE. |
|
295 |
|
Xiong, X., Feng, J., & Jiang, L. (2015, October). Automatic digital modulation classification for ORS satellite relay communication. In Wireless Communications & Signal Processing (WCSP), 2015 International Conference on (pp. 1-5). IEEE. |
|
296 |
|
Hussain, J., Lalmuanawma, S., & Chhakchhuak, L. (2015). A Novel Network Intrusion Detection System Using Two-Stage Hybrid Classification Technique. IJCCER, 3(2), 16-27. |
|
297 |
|
Mansouri, m., golsefid, m. t., & nematbakhsh, n. (2015). a hybrid intrusion detection system based on multilayer artificial neural network and intelligent feature selection. cumhuriyet science journal, 36(3), 2686-2692. |
|
298 |
|
JAWANJAL, S. D. INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY. |
|
299 |
|
Chaczko, Z., Jacak, W., & Luba, T. (2015). Computational Intelligence and Efficiency in Engineering Systems (Vol. 595). G. Borowik (Ed.). Springer. |
|
300 |
|
Dhankar, M. (2015). Network Security-Authentication Methods and Firewall. IITM Journal of Management and IT, 6(1), 73-79. |
|
301 |
|
Sekulski, R., & Woda, M. (2015). Authorial, Adaptive Method of Users’ Authentication and Authorization. In Computational Intelligence and Efficiency in Engineering Systems (pp. 171-184). Springer International Publishing. |
|
302 |
|
Sekulski, R., & Woda, M. (2015). A Novel Approach to Users Authentication and Authorization. Studia Informatica, 36(2), 5-22. |
|
303 |
|
Aujla, S., & Ummat, A. Task scheduling in Cloud Using Hybrid Cuckoo Algorithm. International Journal of Computer Networks and Applications (IJCNA), 2(3), 144-150. |
|
304 |
|
Mao, Y., Zhong, H., & Li, X. (2015, August). Hierarchical model-based associate tasks scheduling with the deadline constraints in the cloud. In Information and Automation, 2015 IEEE International Conference on (pp. 268-273). IEEE. |
|
305 |
|
Neves, D., Lourenco, N., & Horta, N. (2015, September). Scheduling evaluation tasks for increased efficiency of parallel analog IC synthesis. In Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design (SMACD), 2015 International Conference on (pp. 1-4). IEEE. |
|
306 |
|
Pop, F., Dobre, C., Cristea, V., Bessis, N., Xhafa, F., & Barolli, L. (2015). Reputation-guided evolutionary scheduling algorithm for independent tasks in inter-clouds environments. International Journal of Web and Grid Services, 11(1), 4-20. |
|
307 |
|
Kalra, M., & Singh, S. (2015). A review of metaheuristic scheduling techniques in cloud computing. Egyptian Informatics Journal, 16(3), 275-295. |
|
308 |
|
Hashimi, H., Hafez, A., & Mathkour, H. (2015). Selection criteria for text mining approaches. Computers in Human Behavior, 51, 729-733. |
|
309 |
|
El-Said, A. M., ELDESOKY, A., & Arafat, H. A. (2015). An Efficient Approach to Construct Object Model of Static Textual Structure with Dynamic Behavior Based on Q-learning. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 31(4), 1267-1289. |
|
310 |
|
Priest, B., Vuksani, E., Wagner, N., Tello, B., Carter, K. M., & Streilein, W. W. Agent-Based Decision Support for Moving Target Technology Deployment. |
|
311 |
|
Kaur, R., & Prabha, E. C. a novel technique of image steganography. |
|
312 |
|
Ujianto, e., harjoko, a., wardoyo, r., & moesriami, a. (2015). cascaded image steganography to increase robustness againts attack of the stego image. journal of theoretical & applied information technology, 79(3). |
|
313 |
|
Saputra, D. E., Supangkat, S. H., & Sutikno, S. (2015, November). Review and classification of electronic cash research. In 2015 International Conference on Information Technology Systems and Innovation (ICITSI) (pp. 1-5). IEEE. |
|
314 |
|
ESTEDLAL, M. M. (2015). Introduction and Evaluation of Computer Security Incident Response Team (CSIRT) in Organizations. Cumhuriyet Science Journal, 36(6), 246-253. |
|
315 |
|
Je, Y. M., You, Y. Y., & Na, K. S. Information Security Evaluation Using Multi-Attribute Threat Index. Wireless Personal Communications, 1-13. |
|
316 |
|
AL-Nasrawi, D. A., Almukhtar, A. F., & AL-Baldawi, W. S. (2015). From Arabic Alphabets to Two Dimension Shapes in Kufic Calligraphy Style Using Grid Board Catalog. Communications in Applied Sciences, 3(2). |
|
317 |
|
Montasari, R., Peltola, P., & Evans, D. (2015). Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations. In Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security (pp. 83-95). Springer International Publishing. |
|
318 |
|
History Xin Ling, & Zheng Shuli . ( 2015 ) . Research and development of network forensics of network security technology and applications, ( 2 ) , 110-111. |
|
319 |
|
Wen Min . ( 2015 ) . Design and implementation of information exchange security suite system. Network Security Technology and Application, ( 2 ) , 114-116. |
|
320 |
|
Gaber, A. M., Mazen, S., & Hassanei, E. E. (2015). Framework for Integrating Software Project Tasks and Change Requests. International Journal of Computer Applications, 125(12). |
|
321 |
|
Al-Azawi, R. K. (2015). Agent Oriented Software Engineering (AOSE) Approach to Game Development Methodology. |
|
322 |
|
Faculty of Computer Science And Information Technology - Universiti Putra Malaysia (UPM) |
|
323 |
|
Bistouni, F., & Jahanshahi, M. (2014). Improved extra group network: a new fault-tolerant multistage interconnection network. The Journal of Supercomputing, 69(1), 161-199. |
|
324 |
|
Vimina, E. R., & Jacob, K. P. (2014). An Evaluation of Image Matching Algorithms for Region Based Image Retrieval. International Journal of Advancements in Computing Technology, 6(6), 75. |
|
325 |
|
Sardar, M., Banerjee, S., Majhi, K., & Majumder, K. (2014). Trust Based Network Layer Attacks Prevention in MANET. In Emerging Trends in Computing and Communication (pp. 193-204). Springer India. |
|
326 |
|
Sardar, M., & Majumder, K. (2014). A New Trust Based Secure Routing Scheme in MANET. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 321-328). Springer International Publishing. |
|
327 |
|
Hassan, W. A., & Rahman, T. A. (2014). Coexistence model for compatibility between IMT-advanced and other wireless communication services. Wireless Personal Communications, 79(3), 2025-2039. |
|
328 |
|
Curilem, M., Vergara, J., San Martin, C., Fuentealba, G., Cardona, C., Huenupan, F., Chacón, M., Khan, M. S., Hussein,
W. & Yoma, N. B. (2014). Pattern recognition applied to seismic signals of the Llaima volcano (Chile): An analysis of the
events' features. Journal of Volcanology and Geothermal Research, 282, 134-147. |
|
329 |
|
Curilem, M., Huenupan, F., San Martin, C., Fuentealba, G., Cardona, C., Franco, L., Acuña, G., Chacón, M., (2014). Feature Analysis for the Classification of Volcanic Seismic Events Using Support Vector Machines. In Nature-Inspired Computation and Machine Learning (pp. 160-171). Springer International Publishing. |
|
330 |
|
Chaubey, A., Chelladurai, H., Lamba, S. S., (2014). Condition monitoring of rotating shaft using virtual instrumentation" 5th International & 26th All India Manufacturing Technology, Design and Research Conference (AIMTDR 2014), pp. 557-(1-6). IIT Guwahati, Assam, India. |
|
331 |
|
Adly, F., Yoo, P. D., Muhaidat, S., & Al-Hammadi, Y. (2014, May). Machine-Learning-Based Identification of Defect Patterns in Semiconductor Wafer Maps: An Overview and Proposal. In Parallel & Distributed Processing Symposium Workshops (IPDPSW), 2014 IEEE International (pp. 420-429). IEEE. |
|
332 |
|
Hussien, N. S., Sulaiman, S., & Shamsuddin, S. M. (2014). A Review of Intelligent Methods for Pre-fetching in Cloud Computing Environment. In Recent Advances on Soft Computing and Data Mining (pp. 647-656). Springer International Publishing. |
|
333 |
|
Selvakumar, L., Vivekanandan, K., & Amilan, S. (2014). New Linkage Learning Technique in Genetic Algorithm for Stock Selection Problem. International Journal of Advanced Research in Computer Science, 5(3). |
|
334 |
|
Gautam, G., & Yadav, D. (2014, August). Sentiment analysis of twitter data using machine learning approaches and semantic analysis. In Contemporary Computing (IC3), 2014 Seventh International Conference on (pp. 437-442). IEEE. |
|
335 |
|
Suresh Joseph, K. (2014). Genetic algorithm based hybrid imputation model for software effort estimation. |
|
336 |
|
Khan, R. A. (2014). Machine Learning: Techniques and Application. Artificial Intelligent Systems and Machine Learning, 6(5), 169-175. |
|
337 |
|
Spamers, A. J., & Grobler, H. Real-time Face Detection and Tracking from a Non-static Video Camera. |
|
338 |
|
Chung, S. H., Robertson, S., Minnaar, A., Cook, M., & Sun, L. (2014, January). Developing a Knowledge Management System Using an Ontological Approach in Global Organization. In ICISO (pp. 340-347). |
|
339 |
|
Yuan, Y., Chen, D., Li, Y., Yu, D., Yan, L., & Zhu, Z. (2014). The improved Shark Search Approach for Crawling Large-scale Web Data. International Journal of Multimedia & Ubiquitous Engineering, 9(8). |
|
340 |
|
Khanbary, L. M. O., & Vidyarthi, D. P. (2014). Agent-based energy constrained channel allocation in mobile computing using GA. International Journal of Wireless and Mobile Computing, 7(4), 388-399. |
|
341 |
|
Gaber, S. M. A., & Sumari, P. (2014). Predictive and content-aware load balancing algorithm for peer-service area based IPTV networks. Multimedia tools and applications, 70(3), 1987-2010. |
|
342 |
|
Banafar, H., & Sharma, S. Secure Cloud Environment Using Hidden Markov Model and Rule Based Generation. |
|
343 |
|
Sarhan, A., Elmogy, A. M., & Ali, S. M. (2014, December). New Web cache replacement approaches based on internal requests factor. In Computer Engineering & Systems (ICCES), 2014 9th International Conference on (pp. 383-389). IEEE. |
|
344 |
|
Venketesh, P. (2014). New approaches in web prefetching to improve content access by end users. |
|
345 |
|
Aswini, S., & Sundaram, G. S. (2014). Web cache memory compression for optimizing performance in web browsers. |
|
346 |
|
Bhatnagar, U., & Gahlout, A. A Modern Way of Framework Design for the Client Side Web Caching and Prefetching Technique. |
|
347 |
|
ShanmugaSundaram, G., & Aswini, S. Web cache memory compression for optimizing the performance in web browsers. |
|
348 |
|
Konate, K., & Abdourahime, G. A. Y. E. (2014). Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks. Compusoft, 3(12), 1425. |
|
349 |
|
Praveena, M., Thiribhurabhavan, R. M., Bhavadharini, R. M., & Karthik, D. S. (2014). An Enhanced Adaptive Security Protocol For Replica Attacks In Mobile Adhoc Networks. International Journal of software and hardware Research in Engg, 2(5), 79-83. |
|
350 |
|
Kadu, A. A., & S Nagdive, A. (2014). “Real-Time 3D Game Using Sixth Sense and Haptic Technology”: A Review. IJRCCT, 3(1), 042-047. |
|
351 |
|
Dhule, C., & Nagrare, T. (2014, April). Computer Vision Based Human-Computer Interaction Using Color Detection Techniques. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on (pp. 934-938). IEEE. |
|
352 |
|
Bhatia, S. M., & Sharma, A. K. (2014). Fuzzy Quality Function Deployment and Software Engineering-A Literature Review. Software Engineering and Technology, 6(6), 159-168. |
|
353 |
|
?icleanu, O. A. (2014). Nonlinear analysis on elliptic curves subspaces with cryptographic applications. Annals of the University of Craiova-Mathematics and Computer Science Series, 41(2), 292-299. |
|
354 |
|
Imran, K., Mahfooz, S., Rauf, A., & Khusro, S. (2014). Enhanced Authentication Scheme for Proxy Mobile IPv6. Life Science Journal, 11(3s). |
|
355 |
|
Shukla, D., & Verma, K. (2014). Bounded Area Estimation Using Simpson 3/8 Rule in Traffic Sharing Scenario in Computer Network. |
|
356 |
|
Gangele, S., Verma, K., & Shukla, D. (2014). Bounded Area Estimation of Internet Traffic Share Curve. International Journal of Computer Science and Business Informatics (IJCSBI), 10(1), 54-67. |
|
357 |
|
Tu, M. H. (2014). A method in a meaningful candidate styles mining image library of styles frequently . Sun Yat-sen Institute of Information Engineering Thesis , 1-102. |
|
358 |
|
?icleanu, O. A. (2014). Nonlinear analysis on elliptic curves subspaces with cryptographic applications. Annals of the University of Craiova-Mathematics and Computer Science Series, 41(2), 292-299. |
|
359 |
|
Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14(6), 10081-10106. |
|
360 |
|
Babrahem, A. S., Alharbi, E. T., Alshiky, A. M., Alqurashi, S. S., & Kar, J. (2014). Study of the Security Enhancements in Various E-Mail Systems. Journal of Information Security, 6(01), 1. |
|
361 |
|
Zhu, H., Hao, X., & Sun, Y. Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant. |
|
362 |
|
Babrahem, A. S., Alharbi, E. T., Alshiky, A. M., Alqurashi, S. S., & Kar, J. Scientific Research Publishing. |
|
363 |
|
Varsaki, E. E., Fotopoulos, V., & Skodras, A. N. (2014). A discrete Gould transform data hiding scheme. Mathematical Methods in the Applied Sciences, 37(2), 283-288. |
|
364 |
|
Othman, J. A. (2014). Steganographic scheme to avoid statistical Steganalysis. J. Of College Of Education For Women, 25(1). |
|
365 |
|
Bagade, A. M. (2014). A High Quality Steganographic Method Using Morphing. Journal of information processing systems, 10(2), 256-270. |
|
366 |
|
Azaminezhad, M. S., & Bidgoli, A. M. (2014). A new high capacity steganography based on bit-inverting method in DWT domain. Journal of Advanced Computer Science & Technology, 3(2), 169-178. |
|
367 |
|
Mandal, P. C. (2014). A study of Steganography Techniques using Discrete Wavelet Transform. Journal of Global Research in Computer Science, 5(5), 7-14. |
|
368 |
|
aldeen najim Alzubaidy, D. (2014). Paper of Nagham. pdf. |
|
369 |
|
Usha, B. A., Srinath, N. K., Nanjangud, N. C. A., Deshpande, A. M., & Rebello, A. (2014). A Survey on Secure and High Capacity Image Steganography Techniques. International Journal of Advanced Research in Computer and Communication Engineering, 2(3). |
|
370 |
|
Abdullah, K. A., Al-Jawad, N., & Abdulla, A. A. (2014, May). Effect of using different cover image quality to obtain robust selective embedding in steganography. In SPIE Photonics Europe (pp. 913808-913808). International Society for Optics and Photonics. |
|
371 |
|
Desmukh, P. R., & Rahangdale, B. (2014). Hash Based Least Significant Bit Technique For Video Steganography. International Journal of Engineering Research and Applications (IJERA), 4(1). |
|
372 |
|
Kumar, S., Gupta, A., Chandwani, A., Yadav, G., & Swarnkar, R. (2014, September). RGB image watermarking on video frames using DWT. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 675-680). IEEE. |
|
373 |
|
Alam, I., Khusro, S., Rauf, A., & Zaman, Q. (2014). Conducting surveys and data collection: From traditional to mobile and SMS-based surveys. Pakistan Journal of Statistics and Operation Research, 10(2), 169-187. |
|
374 |
|
Kale, N. A., Natikar, S. B., & Karande, S. M. (2014). Secured Mobile Messaging for Android application. |
|
375 |
|
Aprilianto, M., & Abdurohman, M. (2014, April). Improvement Text Compression Performance Using Combination of Burrows Wheeler Transform, Move to Front, and Huffman Coding Methods. In Journal of Physics: Conference Series (Vol. 495, No. 1, p. 012042). IOP Publishing. |
|
376 |
|
Shaker, S. H., Jeiad, H. A., & Hassan, F. A. Propose a Model for Securing SMS. |
|
377 |
|
Deshmukh, S. P., & Naware, A. M. Mobile Money: M-payment System for India. |
|
378 |
|
LaRusic, J., & Punnen, A. P. (2014). The asymmetric bottleneck traveling salesman problem: Algorithms, complexity and empirical analysis. Computers & Operations Research, 43, 20-35. |
|
379 |
|
Ahmed, Z. H. (2014). A data-guided lexisearch algorithm for the quadratic assignment problem. Indian Journal of Science and Technology, 7(4), 480-490. |
|
380 |
|
Swiercz, A., Burke, E. K., Cichenski, M., Pawlak, G., Petrovic, S., Zurkowski, T., & Blazewicz, J. (2014). Unified encoding for hyper-heuristics with application to bioinformatics. Central European Journal of Operations Research, 22(3), 567-589. |
|
381 |
|
Magare, S. S., Gedam, Y. K., Randhave, D. S., & Deshmukh, R. R. (2014). Character Recognition of Gujarati and Devanagari Script: A Review. |
|
382 |
|
Magare, S. S., & Deshmukh, R. R. (2014). Offline Handwritten Sanskrit Character Recognition Using Hough Transform and Euclidean Distance. International Journal of Innovation and Scientific Research ISSN, 2351-8014. |
|
383 |
|
Mendapara, M. B., & Goswami, M. M. (2014, March). Stroke identification in Gujarati text using directional feature. In Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on (pp. 1-5). IEEE. |
|
384 |
|
El Korbi, I., & Zeadally, S. (2014). Energy-aware sensor node relocation in mobile sensor networks. Ad Hoc Networks, 16, 247-265. |
|
385 |
|
Anil, M. C., & Shirbahadurkar, S. D. (2014, February). Speech modification for prosody conversion in expressive Marathi text-to-speech synthesis. In Signal Processing and Integrated Networks (SPIN), 2014 International Conference on (pp. 56-58). IEEE. |
|
386 |
|
Banerjee, S., Sardar, M., & Majumder, K. (2014, January). Aodv based black-hole attack mitigation in manet. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 345-352). Springer International Publishing. |
|
387 |
|
Gopalakrishnan, S., & Ganeshkumar, P. (2014). Intrusion detection in mobile ad hoc network using secure routing for attacker identification protocol. American Journal of Applied Sciences, 11(8), 1391. |
|
388 |
|
Silwal, S., & Sharma, A. (2014). A new Security approach for integrating wireless adhoc network using octant bit computation and routing test. IJSEAT, 2(6), 154-157. |
|
389 |
|
Banerjee, S., & Majumder, K. (2014). wormhole attack mitigation in manet: a cluster based avoidance technique. International Journal of Computer Networks & Communications, 6(1), 45. |
|
390 |
|
Abomhara, M., & Koien, G. M. (2014, May). Security and privacy in the Internet of Things: Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on (pp. 1-8). IEEE. |
|
391 |
|
Garg, G., Kaushal, S., & Sharma, A. (2014). Behavioural Study of Reactive Protocols with Wormhole Attack in Mobile ADHOC Networks. Journal of Emerging Technologies in Web Intelligence, 6(4), 445-455. |
|
392 |
|
Sivagurunathan, S., & Prathapchandran, K. (2014, January). Trust and cluster based authentication schemes in mobile Ad Hoc networks—A review. In Power Signals Control and Computations (EPSCICON), 2014 International Conference on (pp. 1-5). IEEE. |
|
393 |
|
Tamizarasu, k., kalpana, a., & rajaram, M. (2014). maliciousness in mobile ad hoc networks: a performance evaluation. Journal of Theoretical & Applied Information Technology, 65(3). |
|
394 |
|
Patil, K. T., & Patil, M. E. (2014). Study of Attacks in MANET, Attacks on AES, Cryptographically Generated Addresses (CGAs) Methods and Possible Alleviation in IPV6 over MANET Area. International Journal of Computer Applications, 96(1). |
|
395 |
|
Kirubakaran, N., & Kathirvel, A. (2014). Performance Improvement of Security Attacks in Wireless Mobile Ad Hoc Networks. Asian Journal of Information Technology, 13(2), 68-76. |
|
396 |
|
Dureja, A., & Dahiya, V. (2014). performance evaluation of collaborative attacks in manet. |
|
397 |
|
Jasim, S. I. (2014). pcf investigation to improve the performance of tora-based manet against jamming attacks. International Journal of Computer Science and Engineering Survey, 5(3), 17. |
|
398 |
|
Guo, C., Xu, H., Ju, L., Jia, Z., & Xu, J. (2014, September). A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on (pp. 156-163). IEEE. |
|
399 |
|
Sivagurunathan, S., & Prathapchandran, K. (2014, March). Trust Based Security Schemes in Mobile Ad Hoc Networks-A Review. In Intelligent Computing Applications (ICICA), 2014 International Conference on (pp. 291-295). IEEE. |
|
400 |
|
Sardar, M., Banerjee, S., Majhi, K., & Majumder, K. (2014). Trust Based Network Layer Attacks Prevention in MANET. In Emerging Trends in Computing and Communication (pp. 193-204). Springer India. |
|
401 |
|
Vaibhav, A. (2014). Security in Monitoring Schemes: A Survey. arXiv preprint arXiv:1411.5213. |
|
402 |
|
Samanta, C. K., Hota, M. K., Nayak, S. R., Panigrahi, S. P., & Panigrahi, B. K. (2014). Energy management in hybrid electric vehicles using optimized radial basis function neural network. International Journal of Sustainable Engineering, 7(4), 352-359. |
|
403 |
|
Kodali, R. K., & Boppana, L. (2014, September). FPGA implementation of energy efficient multiplication over GF (2 m) for ECC. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 1815-1821). IEEE. |
|
404 |
|
Anagreh, M., Samsudin, A., & Omar, M. A. (2014). Parallel Method for Computing Elliptic Curve Scalar Multiplication Based on MOF. International Arab Journal of Information Technology (IAJIT), 11(6). |
|
405 |
|
Abdulrazeg, A. A., Norwawi, N. M., & Basir, N. (2014, October). Extending V-model practices to support SRE to build secure web application. In Advanced Computer Science and Information Systems (ICACSIS), 2014 International Conference on (pp. 213-218). IEEE. |
|
406 |
|
Chawla, D., & Kaur, M. (2014). System & Web based Modeling for Secure Software Development. International Journal of Computer Technology and Applications, 5(1), 257. |
|
407 |
|
Moedjiono, s., rifai, a., & mantoro, t. (2014). a robust steganography approach with high embedding capacity using unique value embedding and codebook. Journal of Theoretical & Applied Information Technology, 66(1). |
|
408 |
|
Doshi, J. C., Christian, M., & Trivedi, B. H. (2014). SQL FILTER–SQL Injection prevention and logging using dynamic network filter. In Security in Computing and Communications (pp. 400-406). Springer Berlin Heidelberg. |
|
409 |
|
Manimegalai, R. (2014). Efficient joint compression and encryption techniques for video data. |
|
410 |
|
Kansal, A., & Singh, Y. Survey on Machine Learning Techniques for Event Detection in Wireless Sensor Networks. |
|
411 |
|
Medany, I., Shazly, M., & El-Sherbiny, M. G. (2014). Expert-Based-Computer Aided Design and Component Selection for Dust Collection Systems. International Journal of Scientific Research in Environmental Sciences, 2(1), 14. |
|
412 |
|
Mehrasa, M., Zaker, S. R., Larki, B., Mehmandoust, M., Baghshahi, H., Sekhavati, M. H., & Gavanji, S. (2014). Computational Prediction and Analysis of Interaction of Silver Nitrate with Peptidoglycan-Associated lipoprotein (Pal). International Journal of Scientific Research in Environmental Sciences, 2(1), 8. |
|
413 |
|
Kotenko, I., & Chechulin, A. Fast Network Attack Modeling and Security Evaluation based on Attack Graphs. Journal of Cyber Security, 3(1), 27-46. |
|
414 |
|
Parul, M., & Rohil, H. (2014). Optimized Image Steganography using Discrete Wavelet Transform (DWT). International Journal of Recent Development in Engineering and Technology (IJRDET), 2(2), 75-81. |
|
415 |
|
Nag, A., Singh, J. P., Biswas, S., Sarkar, D., & Sarkar, P. P. (2014). A Huffman Code Based Image Steganography Technique. In Applied Algorithms (pp. 257-265). Springer International Publishing. |
|
416 |
|
Zan, M. M., & Aye, N. (2014). Implementation of Secure Steganography System Based on DWT in RGB Color Channel. IJCCER, 2(3), 114-118. |
|
417 |
|
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication. |
|
418 |
|
Azaminezhad, M. S., & Bidgoli, A. M. (2014). A new high capacity steganography based on bit-inverting method in DWT domain. Journal of Advanced Computer Science & Technology, 3(2), 169-178. |
|
419 |
|
Mandal, P. C. (2014). A study of Steganography Techniques using Discrete Wavelet Transform. Journal of Global Research in Computer Science, 5(5), 7-14. |
|
420 |
|
Kalami, A. (2014). A modified robust and effective algorithm with mathematical calculation for minutiae detection. Physical Sciences Research International, 2(1), 1-5. |
|
421 |
|
Jana, B., Mondal, S. K., Jana, S., & Giri, D. (2014, February). Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach. In Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on (pp. 319-324). IEEE. |
|
422 |
|
Garg, S., & Mathur, M. (2014, February). Chaotic map based steganography of gray scale images in wavelet domain. In Signal Processing and Integrated Networks (SPIN), 2014 International Conference on (pp. 689-694). IEEE. |
|
423 |
|
REZA, W. (2014). Implementasi Slantlet Transform (SLT) dan Huffman Coding pada Steganografi Citra Grayscale. Skripsi, Fakultas Ilmu Komputer. |
|
424 |
|
Thanikaiselvan, V., Arulmozhivarman, P., Chakrabarty, S., Agarwal, A., Subashanthini, S., & Amirtharajan, R. (2014). Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13(16), 2534. |
|
425 |
|
Nag, A., Singh, J. P., Biswas, S., Sarkar, D., & Sarkar, P. P. (2014, January). A Huffman Code Based Image Steganography. In Applied Algorithms: First International Conference, ICAA 2014, Kolkata, India, January 13-15, 2014. Proceedings (Vol. 8321, p. 257). Springer.. |
|
426 |
|
Goel, S., Kumar, P., & Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator. |
|
427 |
|
Nuri, S. A Modified Robust and Effective Algorithm with Mathematical Calculation for Minutiae Detection. |
|
428 |
|
Madiavale, B. A. (2014). Information security management practices and organizational goals: a study of microfinanace organizations in Nairobi (Doctoral dissertation, University of Nairobi). |
|
429 |
|
Peng, B., & Li, L. (2014). Combination of Genetic Algorithm and Ant Colony Optimization for QoS Multicast Routing. In Soft Computing in Artificial Intelligence (pp. 49-56). Springer International Publishing. |
|
430 |
|
Prayudi, Y., Ashari, A., & Priyambodo, T. K. (2014). Digital Evidence Cabinets: A Proposed Frameworks for Handling Digital Chain of Custody. Int. J. Comput. Appl, 109(9), 30-36. |
|
431 |
|
Saleem, S., Popov, O., & Bagilli, I. (2014). Extended abstract digital forensics model with preservation and protection as umbrella principles. Procedia Computer Science, 35, 812-821. |
|
432 |
|
Rahman, A. F. A., Ahmad, R., & Mohamad, M. Z. (2014). Developing Forensic Readiness Secure Network Architecture for Wireless Body Area Network (WBAN). International Journal of Security and Its Applications, 8(5), 403-420. |
|
433 |
|
Bera, A., Bhattacharjee, D., & Nasipuri, M. (2014). Hand Biometrics in Digital Forensics. In Computational Intelligence in Digital Forensics: Forensic Investigation and Applications (pp. 145-163). Springer International Publishing. |
|
434 |
|
Malik, N. M. N. A., Yahya, S., & Abdullah, M. T. (2014). Critical Phases in Network Forensics-A Review. In The International Conference on Digital Security and Forensics (DigitalSec2014) (pp. 68-75). The Society of Digital Information and Wireless Communication. |
|
435 |
|
Tonellotto, M. (2014). Evidenza informatica, computer forensics e best practices. Rivista di Criminologia, Vittimologia e Sicurezza, 8(2), 68-103. |
|
436 |
|
Akosu, N., & Selamat, A. (2014). Incorporating Language Identification in Digital Forensics Investigation Framework. In Computational Intelligence in Digital Forensics: Forensic Investigation and Applications (pp. 63-78). Springer International Publishing. |
|
437 |
|
Solinas, F. (2014). Technical and legal perspectives on forensics scenario. |
|
438 |
|
Dlamini, M., Venter, H., Eloff, J., & Eloff, M. (2014, March). Requirements for Preparing the Cloud to Become Ready for Digital Forensic Investigation. In 13th European Conference on Cyber Warfare and Security ECCWS-2014 The University of Piraeus Piraeus, Greece (p. 242). |
|
439 |
|
Bai, J., & Pu, T. C. (2014, May). Online Data Compression Technique for Real Time Data of Energy Management System in the Industrial Production. In Applied Mechanics and Materials (Vol. 519, pp. 70-73). |
|
440 |
|
Pu, T., & Bai, J. (2014, May). An auto regression compression method for industrial real time data. In Control and Decision Conference (2014 CCDC), The 26th Chinese (pp. 5129-5132). IEEE. |
|
441 |
|
Garba, A. M., & Zirra, P. B. Analysing Forward Difference Scheme on Huffman to Encode and Decode Data Losslessly. |
|
442 |
|
Bharathi, K., & Vijaylakshmi, C. Optimization for Flexible Job Shop Scheduling by Evolutionary Representation. |
|
443 |
|
Vignesh, B. (2014). Pipelined Quadratic Equation Based Novel Multiplication Method for Cryptographic Applications. Indian Journal of Science and Technology, 7(4), 34-39. |
|
444 |
|
Chickerur, S., Rayudu, D. M. K., Hiriyannaiah, S., & Shabalina, O. (2014). Performance Analysis of Alternative Open Source Parallel Computing Approach to OpenMP on Multicore Processors. In Knowledge-Based Software Engineering (pp. 466-476). Springer International Publishing. |
|
445 |
|
Lee, J. D., Im, H. J., Kang, W. M., & Park, J. H. (2014). Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices. Mathematical Problems in Engineering, 2014. |
|
446 |
|
Mobhani, A. B., & Mishra, S. K. (2014). Diffusion of Cipher Blocks at Bit Level in Parallel AES to Improve Bit–Ratio Test thus Increasing Cryptanalysis Complexity. |
|
447 |
|
Kumar, C., Dutta, S., & Chakborty, S. (2014, March). Musical cryptography using genetic algorithm. In Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference on (pp. 1742-1747). IEEE. |
|
448 |
|
Sharma, R. S., Hiranwal, S., & Goyal, D. Analysis & Design Of Hybrid Cryptography Using Moving Image. |
|
449 |
|
Sharma, R. S., Hiranwal, S., & Goyal, D. Analysis & Design Of Hybrid Cryptography Using Moving Image. |
|
450 |
|
Jiji, G. W., Lakshmi, V. S., Lakshmi, K. V., & Priya, S. S. (2014). Diagnosis and Prognosis of the Arbovirus-Dengue using Intelligent Algorithm. Journal of The Institution of Engineers (India): Series B, 1-6. |
|
451 |
|
Kang, Y. J., Ha, Y. R., & Lee, S. J. (2014). Microfluidic-based measurement of erythrocyte sedimentation rate for biophysical assessment of blood in an in vivo malaria-infected mouse. Biomicrofluidics, 8(4), 044114. |
|
452 |
|
Opoku-Ansah, J., Eghan, M. J., Anderson, B., & Boampong, J. N. (2014). Wavelength Markers for Malaria (Plasmodium Falciparum) Infected and Uninfected Red Blood Cells for Ring and Trophozoite Stages. Applied Physics Research, 6(2), p47. |
|
453 |
|
Kirongo, N. N. (2014). A Video Conferencing Security Framework For Synchronous Elearning (Doctoral dissertation). |
|
454 |
|
El Mekawy, M., AlSabbagh, B., & Kowalski, S. (2014). The Impact of Business-IT Alignment on Information Security Process. In HCI in Business (pp. 25-36). Springer International Publishing. |
|
455 |
|
Banerjee, C., & Banerjee, A. it security practices in an organization: balancing technology and management perspective. editorial board chief bebefactor, 495, 506. |
|
456 |
|
Radouane, M., Messoussi, R., Touahni, R., & Boujiha, T. (2014, April). Robust method of digital image watermarking using SVD transform on DWT coefficients with optimal block. In Multimedia Computing and Systems (ICMCS), 2014 International Conference on (pp. 255-260). IEEE. |
|
457 |
|
Wahaballa, A., Wahballa, O., Li, F., Ramadan, M., & Qin, Z. (2014). Multiple-Layered Securities Using Steganography and Cryptography. International Journal of Computers and Applications, 36(3), 93-100. |
|
458 |
|
Thiruvengatanadhan, R., & Dhanalakshmi, P. (2014). A Fuzzy C-Means based GMM for Classifying Speech and Music Signals. International Journal of Computer Applications, 102(5). |
|
459 |
|
Ramalingam, T., & Dhanalakshmi, P. (2014). Speech/music classification using wavelet based feature extraction techniques. Journal of Computer Science, 10(1), 34-44. |
|
460 |
|
Pol, K. (2014). Image steganography based on DWT using Huffman LWZ Encoding. Int J Eng Tech Res, 2(3), 100-103. |
|
461 |
|
Rajput, P., Arya, S., Kumari, S., & Lehana, P. (2014). Qualitative and quantitative analysis of non-uniform dark images. Advances in Image and Video Processing, 2(1), 23-34. |
|
462 |
|
Thanikaiselvan, V., Arulmozhivarman, P., Chakrabarty, S., Agarwal, A., Subashanthini, S., & Amirtharajan, R. (2014). Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13(16), 2534. |
|
463 |
|
Kaur, H., & Goyal, E. D. (2014). Performance Enhancement of a Transform Domain Based Steganographic Technique Using Segmentation. |
|
464 |
|
Basatini, F. M., & Chinipardaz, R. (2014). Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting. Journal of Data Science, 12, 563-574. |
|
465 |
|
Shibata, S. I., Sato, F., Kimura, H., & Oyabu, T. (2014). Evaluating Abnormal Condition in Physiological Disorder Using a Fluctuation Characteristic of Plant Bioelectric Potential. Sensors and Materials, 26(7), 483-493. |
|
466 |
|
George, R., & Manimekalai, M. A. P. (2014, February). A novel approach for image compression using zero tree coding. In Electronics and Communication Systems (ICECS), 2014 International Conference on (pp. 1-5). IEEE. |
|
467 |
|
Ortega-Corral, C., Palafox, L. E., García-Macías, J. A., Sánchez-García, J., & Aguilar, L. (2014). End-to-end message exchange in a deployable marine environment hierarchical wireless sensor network. International Journal of Distributed Sensor Networks, 2014. |
|
468 |
|
Mafra, P. M., Fraga, J. S., & Santin, A. O. (2014). Algorithms for a distributed IDS in MANETs. Journal of Computer and System Sciences, 80(3), 554-570. |
|
469 |
|
Azzawi, A. L. H. M. (2014). Enhancing The Encryption Process Of Advanced Encryption Standard (AES) By Using Proposed Algorithm To Generate S-Box. Journal of Engineering and Development, 18(2). |
|
470 |
|
Kaul, V., Choudhari, P., & Narayankhedkar, S. K. (2014, September). Security enhancement for data transmission in 4G networks. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 373-378). IEEE. |
|
471 |
|
Das, S., Zaman, J. S. U., & Ghosh, R. (2014). Study of Randomness in AES Ciphertexts Produced by Randomly Generated S-Boxes and S-Boxes with Various Modulus and Additive Constant Polynomials. Journal of The Institution of Engineers (India): Series B, 1-16. |
|
472 |
|
Dara, M., & Manochehri, K. (2014). Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES. Information Security Journal: A Global Perspective, 23(1-2), 1-9. |
|
473 |
|
Choudhari, P., Kaul, V., & Narayankhedkar, S. K. Security Enhancement Algorithms for Data Transmission in 4G Networks. |
|
474 |
|
Kaur, N., & Behal, S. Audio Steganography Using LSB Edge Detection Algorithm. |
|
475 |
|
Akhtar, M., Khusru, A., Usmani, A., & Sahoo, G. (2014). Nontransitive Ranking to Enhance Routing Decision in MANETS. arXiv preprint arXiv:1407.5385. |
|
476 |
|
Patil, S., & Borade, D. (2014). Dynamic Cluster Based Intrusion Detection Architecture to Detect Routing Protocol Attacks in MANET. Sensor Netw Data Commun, 3(116), 2. |
|
477 |
|
Rueda, J. S. R., & Bautista, D. R. (2014). análisis forense digital en dispositivos móviles. Revista de Semilleros de Investigación, 1(1). |
|
478 |
|
Kasiaras, D., Zafeiropoulos, T., Clarke, N., & Kambourakis, G. (2014, December). Android forensics: Correlation analysis. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for (pp. 157-162). IEEE. |
|
479 |
|
Cusack, B., & Lutui, R. (2014). Up-dating investigation models for smart phone procedures. |
|
480 |
|
Mumba, E. R., & Venter, H. S. (2014, August). Mobile forensics using the harmonised digital forensic investigation process. In Information Security for South Africa (ISSA), 2014 (pp. 1-10). IEEE. |
|
481 |
|
NK, P. J. K. (2014). an overview of mobile phone forensics. global journal of multidisciplinary studies, 4(1). |
|
482 |
|
Shrivastava, G., & Gupta, B. B. (2014, October). An Encapsulated Approach of Forensic Model for digital investigation. In Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on (pp. 280-284). IEEE. |
|
483 |
|
Morrell, C., Ransbottom, J. S., Marchany, R., & Tront, J. G. (2014, December). Scaling IPv6 address bindings in support of a moving target defense. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for (pp. 440-445). IEEE. |
|
484 |
|
Victor, A. (2014). Splice Zerocopy System optimization using dual pipe schemes (Doctoral dissertation, TELKOM UNIVERSITY). |
|
485 |
|
Wei, J., Zhihong, T., Chao, C., & Bei, G. (2014). Bottleneck analysis for data acquisition in high-speed network traffic monitoring. Communications, China, 11(1), 110-118. |
|
486 |
|
Eisfeld, A. (2014). Entwurf und Analyse von Konzepten zur effizienten Datenübertragung von Grafikrendering-Befehlen auf eingebetteten Systemen. |
|
487 |
|
Ali Tandra, S., & Rizvi, S. M. (2014). Security for Cloud Based Services. |
|
488 |
|
Latif, R., Abbas, H., & Assar, S. (2014). Distributed denial of service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review. Journal of medical systems, 38(11), 1-10. |
|
489 |
|
Kumar Shridhar, N. G. (2014). A Prevention of DDos Attacks in Cloud Using Honeypot. International Journal of Science and Research, 3(11), 2378-2383. |
|
490 |
|
Aishwarya, R., & Malliga, S. (2014, April). Intrusion detection system-An efficient way to thwart against Dos/DDos attack in the cloud environment. In Recent Trends in Information Technology (ICRTIT), 2014 International Conference on (pp. 1-6). IEEE. |
|
491 |
|
Dupin-Bryant, P. A., & Olsen, D. H. (2014). Business Intelligence, Analytics And Data Visualization: A Heat Map Project Tutorial. International Journal of Management & Information Systems (IJMIS), 18(3), 185-200. |
|
492 |
|
Tarek, M., Ouda, O., & Hamza, T. (2014). Tokenless Cancelable Biometric Templates Based on Hetroassociation Neural Network. International Journal of Biometrics and Bioinformatics (IJBB), 8(2), 8. |
|
493 |
|
Shiri, S., Anvari, A., & Soltani, H. An Assessment of Readiness Factors for Implementing ERP Based on Agility (Extension of Mckinsey 7s Model). |
|
494 |
|
Ghafoor, I., Jattalai, I., Durranit, S., & Ch, M. T. Analysis of OpenSSL Heartbleed Vulnerability for Embedded Systems. |
|
495 |
|
Sharvani, C. S. (2014). Development of Swarm Intelligent Systems for MANET: ACO based routing in MANETs for effective communication. |
|
496 |
|
Sheta, A. F., Kassaymeh, S., & Rine, D. Estimating the Number of Test Workers Necessary for a Software Testing Process Using Artificial Neural Networks. |
|
497 |
|
Rao, P. S., Rao, K. V., Varma, P. S., & Kim, T. H. (2014). Programming Evaluation Process Using Hybrid Cost Estimation Model. International Journal of Software Engineering and Its Applications, 8(10), 55-64. |
|
498 |
|
KUMAR, M. S., & RAJAN, B. C. (2014).Experimental evaluation of fuzzy-based function point analysis for software effort estimation. Journal of Theoretical & Applied Information Technology, 67(2). |
|
499 |
|
Kumar, G., & Bhatia, P. K. (2014).Automation of software cost estimation using neural network technique. International Journal of Computer Applications, 98(20). |
|
500 |
|
Kalinic, z., arsovski, s., arsovski, z., & rankovic, v. The effectiveness and students’ perception of an adaptive mobile learning system based on personalized content and mobile web. Stanislaw juszczyk, 43. |
|
501 |
|
Karadimce, a., & davcev, d. (2014, october). Collaborative cloud service model for delivering multimedia content in mcloud. In collaborative computing: networking, applications and worksharing (collaboratecom), 2014 international conference on (pp. 469-474). Ieee. |
|
502 |
|
Hashim, Y. E., Osman, A., & El-Gelany, A. (2014). Mobile Technology and Education: Theoretical Study. |
|
503 |
|
Chouarfia, M. Y. A. (2014). SCAE: Software Component Assembly Evaluation. |
|
504 |
|
Thapar, S. S., Singh, P., & Rani, S. (2014). Reusability-based quality framework for software components. ACM SIGSOFT Software Engineering Notes, 39(2), 1-5. |
|
505 |
|
Sampath, S., Nanjesh, B. R., Sagar, B. B., & Subbaraya, C. K. (2014, February). Performance optimization of PVM based parallel applications using optimal number of slaves. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on (pp. 388-392). IEEE. |
|
506 |
|
Abebe, H. (2014). Predicting Infant Immunization Status in Ethiopian (Doctoral dissertation, AAU). |
|
507 |
|
Ibrahim, M. H. (2014). Realizing Sender’s Deniability in Public Key Encryption via Random Coins Isolation. European Journal of Scientific Research, 119(2), 177-187. |
|
508 |
|
Biedermann, S., Ruppenthal, T., & Katzenbeisser, S. (2014, July). Data-centric phishing detection based on transparent virtualization technologies. In Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on (pp. 215-223). IEEE. |
|
509 |
|
Emilin, S. C. (2014). Detecting And Preventing Phishing Websites Dppws. |
|
510 |
|
Chawla, M., & Chouhan, S. S. (2014). A Survey of Phishing Attack Techniques. International Journal of Computer Applications, 93(3). |
|
511 |
|
Zeydan, h. z., & selamat, m. s. (2014).current state of anti-phishing approaches and revealing competencies. journal of theoretical and applied information technology, 70(3). |
|
512 |
|
Philip, C., Paulus, R., & Ashok, A. (2014). Comparative Analysis of Adhoc Routing Protocols in Wi-Fi & Wi Max Networks using QualNet 6.1. International Journal of Current Engineering and Technology, 4(1). |
|
513 |
|
Sadek, M. M., Khalifa, A. S., & Mostafa, M. G. (2014). Video steganography: a comprehensive review. Multimedia Tools and Applications, 1-32. |
|
514 |
|
Kelash, H. M., Wahab, O. F. A., Elshakankiry, O. A., & El-sayed, H. S. (2014). Utilization of Steganographic Techniques in Video Sequences. International Journal of Computing and Network Technology, Sys, 2, 17-24. |
|
515 |
|
Othman, J. A. (2014). Steganographic scheme to avoid statistical Steganalysis. J. Of College Of Education For Women, 25(1). |
|
516 |
|
Al-Dmour, H., Al-Ani, A., & Nguyen, H. (2014, August). An efficient steganography method for hiding patient confidential information. In Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE (pp. 222-225). IEEE. |
|
517 |
|
Agrawal, A., & Borikar, D. A. (2014). An approach to video steganography using novel substitution technique. |
|
518 |
|
Kaur, S., Kaur, A., & Singh, K. (2014). A Survey of Image Steganography. IJRECE, 2(3), 102-105. |
|
519 |
|
Priyanka, B. G., & Sathyanarayana, S. V. (2014, November). A steganographic system for embedding image and encrypted text. In Contemporary Computing and Informatics (IC3I), 2014 International Conference on (pp. 1351-1355). IEEE. |
|
520 |
|
Praneeta, G., & Pradeep, B. (2014, January). Security Analysis of Digital Stegno Images Using Genetic Algorithm. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 277-283). Springer International Publishing. |
|
521 |
|
Juneja, M. (2014). High Capacity and Statistical Attacks Resistant Reversible Image Data Hiding Scheme using LSB Substitution. International Journal of Computer Applications, 92(12). |
|
522 |
|
Juneja, M. (2014). High Capacity Information Hiding System for Encrypted Text Message Using Pixel Intensity Based LSB Substitution Technique. International Journal of Computer Science Issues (IJCSI), 11(2), 159. |
|
523 |
|
aldeen najim Alzubaidy, D. (2014). Paper of Nagham. pdf. |
|
524 |
|
Bhalchandra, B. D., Bhatnagar, V., Tomer, R., Singh, R., Saran, S. S., Asadullah, M., ... & Khan, S. Safety and Concealing Information Utilizing Combinatorial Data Hiding Proficiencies. |
|
525 |
|
Zahedinia, M. S., & Ahmadi, H. (2014). Color Image Steganography Method based on Difference between Pixel Values in Tri-direction. Majlesi Journal of Multimedia Processing, 3(3). |
|
526 |
|
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication. |
|
527 |
|
Nashier, N., & Singhrova, A. An Steganography Implementation Based Upon Improved LSB Technique. |
|
528 |
|
Agrawal, A., & Borikar, D. A. A Novel Approach to Video Steganography using Secured Multi-Channel Substitution. |
|
529 |
|
Shinde, P., Palmal, A., & Singh, R. Digital Image Steganography-Then, Now & Analysis of its Techniques. |
|
530 |
|
Ahmed, Z. H. (2014). Comparison of data hiding using LSB and DCT for image (Doctoral dissertation, Universiti Tun Hussein Onn Malaysia). |
|
531 |
|
Mehndiratta, A. Publication Procedure Topics. |
|
532 |
|
Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., & Okediran, O. O. Performance Assessment of an Enhanced Crystographic Model for Secure E-Voting. |
|
533 |
|
Khosla, S., & Kaur, P. Secure Data Hiding Technique Using Video Steganography and Watermarking-A Review. |
|
534 |
|
Mostaghim, M., & Boostani, R. (2014, September). CVC: Chaotic visual cryptography to enhance steganography. In Information Security and Cryptology (ISCISC), 2014 11th International ISC Conference on (pp. 44-48). IEEE. |
|
535 |
|
Sahu, M. (2014). Review of Image Steganography Techniques in Cloud Security. |
|
536 |
|
Ramalingam, M., & Isa, N. A. M. (2014, October). A steganography approach for sequential data encoding and decoding in video images. In Computer, Control, Informatics and Its Applications (IC3INA), 2014 International Conference on (pp. 120-125). IEEE. |
|
537 |
|
Senaratne, H., Gunatilaka, P., Gamage, S., Gunarathna, U., & Vithana, Y. Information Hiding with Steganography. |
|
538 |
|
Ali, A. A., Abdellateef, B. A., & Seddik, A. H. (2014). Enhancing the Security of SMMWB Image Steganography Technique by using the Linked List structure (Cover Package Method). International Journal of Computer Applications, 90(7). |
|
539 |
|
Molaei Kermani, and., Amir Masoud, honest, & Abrahymnzhad. (2014). Blind steganography based on Reed-Solomon codes and the substitution optimized embedded with improved payload and resistance. Journal of Electrical Engineering, University of Tabriz, 43 (2), 43-59. |
|
540 |
|
Dhondge, K., Choi, B. Y., Song, S., & Park, H. (2014, August). Optical Wireless authentication for smart devices using an onboard ambient light sensor. In Computer Communication and Networks (ICCCN), 2014 23rd International Conference on (pp. 1-8). IEEE. |
|
541 |
|
Xiong, J., Xiong, J., & Claramunt, C. (2014, November). A spatial entropy-based approach to improve mobile risk-based authentication. In Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis (p. 3). ACM. |
|
542 |
|
vongsingthong, s., & boonkrong, s. (2014). a survey on smartphone authentication. walailak journal of science and technology (wjst), 12(1), 1-19. |
|
543 |
|
Young stars, & Peng Xinguang. (2014) A lightweight one-time password authentication scheme. Small Computer Systems, 35 (008), 1808-1811. |
|
544 |
|
Koneru, A. (2014). Knowledge Extraction from Work Instructions through Text Processing and Analysis. |
|
545 |
|
Montero, C. (2014). Cost aware real time big data processing in Cloud Environments (Doctoral dissertation, The University of Melbourne). |
|
546 |
|
Parsania, V. S., Jani, N. N., & Bhalodiya, N. H. Applying Naïve bayes, BayesNet, PART, JRip and OneR Algorithms on Hypothyroid Database for Comparative Analysis. |
|
547 |
|
Babatunde, I. G. Review and Evaluation of Fingerprint Singular Point Detection Algorithms. |
|
548 |
|
Iwasokun, G. B., & Akinyokun, O. C. False Minutiae’Impact on Fingerprint Matching. |
|
549 |
|
Babatunde, I. G., Lange, M. J., Charles, A. O., & Olumuyiwa, D. J. (2014, August). Experimental study of thumbprint-based authentication framework for ATM machines. In Science and Information Conference (SAI), 2014 (pp. 505-514). IEEE. |
|
550 |
|
Bifari, E. N., & Elrefaei, L. (2014, September). Automated Fingerprint Identification System based on weighted feature points matching algorithm. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 2212-2217). IEEE. |
|
551 |
|
Akinyokun Oluwole, C., Alese Boniface, K., & Iwasokun Gabriel, B. (2014). Fingerprint Matching Using Spatial Characteristics. In Proceedings of the World Congress on Engineering (Vol. 1). |
|
552 |
|
Iwasokun, G. B., Akinyokun, O. C., & Dehinbo, O. J. (2014). Fingerprint Matching Using Features Mapping. In Proceedings of the World Congress on Engineering and Computer Science (Vol. 1). |
|
553 |
|
Iwasokun, G. B., & Ojo, S. O. (2014). Review and Evaluation of Fingerprint Singular Point Detection Algorithms. British Journal of Applied Science & Technology, 4(35), 4918. |
|
554 |
|
Babatunde, I. G., Charles, A. O., & Olusegun, O. S. (2014). An Investigation into the Impact of False Minutiae Points on Fingerprint Matching. International Journal of Database Theory and Application, 7(3), 159-178. |
|
555 |
|
Iwasokun, G. B., Akinyokun, O. C., & Angaye, C. O. (2014). Spatial Relation Approach to Fingerprint Matching. In Intelligent Systems for Science and Information (pp. 87-110). Springer International Publishing. |
|
556 |
|
Yadav, V., & Aggarwaal, P. (2014). A Survey on Security in Cloud Computing. |
|
557 |
|
Owusu, E., Zhan, Y., & Mao, Q. R. (2014). A neural-AdaBoost based facial expression recognition system. Expert Systems with Applications, 41(7), 3383-3390. |
|
558 |
|
Sun, W., Halevy, A., Benedetto, J. J., Czaja, W., Li, W., Liu, C., ... & Wang, R. (2014). Nonlinear dimensionality reduction via the ENH-LTSA method for hyperspectral image classification. Selected Topics in Applied Earth Observations and Remote Sensing, IEEE Journal of, 7(2), 375-388. |
|
559 |
|
Sun, W., Halevy, A., Benedetto, J. J., Czaja, W., Liu, C., Wu, H., ... & Li, W. (2014). UL-Isomap based nonlinear dimensionality reduction for hyperspectral imagery classification. ISPRS Journal of Photogrammetry and Remote Sensing, 89, 25-36. |
|
560 |
|
Owusu, E., Zhan, Y. Z., & Mao, Q. R. (2014). An SVM–AdaBoost-based face detection system. Journal of Experimental & Theoretical Artificial Intelligence, 26(4), 477-491. |
|
561 |
|
Kishore, B., Rana, V. L., Manikantan, K., & Ramachandran, S. (2014, December). Face recognition using Gabor-Feature-based DFT shifting. In Industrial and Information Systems (ICIIS), 2014 9th International Conference on (pp. 1-8). IEEE. |
|
562 |
|
Biswas, A., Ghose, M. K., & Pandit, M. (2014). Comparison of Different Neural Network Architectures for Classification of Feature Transformed Data for Face Recognition. International Journal of Computer Applications, 96(12). |
|
563 |
|
Makinde, A. S., Nkansah-Gyekye, Y., & Laizer, L. S. (2014). Enhancing the Accuracy of Biometric Feature Extraction Fusion Using Gabor Filter and Mahalanobis Distance Algorithm. arXiv preprint arXiv:1407.6748. |
|
564 |
|
Biswal, M. S. (2014). Feature Extraction of Face Using Various Techniques (Doctoral dissertation, National Institute of Technology Rourkela). |
|
565 |
|
Gupta, B. Performance Comparison of Various Face Detection Techniques. |
|
566 |
|
Awati, J. S. (2014). Application of wireless sensor networks for agricultural parameter control. |
|
567 |
|
Sahu, R. A., & Saraswat, V. (2014). Secure and Efficient Scheme for Delegation of Signing Rights. In Information and Communications Security (pp. 258-273). Springer International Publishing. |
|
568 |
|
Demarinis, F., Accettura, A., Garzia, F., & Cusani, R. (2014, October). Automatic security system for recognizing unexpected motions through video surveillance. In Security Technology (ICCST), 2014 International Carnahan Conference on (pp. 1-5). IEEE. |
|
569 |
|
Nayak, C., & Pradhan, S. Adaptive Filtering for Linear System Identification by Different Variants of LMS. |
|
570 |
|
Eke, H. N., & Odoh, N. J. (2014). The Use of Social Networking Sites among the Undergraduate Students of University of Nigeria, Nsukka. Library Philosophy and Practice, 0_1. |
|
571 |
|
Zhang, Y., & Rau, P. L. P. (2014). User Adoption and Loyalty of Location Based Social Network Service in China. In Cross-Cultural Design (pp. 392-402). Springer International Publishing. |
|
572 |
|
Eke Miss, H. N., Obiora, C., & Odoh Miss, J. N. (2014). The Use of Social Networking Sites among the Undergraduate Students of University of Nigeria, Nsukka. |
|
573 |
|
TIJJANI, H. (2014). adoption of improved pearl millet production practices by farmers in borno state, nigeria (Doctoral dissertation, USMANU DANFODIYO UNIVERSITY, SOKOTO). |
|
574 |
|
yatigammana, m., johar, d. m. g. m., & gunawardhana, c. Impact of Innovations Attributes on e-learning Acceptance among Sri Lankan Postgraduate Students. |
|
575 |
|
Yatigammana, K., Johar, M. G. M., & Gunawardhana, C. (2014). comparison of e-learning acceptance among postgraduate students in sri lanka and malaysia. Journal of South Asian Studies, 2(2), 165-176. |
|
576 |
|
Madahi, A., & Sukati, I. (2014). Examining online and brick and mortar store channels switching behaviour among Malaysian consumers. International Journal of Electronic Marketing and Retailing, 6(2), 128-163. |
|
577 |
|
Abdelrehim, S. H. M. O. (2014). The diffusion of edublogs among educators in Egypt. |
|
578 |
|
Aligol, M., & Mohammadbeigi, A. (2014). Doctors tend to investigate the private sector to contribute to the family physician. Journal of Qom, 8 (1). |
|
579 |
|
Mahajan, N., Bedi, R., & Gupta, S. K. A Survey on Detection of Byzantine and Resource Consumption Attacks. |
|
580 |
|
Khan, A., Shrivastava, S., & Richariya, V. (2014, January). Normalized Worm-hole Local Intrusion Detection Algorithm (NWLIDA). In Computer Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-6). IEEE. |
|
581 |
|
Bayeva, Z. Detection and Containment the Attack that Leads to a Denial of Service Attack. |
|
582 |
|
Masdari, M., & Bakhtiari, F. C. (2014). Alert Management System using K-means Based Genetic for IDS. International Journal of Security and Its Applications, 8(5), 109-118. |
|
583 |
|
Kumar, R., Verma, P., & Singh, Y. (2014). Review of MANET Protocols and Introduction of a New Optimized Routing Scheme using Evolutionary Algorithms and Analytical Hierarchy Process. Wireless Communication, 6(4), 161-171. |
|
584 |
|
Sodagudi, S., & Rao, D. K. R. (2014). Behavior based Anomaly detection technique to identify Multilayer attacks. International Journal, 2(5). |
|
585 |
|
Padma, T., & Pillai, J. S. (2014). Image Watermarking using PQ Sequences. |
|
586 |
|
Gholami, S., & Bashirzadeh, R. (2014). A new effective algorithm for on-line robot motion planning. Decision Science Letters, 3(1), 121-130. |
|
587 |
|
Padma, T., & Pillai, J. S. (2014). Image Watermarking using PQ Sequences. |
|
588 |
|
Belaidi, H., Bentarzi, H., Belaidi, A., & Hentout, A. (2014). Terrain Traversability and Optimal Path Planning in 3D Uneven Environment for an Autonomous Mobile Robot. Arabian Journal for Science and Engineering, 39(11), 8371-8381. |
|
589 |
|
Jothi, M. S., & Chandrasekaran, M. Fuzzy Based Optimal Clustering Protocol for Maximizing Lifetime in WSN. |
|
590 |
|
Zhaoliu Rong, Shu Mei E, & Zhong Weijun. (2014). Virtual private networks, and intrusion detection systems analyze the optimal allocation of Game Strategies Management Engineering, (4), 187-192. |
|
591 |
|
Behdad, M. (2014). Application of Learning Classifier Systems to Fraud Detection Problem (Doctoral dissertation, University of Western Australia). |
|
592 |
|
Emilin, S. C. (2014). Detecting And Preventing Phishing Websites Dppws. |
|
593 |
|
Varughese, N. M. (2014). collaborative network security management system based on association mining rule. ictact journal on soft computing, 4(4). |
|
594 |
|
Singh, G., Kumar, N., & Verma, A. K. (2014). Antalg: An innovative aco based routing algorithm for manets. Journal of Network and Computer Applications, 45, 151-167. |
|
595 |
|
Musau, F., Wang, G., & Abdullahi, M. B. (2014). Group formation with neighbor similarity trust in P2P E-commerce. Peer-to-Peer Networking and Applications, 7(4), 295-310. |
|
596 |
|
Fouchal, H., Hunel, P., & Ramassamy, C. (2014). Towards efficient deployment of wireless sensor networks. Security and Communication Networks. |
|
597 |
|
Mohsin, R., & Woods, J. (2014, September). Performance evaluation of MANET routing protocols in a maritime environment. In Computer Science and Electronic Engineering Conference (CEEC), 2014 6th (pp. 1-5). IEEE. |
|
598 |
|
Shegokar, M. S., & Tuteja, M. R. Performance Evaluation of AODV and DSR Routing Protocols for Random Speed Mobility and Intensity Model in MANET Using NS2. |
|
599 |
|
Natarajan, E., & Devi, L. (2014). Cross Layer Based Energy Aware Routing and Congestion Control Algorithm in MANET. |
|
600 |
|
Ratnaparkhi, V., Patidar, P., & Rawat, M. K. (2014). Implementation of Hybrid Algorithm for Mobility and Routing Issues in MANET. International Journal of Computer Applications, 98(4). |
|
601 |
|
Harpal, S. K., & Singh, G. Comparative Performance of MANET Routing Protocols at varying Speed in Different Traffic Patterns. |
|
602 |
|
Kaur, A. K. A., & Kaur, A. Improving Node Stability Using Hotspot Algorithm in Mobile Ad-hoc Network. |
|
603 |
|
Dhaliwal, B. S., & Malhotra, R. Comparative Appraise and Future Perspectives of Reactive and Proactive Routing Protocols in Manets. |
|
604 |
|
Borade, J. L., Mishra, B. K., & Bansode, R. Performance Analysis of LLECLAIR versus AODV in wireless networks. |
|
605 |
|
Malathy, E. M., & Muthuswamy, V. (2014, December). Vertical handover performance investigation with discrete event system simulation in next generation wireless network. In Advanced Computing (ICoAC), 2014 Sixth International Conference on (pp. 220-223). IEEE. |
|
606 |
|
Arasomwan, A. M., & Adewumi, A. O. (2014). An investigation into the performance of particle swarm optimization with various chaotic maps. Mathematical Problems in Engineering, 2014. |
|
607 |
|
Arya, M., Deep, K., & Bansal, J. C. (2014). A nature inspired adaptive inertia weight in particle swarm optimisation. International Journal of Artificial Intelligence and Soft Computing 13, 4(2-3), 228-248. |
|
608 |
|
Alrabady, L. A. Y. (2014). An online-integrated condition monitoring and prognostics framework for rotating equipment. |
|
609 |
|
Adewumi, A. O., & Arasomwan, A. M. (2014). An improved particle swarm optimiser based on swarm success rate for global optimisation problems. Journal of Experimental & Theoretical Artificial Intelligence, (ahead-of-print), 1-43. |
|
610 |
|
Gu, J., & Shi, X. (2014, July). An adaptive PSO based on motivation mechanism and acceleration restraint operator. In Evolutionary Computation (CEC), 2014 IEEE Congress on (pp. 1328-1336). IEEE. |
|
611 |
|
Mandil, P., & Mishra, A. MINIMIZATION OF THD IN CASCADE MULTILEVEL INVERTER USING WEIGHT IMPROVED PARTICLE SWARM OPTIMIZATION ALGORITHM. |
|
612 |
|
Chen, R. M., & Huang, H. T. (2014, August). Particle Swarm Optimization Enhancement by Applying Global Ratio Based Communication Topology. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on (pp. 443-446). IEEE. |
|
613 |
|
Lopez , C. E. M. ( 2014 ) . Search parameters particle swarm optimization solver for constraint satisfaction problems. |
|
614 |
|
Babu, K. R., & Sunitha, K. V. N. (2014). An effective hybrid technique for image enhancement through Genetic Algorithm-morphological operations. International Journal of Signal and Imaging Systems Engineering, 7(2), 83-91. |
|
615 |
|
Raut, S. D., & Humbe, V. T. (2014). An Approach to Boundary Extraction of Palm Lines and Vein Pattern. International Journal of Image, Graphics and Signal Processing (IJIGSP), 6(12), 47. |
|
616 |
|
Babatunde, I. G., Charles, A. O., & Olusegun, O. S. (2014). An Investigation into the Impact of False Minutiae Points on Fingerprint Matching. International Journal of Database Theory and Application, 7(3), 159-178. |
|
617 |
|
Babatunde, I. G. Review and Evaluation of Fingerprint Singular Point Detection Algorithms. |
|
618 |
|
Karthikeyini, C., Rajamani, V., & Bommanna Raja, K. (2014). Exploring fingerprints using composite minutiae descriptors to determine hereditary relation across multiple generations. International Journal of Biomedical Engineering and Technology, 15(3), 224-242. |
|
619 |
|
Chin, R. K. Y., & Lim, J. F. (2014). Fingerprint Recognition Using a Hybrid of Minutiae-and Image-Based Matching Techniques. International Journal of Simulation--Systems, Science & Technology, 15(2). |
|
620 |
|
Iwasokun, G. B., & Akinyokun, O. C. False Minutiae’Impact on Fingerprint Matching. |
|
621 |
|
Iwasokun, G. B., & Ojo, S. O. (2014). Review and Evaluation of Fingerprint Singular Point Detection Algorithms. British Journal of Applied Science & Technology, 4(35), 4918. |
|
622 |
|
Saleh, A. M. A. M. (2014). Enhanced Secure Algorithm for Fingerprint Recognition. arXiv preprint arXiv:1402.4936. |
|
623 |
|
Kalia, A., & Sood, S. characterization of reusable software components for better reuse. |
|
624 |
|
Al-Khazraji, S. H. A. A. Effect of Creating Dll Libraries in Software Reusable Components. |
|
625 |
|
Al-tarawneh, f. h. a framework for cots software evaluation and selection for cots mismatches handling and non-functional requirements. |
|
626 |
|
Reddy, J. M., & Prasad, S. V. A. V. Quality Focus of Software Layered Technology using Analytic Hierarchy Process: A Case Study. |
|
627 |
|
Kalia, A., & Sood, S. Component Based Software Reusability and Framing Standards for Components to be Reused. |
|
628 |
|
Elkamchouchi, H. M., & Hassan, M. (2014). Array pattern synthesis approach using a genetic algorithm. Microwaves, Antennas & Propagation, IET, 8(14), 1236-1240. |
|
629 |
|
Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4). |
|
630 |
|
Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4). |
|
631 |
|
Rocabado, S. (2014). Caso de estudio de comunicaciones seguras sobre redes móviles ad hoc (Doctoral dissertation, Facultad de Informática). |
|
632 |
|
Pattnaik, O., & Pattanayak, B. K. (2014). Security in vehicular ad hoc network based on intrusion detection system. American Journal of Applied Sciences, 11(2), 337. |
|
633 |
|
Ponsam, J. G., & Srinivasan, R. (2014). Multilayer intrusion detection in MANET. International Journal of Computer Applications, 98(20). |
|
634 |
|
Vimal, S. (2014). An energy efficient intrusion detection system in MANET for secure routing and clustering (Doctoral dissertation). |
|
635 |
|
Saraireh, S., Al-Sbou, Y., & Alsmadi, O. (2014). Image Encryption Scheme Based on Filter Bank and Lifting. Int'l J. of Communications, Network and System Sciences, 2014. |
|
636 |
|
Gowraj, N., Avireddy, S., & Prabhu, S. SDI-ON: Secure Digital Images over the Network. |
|
637 |
|
Osho, O., Zubair, Y. O., Ojeniyi, J. A., & Osho, L. O. a simple encryption and decryption system. |
|
638 |
|
Singh, V., Dhiman, H., & Khatkar, M. (2014). a comprehensive study of time complexity of various encryption algorithms. international journal of advances in engineering & technology, 7(2), 495. |
|
639 |
|
Ashik, M. H. M., & Vydehi, M. S. Secure Symmetric Key Algorithm [SSKA] For Information Exchange Using Modulo. |
|
640 |
|
Mushtaque, M. A., & Singh, M. K. Feasibility Evaluation of Symmetric Key Encryption Techniques for Wireless Channel and Disk Storage. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2. |
|
641 |
|
Singh, S., Kumar, A., Shaw, D. K., & Ghosh, D. (2014, February). Script separation in machine printed bilingual (Devnagari and Gurumukhi) documents using morphological approach. In Communications (NCC), 2014 Twentieth National Conference on (pp. 1-5). IEEE. |
|
642 |
|
Aparna, R. R., & Radha, R. (2014). Script Identification In Trilingual Indian Documents. International Journal of Image Processing (IJIP), 8(4), 178. |
|
643 |
|
ISA, N. A. N. B. M. (2014). language use on twitter among malaysian l2 speakers (doctoral dissertation, university of malaya kuala lumpur). |
|
644 |
|
Butt, A. J., Butt, N. A., Butt, R. G., & Ikram, M. T. (2014, January). Predicting Mobile Subscriber’s Behaviour from Contextual Information Extraction: SMS Data. In Neural Information Processing (pp. 661-672). Springer International Publishing. |
|
645 |
|
Sasitharan, D. (2014). An empirical investigation of smartphone technology acceptance among Universiti Utara Malaysia students (Doctoral dissertation, Universiti Utara Malaysia). |
|
646 |
|
Nicol, E., Dunlop, M., Komninos, A., McGee-Lennon, M., Baillie, L., Edwards, A., ... & Mulder, I. (2014, September). Re-imagining commonly used mobile interfaces for older adults. In Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services (pp. 585-588). ACM. |
|
647 |
|
Gilad Gressel, H. P., Surendran, K., Thara, S., & Aravind, A. Ensemble Learning Approach for Author Profiling. |
|
648 |
|
Arunkumar, R., & Annalakshmi, A. (2014). A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET. International Journal of Computer Applications, 85(8). |
|
649 |
|
VinothKumar, K., & Rajaram, A. (2014). An Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks. IJCSNS, 14(12), 66. |
|
650 |
|
Cangea, O. (2014). Cryptographic Protocol for Wireless Networks Security. Petroleum-Gas University of Ploiesti Bulletin, Technical Series, 66(2). |
|
651 |
|
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for Manets. Middle-East Journal of Scientific Research, 22(1), 91-98. |
|
652 |
|
Deka, S., & Khaturia, M. Performance Analysis of DYMO Routing Protocol under Wormhole Attack in MANET. |
|
653 |
|
Pandian, A., & Sadiq, M. A. K. (2014). Authorship categorization in email investigations using fisher's linear discriminant method with radial basis function. Journal of Computer Science, 10(6), 1003. |
|
654 |
|
Qi, J. P., Zhang, Q., Zhu, Y., & Qi, J. (2014). A Novel Method for Fast Change-Point Detection on Simulated Time Series and Electrocardiogram Data. PloS one, 9(4), e93365. |
|
655 |
|
Jamil, N., Ramli, M. I., Abu Bakar, Z., & Seman, N. (2014, January). Prosody-based sentence boundary detection of spontaneous speech. In Intelligent Systems, Modelling and Simulation (ISMS), 2014 5th International Conference on (pp. 311-317). IEEE. |
|
656 |
|
Qi, J. P., Zhang, Q., Qi, J., & Zhu, Y. (2014). A Fast Method for Abrupt Change Detection from Large-Scale Electrocardiogram (ECG) Time Series. In Service Science and Knowledge Innovation (pp. 420-429). Springer Berlin Heidelberg. |
|
657 |
|
Jin-peng, Q., Qing, Z., Fang, P., & Jie, Q. (2014, July). A fast method for change point detection from large-scale time series based on Haar Wavelet and Binary Search Tree (HWBST). In Control Conference (CCC), 2014 33rd Chinese (pp. 506-511). IEEE. |
|
658 |
|
Han, G., Qian, A., Zhang, C., Wang, Y., & Rodrigues, J. J. (2014). Localization algorithms in large-scale underwater acoustic sensor networks: a quantitative comparison. International Journal of Distributed Sensor Networks, 2014. |
|
659 |
|
Ramezani, H., Fazel, F., Stojanovic, M., & Leus, G. (2014). Collision Tolerant Packet Scheduling for Underwater Acoustic Localization. arXiv preprint arXiv:1404.3881. |
|
660 |
|
Kulhandjian, H., & Melodia, T. (2014, September). A low-cost distributed networked localization and time synchronization framework for underwater acoustic testbeds. In Underwater Communications and Networking (UComms), 2014 (pp. 1-5). IEEE. |
|
661 |
|
Rao, P. M., & Raju, G. S. N. (2014). International Journal of Advanced Research in Computer Science and Software Engineering. International Journal, 4(12). |
|
662 |
|
Swain, G. (2014). Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science and Technology, 7(9), 1444-1450. |
|
663 |
|
Kachare, H., & Deshmukh, M. Metamorphic Cryptography: A Fusion of Cryptography and Steganography. International Journal of Engineering and Technical Research (IJETR), 2. |
|
664 |
|
Venkatesh, K., Shah, S. S. M., Narasimhan, D., Krishnan, R. B., & Raajan, N. R. (2014). A Crypto-Stego Based Approach for Secured Key Transfer. International Journal of Applied Engineering Research, 9(19), 5679-5687. |
|
665 |
|
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication. |
|
666 |
|
Wai, Z., & Than, S. Data Hiding Technique Depended on Pseudorandom Sequences. |
|
667 |
|
Leng, H. S. (2014) information hidden research - using perfect square , mixing with minimal distortion and edge detection function modulus of Information Management Thesis Chaoyang University of Technology , 1-64. |
|
668 |
|
Aldasouqi, I., & Salameh, W. A. (2014). Using GIS in Designing and Deploying Wireless Network in City Plans. |
|
669 |
|
Bikov, D., Bouyuklieva, S., & Stojanova, A. (2014). Wireless network security and cracking security key. |
|
670 |
|
Farjamfar, A., Abdullah, M. T., Mahmod, R., & Udzir, N. I. (2014). A review on mobile device's digital forensic process models. Res. J. Applied Sci. Eng. Technol, 8, 358-366. |
|
671 |
|
Agbele, K. K. (2014). Context-awareness for adaptive information retrieval systems (Doctoral dissertation, University of the Western Cape). |
|
672 |
|
Molaei Kermani , a. , Amir Masoud , mahr , & Abrahymnzhad . (2014 ) . Blind steganography based on Reed-Solomon codes and tables substituted with improved payload optimized embedded and resistance. Journal of Electrical Engineering , University of Tabriz , 43 ( 2 ) , 43-59. |
|
673 |
|
Finsterbusch, M., Richter, C., Rocha, E., Muller, J. A., & Hanssgen, K. (2014). A survey of payload-based traffic classification approaches. Communications Surveys & Tutorials, IEEE, 16(2), 1135-1156. |
|
674 |
|
Ghaffari, M., & Ghadiri, N. (2014). Ambiguity-Driven Fuzzy C-Means Clustering: How to Detect Uncertain Clustered Records. arXiv preprint arXiv:1409.2821. |
|
675 |
|
Suryaputra, A., Samopa, F., & Hindayanto, B. C. (2014). klasterisasi dan analisis trafik internet menggunakan fuzzy c mean dengan ekstraksi fitur data. jurnal informatika, 12(1), 33-39. |
|
676 |
|
Paramita, A. S., Samopa, F., & Hindayanto, B. C. (2014). Klasterisasi dan Analisis Trafik Internet Menggunakan Fuzzy C Mean Dengan Ekstraksi Fitur Data. |
|
677 |
|
Babu, K. R., & Sunitha, K. V. N. (2014). An effective hybrid technique for image enhancement through Genetic Algorithm-morphological operations. International Journal of Signal and Imaging Systems Engineering, 7(2), 83-91. |
|
678 |
|
Barai, A. K. Performance Based Association Rule-Mining Technique Using Genetic Algorithm. algorithms, 1, 2. |
|
679 |
|
Asha, T., Natarajan, S., & Murthy, K. N. B. (2014). optimization of association rules for tuberculosis using genetic algorithm. international journal of computing, 12(2), 151-159. |
|
680 |
|
Abubacker, N. F., Azman, A., Doraisamy, S., Murad, M. A. A., Elmanna, M. E. M., & Saravanan, R. (2014). Correlation-Based Feature Selection for Association Rule Mining in Semantic Annotation of Mammographic Medical Images. In Information Retrieval Technology (pp. 482-493). Springer International Publishing. |
|
681 |
|
Zhao, D. (2014). International Journal of" Computing" Research Institute of Intelligent Computer Systems Ternopil National Economic University. Computing, 13(2). |
|
682 |
|
Soundararajan, S. (2014). Multipath congestion control schemes for mobile ad hoc networks. |
|
683 |
|
Joardar, S., Giri, D., & Bhattacherjee, V. (2014). Probabilistic Approach-Based Congestion-Aware Swarm-Inspired Load-Balancing Multipath Data Routing in MANETs. In Intelligent Computing, Networking, and Informatics (pp. 409-421). Springer India. |
|
684 |
|
Knappstein-Hamelink, S. (2014). Network Discovery in a Recursive Internet Network Architecture (Doctoral dissertation, TU Delft, Delft University of Technology). |
|
685 |
|
Singh, G. (2014). Design and Development of ACO Routing Protocol for MANETs (Doctoral dissertation, THAPAR UNIVERSITY, PATIALA). |
|
686 |
|
Archana, S., & Saravanan, N. P. (2014, April). Biologically inspired QoS aware routing protocol to optimize lifetime in Sensor Networks. In Recent Trends in Information Technology (ICRTIT), 2014 International Conference on (pp. 1-6). IEEE. |
|
687 |
|
Singh, G., Kumar, N., & Verma, A. K. (2014). ANTALG: An Innovative ACO based Routing Algorithm for MANETs. Journal of Network and Computer Applications, 45, 151-167. |
|
688 |
|
Shial, R. K., Reddy, K. H. K., & Gouda, B. S. (2014, January). Finding a Trusted and Shortest Path Mechanism of Routing Protocol for Mobile Ad Hoc Network. In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol I (pp. 311-320). Springer International Publishing. |
|
689 |
|
Tan, S., Sok, P., & Kim, K. (2014). Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET. International Journal of Networked and Distributed Computing, 2(2), 100-107. |
|
690 |
|
Gupta, A., & Gupta, A. K. (2014). A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks. Global Journal of Computer Science and Technology, 14(1-E), 23. |
|
691 |
|
Hatzivasilis, G., Papaefstathiou, I., & Manifavas, C. (2014, November). ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks. In Computer Systems and Applications (AICCSA), 2014 IEEE/ACS 11th International Conference on (pp. 56-63). IEEE. |
|
692 |
|
Pradeep, P. V., & Harika, C. (2014). Detecting Adversary Location in Mobile Sensor Networks. International Journal of Research, 1(11), 1011-1022. |
|
693 |
|
Sharma, R., & Singla, B. An Introduction to MANETS. |
|
694 |
|
Sharma, R., & Singla, B. Comparison of AOMDV With and Without Black Hole Attack. |
|
695 |
|
BAKILER, H. IMPROVEMENT OF PERFORMANCE AND CAPACITIES OF WIRELESS AD HOC NETWORKS. |
|
696 |
|
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for MANETs. Journal of Convergence Information Technology, 9(6), 210. |
|
697 |
|
Enshaei, M., Hanapi, Z. M., & Othman, M. (2014). A review: Mobile Ad Hoc Networks challenges, attacks, security, vulnerability and routing protocols. International Journal on Communications Antenna and Propagation (IRECAP), 4(5), 168-179. |
|
698 |
|
Hassan, A., Ahsan, S., Alshomrani, S., & Alshamrani, A. (2014). Packet Travel Time based Mechanism for Detection and Mitigation against Wormhole Attack in AODV for MANETs. Life Science Journal, 11(10s). |
|
699 |
|
Hassan, A., & Radenkovic, M. (2014, August). Simulation of security attacks and preventions on AODV protocol in ns-3. In Innovative Computing Technology (INTECH), 2014 Fourth International Conference on (pp. 158-163). IEEE. |
|
700 |
|
Barkouzos, T. (2014). Security in Ad Hoc networks. |
|
701 |
|
Enshaei, M., Hanapi, Z. M., & Othman, M. (2014). Vulnerability and Routing Protocols. |
|
702 |
|
Aggarwal, A., Gandhi, S., Chaubey, N., Tada, N., & Trivedi, S. (2014). NDTAODV: Neighbor Defense Technique for Ad Hoc On-Demand Distance Vector (AODV) to mitigate flood attack in MANETS. arXiv preprint arXiv:1405.6216. |
|
703 |
|
Aligol, M., & Mohammadbeigi, A. (2014). Studying the tendency of the private sector to participate in family medicine doctors . Journal of Qom University of Medical Sciences , 8 ( 1 ). |
|
704 |
|
Abuadlla, Y., Kvascev, G., Gajin, S., & Jovanovic, Z. (2014). Flow-based anomaly intrusion detection system using two neural network stages. Computer Science and Information Systems, 11(2), 601-622. |
|
705 |
|
Choi, Y. B., Sershon, C., Briggs, J., & Clukey, C. Survey of Layered Defense, Defense in Depth and Testing of Network Security. |
|
706 |
|
ONUwA, O. B. (2014). Improving Network Attack Alarm System: A Proposed Hybrid Intrusion Detection System Model. |
|
707 |
|
Hameed, S. M., & Rashid, O. F. Intrusion Detection Approach Based on DNA Signature. |
|
708 |
|
Mgabile, T. (2014). Network intrusion detection system using neural networks approach in networked biometrics system (Doctoral dissertation). |
|
709 |
|
Chan, G. Y., Lee, C. S., & Heng, S. H. (2014). Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules. Applied Soft Computing, 24, 142-157. |
|
710 |
|
Kachurka, P., & Golovko, V. (2014). fusion of recirculation neural networks for real-time network intrusion detection and recognition. international Journal of Computing, 11(4), 383-390. |
|
711 |
|
Sethuramalingam, S., & Naganathan, E. R. A Fuzzy Model for Network Intrusion Detection. |
|
712 |
|
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for MANETs. Journal of Convergence Information Technology, 9(6), 210. |
|
713 |
|
Sekulski, R., & Woda, M. (2014). Adaptive method of users authentication and authorisation. In Proceedings of the 2nd Asia-Pacific Conference on Computer-Aided System Engineering, APCASE (pp. 10-12). |
|
714 |
|
van Eekelen, W., van den Elst, J., & Khan, V. J. (2014). Dynamic layering graphical elements for graphical password schemes. Creating the Difference, 65. |
|
715 |
|
Shrivastava, A., & Rizvi, M. A. (2014). Network Security Analysis Based on Authentication Techniques. |
|
716 |
|
Vasile, M. A., Pop, F., Tutueanu, R. I., Cristea, V., & Kolodziej, J. (2014). Resource-aware hybrid scheduling algorithm in heterogeneous distributed computing. Future Generation Computer Systems. |
|
717 |
|
Singh, S., & Kalra, M. (2014, November). Scheduling of Independent Tasks in Cloud Computing Using Modified Genetic Algorithm. In Computational Intelligence and Communication Networks (CICN), 2014 International Conference on (pp. 565-569). IEEE. |
|
718 |
|
Sharma, A., Singh, N., Hans, A., & Kumar, K. (2014, November). Review of task scheduling algorithms using genetic approach. In Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of (pp. 169-172). IEEE. |
|
719 |
|
Kara, N., Soualhia, M., Belqasmi, F., Azar, C., & Glitho, R. (2014). Genetic-based algorithms for resource management in virtualized IVR applications. Journal of Cloud Computing, 3(1), 1-18. |
|
720 |
|
YUSUF, A. B. (2014). application of genetic algorithm in modeling university admission decision support system (doctoral dissertation). |
|
721 |
|
Patel, P. S. (2014). Multi-Objective Job Scheduler using Genetic Algorithm in Grid Computing. International Journal of Computer Applications, 92(14). |
|
722 |
|
Kang, Y., Zhang, Y., Lin, Y., & Lu, H. (2014). An Improved Ant Colony System for Task Scheduling Problem in Heterogeneous Distributed System. In Computer Engineering and Networking (pp. 83-90). Springer International Publishing. |
|
723 |
|
Pan Yang, Qiu Jianlin, Yang Na, Biancai Feng, & Lu Pengcheng. (2014). Multiprocessor task scheduling algorithm based on tabu search. Computer Engineering and Design, 35 (12), 4186-4190. |
|
724 |
|
Kadhim, A. I., Cheah, Y. N., & Ahamed, N. H. (2014, December). Text Document Preprocessing and Dimension Reduction Techniques for Text Document Clustering. In Artificial Intelligence with Applications in Engineering and Technology (ICAIET), 2014 4th International Conference on (pp. 69-73). IEEE. |
|
725 |
|
Goel, S., Kumar, P., & Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator. |
|
726 |
|
Angaitkar, A. V., Shekokar, N., & Maurya, M. The Countering the XDoS Attack for Securing the Web Services. |
|
727 |
|
Wu Xindong, Li Yadong, & Hu Donghui. (2014). Evidence of the social network. Journal of Software, 25 (12). |
|
728 |
|
Rahman, A. F. A., Mohamad, M. Z., Ahmad, R., & Malaysia, C. (2014). Preventive and Detective Mechanism for Forensic Readiness Secure Network Architecture for WBAN. |
|
729 |
|
Rahim, N., Wahab, W. A., Idris, Y. I., & Kiah, L. M. Digital Forensics: An Overview of the Current Trends. |
|
730 |
|
Liu, Y., Li, C., & Liu, W. (2014). Integrated solution for timely delivery of customer change requests: A case study of using devops approach. International Journal of U-and E-Service Science and Technology, 7(2), 41-50. |
|
731 |
|
Kamalzaman, S. N. A., Mohamad, S. M. S., & Sulaiman, S. (2014). Managing Modification Requests in Web Applications: A Systematic Literature Review. International Journal of Software Engineering and Technology, 1(1). |
|
732 |
|
Mellado, D., Mouratidis, H., & Fernández-Medina, E. (2014). Secure Tropos framework for software product lines requirements engineering. Computer Standards & Interfaces, 36(4), 711-722. |
|
733 |
|
Keerthi, T. (2014). Distilling Mobile Privacy Requirements from Qualitative Data (Doctoral dissertation, The Open University). |
|
734 |
|
Tamrakar, S., & Aloney, M. R. (2013). Role of Artificial Neural Networks in Digital Image Processing: A review. Journal of Environmental Science, 2(3), 908-913. |
|
735 |
|
Sardar, M., & Majumder, K. (2013). A Comparative Study on Different Trust Based Routing Schemes in MANET. International Journal of Wireless & Mobile Networks, 5(5), 145. |
|
736 |
|
Abel, K. (2013).benefits of shifting freight delivery to night time, considering routing and environmental effects for addis ababa city (Doctoral dissertation, aau). |
|
737 |
|
Fasola, J., & Mataric, M. (2013). A socially assistive robot exercise coach for the elderly. Journal of Human-Robot Interaction, 2(2), 3-32. |
|
738 |
|
Kalaivani, R., & Thangaraj, P. (2013). An effective technique to identify a river’s stage through satellite images by means of RBFNN. The Imaging Science Journal, 61(3), 279-291. |
|
739 |
|
Sun, D., Deng, H., Wang, F., Ji, K., Dai, W., Liang, B., & Wei, S. (2013, November). The Feature Related Techniques in Content-Based Image Retrieval and Their Application in Solar Image Data. In Intelligent Networks and Intelligent Systems (ICINIS), 2013 6th International Conference on (pp. 336-339). IEEE. |
|
740 |
|
Khandelwal, V., & Goyal, D. (2013). BlackHole Attack and Detection Method for AODV Routing Protocol in MANETs. IJARCET, 2(4), 1555-9. |
|
741 |
|
Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of Impact of Wormhole Attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652. |
|
742 |
|
Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of Impact of Wormhole Attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652. |
|
743 |
|
Karthikeyan, P., Baskar, S., & Alphones, A. (2013). Improved genetic algorithm using different genetic operator combinations (GOCs) for multicast routing in ad hoc networks. Soft Computing, 17(9), 1563-1572. |
|
744 |
|
Saehana, S., Iskandar, F., & Abdullah, M. (2013). Optimization of electrospinning parameter by employing genetic algorithm in order to produce desired nanofiber diameter. World Academy of Science, Engineering and Technology, International Journal of Chemical, Molecular, Nuclear, Materials and Metallurgical Engineering, 7(1), 78-83. |
|
745 |
|
Singh, M., Sharma, S., & Kaur, A. (2013). Performance Analysis of Decision Trees. International Journal of Computer Applications, 71(19), 10-14. |
|
746 |
|
Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques. |
|
747 |
|
Li Nan , & Zhang Xuefu . ( 2013 ) found that knowledge-based Application System related data . Library and Information Service , ( 6 ) , 127-133. |
|
748 |
|
Rong, C., Quan, Z., & Chakravorty, A. (2013, December). On Access Control Schemes for Hadoop Data Storage. In Cloud Computing and Big Data (CloudCom-Asia), 2013 International Conference on (pp. 641-645). IEEE. |
|
749 |
|
Pandian, A., & Sadiq, A. K. (2013). Authorship Attribution in Tamil Language Email For Forensic Analysis. International Review on Computers and Software (IRECOS), 8(12), 3002-3008. |
|
750 |
|
Murtaza, M., Shah, J. H., Azeem, A., Nisar, W., & Masood, M. (2013). Structured Language Requirement Elicitation Using Case Base Reasoning. Research Journal of Applied Sciences, Engineering and Technology, 6, 23. |
|
751 |
|
Aziz, A. S., Azar, A. T., Salama, M., Hassanien, A. E., & Hanafy, S. E. O. (2013, September). Genetic algorithm with different feature selection techniques for anomaly detectors generation. In Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on (pp. 769-774). IEEE. |
|
752 |
|
Alanazi, H. O., Abdullah, A., & Al Jumah, M. (2013). A critical review for an accurate and dynamic prediction for the outcomes of traumatic brain injury based on Glasgow Outcome Scale. Journal of Medical Sciences, 13(4), 244. |
|
753 |
|
Priedniece, K., Nikitenko, A., Liekna, A., & Kulikovskis, G. (2013). Use of Learning Methods to Improve Kinematic Models. Applied Computer Systems, 14(1), 73-79. |
|
754 |
|
Günüç, S. (2013). Internet Bagimliligini Yordayan Bazi Degiskenlerin Cart ve Chaid Analizleri ile Incelenmesi. Turk Psikoloji Dergisi, 28(71). |
|
755 |
|
Günüç, S. (2013). Internet Bagimliligini Yordayan Bazi Degiskenlerin Cart ve Chaid Analizleri ile Incelenmesi. Türk Psikoloji Dergisi, 28(71), 88. |
|
756 |
|
Madhura, G. K., & Shivamurthy, R. C. twitter sentiment analysis for product reviews to gather information using mach ine learning. |
|
757 |
|
Anand, R., Khanna, R., Student, N. C., & Israna, P. (2013). International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net. CYBERNETICS: SYSTEMS, 43(4). |
|
758 |
|
Zhang, Q. (2013). Aspect-Oriented Product Family Modeling. |
|
759 |
|
Mguni, K., & Ayalew, Y. (2013). An Assessment of Maintainability of an Aspect-Oriented System. ISRN Software Engineering, 2013. |
|
760 |
|
Ramos de Oliveira, R., Sanchez, V., Vinicius, R., Estrella, J. C., Pontin de Mattos Fortes, R., & Brusamolin, V. (2013, September). Comparative evaluation of the maintainability of RESTful and SOAP-WSDL web services. In Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA), 2013 IEEE 7th International Symposium on the (pp. 40-49 |
|
761 |
|
Tiwari, G., & Sharma, A. Maintainability Prediction-An Artificial Neural Network Based Approach. |
|
762 |
|
Ahmed, S., & Nirkhi, S. M. (2013). Fuzzy Forensic Analysis System for DDoS Attack in MANET Response Analysis. simulation, 639(156), 343. |
|
763 |
|
Sulaiman, S., Shamsuddin, S. M., & Abraham, A. (2013). A Survey of Web Caching Architectures or Deployment Schemes. International Journal of Innovative Computing, 3(1). |
|
764 |
|
Sirour, H. A. N., Hamad, Y. A. M., & Eisa, A. (2013, August). An agent-based proxy cache cleanup model using fuzzy logic. In Computing, Electrical and Electronics Engineering (ICCEEE), 2013 International Conference on (pp. 486-491). IEEE. |
|
765 |
|
ShanmugaSundaram, G., & Aswini, S. Optimizing the Performance in Web Browsers through Data Compression. |
|
766 |
|
Alguliev, R. M., Aliguliyev, R. M., & Isazade, N. R. (2013). Mr&Mr-Sum: Maximum Relevance And Minimum Redundancy Document Summarization Model. International Journal of Information Technology & Decision Making, 12(03), 361-393. |
|
767 |
|
Black, J. (2013). On the derivation of value from geospatial linked data (Doctoral dissertation, University of Southampton). |
|
768 |
|
Tan, M., & Morales-Arroyo, M. (2013). Understanding distributional disruptions in the Interactive Digital Media eco-system. International Journal of Electronic Business, 11(1), 42-62. |
|
769 |
|
Wong, R. K. (2013). Feasibility and a case study on content optimization services on cloud. Information Systems Frontiers, 15(4), 525-532. |
|
770 |
|
Al-Azawi, R., Ayesh, A., Kenny, I., & Al-Masruri, K. A. (2013). Towards an AOSE: Game development methodology. In Distributed Computing and Artificial Intelligence (pp. 493-501). Springer International Publishing. |
|
771 |
|
Pauline, M., Aruna, P., & Shadaksharappa, B. (2013). Layered model to Estimate Effort, Performance and cost of the Software projects. International Journal of Computer Applications, 63(13), 17-23. |
|
772 |
|
Rai, D., & Tyagi, K. (2013, July). Estimating the regression test case selection probability using fuzzy rules. In Recent Trends in Information Technology (ICRTIT), 2013 International Conference on (pp. 603-611). IEEE. |
|
773 |
|
Elgamel, M. S., Korani, E. A., & El Helow, K. R. Developing a Software Certification for Quality Assurance. |
|
774 |
|
Dhule, C. A., & Nagrare, T. H. (2013). Design Of Virtual Sense Technology For System Interface. IJRCCT, 2(12), 1454-1459. |
|
775 |
|
Eun, H., Lee, H., & Oh, H. (2013). Conditional privacy preserving security protocol for NFC applications. Consumer Electronics, IEEE Transactions on, 59(1), 153-160. |
|
776 |
|
Lin, Y., Hou, M., & Xu, Q. (2013, December). Strongly Password-Based Three-Party Authenticated Key Exchange Protocol. In Computational Intelligence and Security (CIS), 2013 9th International Conference on (pp. 555-558). IEEE. |
|
777 |
|
Banu, S. S., & Dhanasekaran, R. (2013). EMRCS: Efficient Multipath Routing based Cryptography Scheme in Wireless Sensor Networks. Wireless Communication, 5(1), 24-31. |
|
778 |
|
Singh, P., & Chadha, R. S. (2013). A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology (IJEIT), 2(9), 165-175. |
|
779 |
|
Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques. |
|
780 |
|
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42. |
|
781 |
|
Sahu, M., Pradhan, S. R., & Das, M. (2013). Unicode and Colours Mapping for Cryptography and Steganography using Discrete Wavelet Transform. International Journal of Computer Applications, 70(5), 36-41. |
|
782 |
|
Tayel, M., Hafez, A., & Shawky, H. (2013, December). A new hybrid fuzzy-decomposed full capacity Stego-system. In High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 2013 10th International Conference on (pp. 16-20). IEEE. |
|
783 |
|
ShivaKumar, K. B., Jayaramu, H. S., & Srinidhi, G. A. (2013, September). A novel data hiding technique. In Research & Technology in the Coming Decades (CRT 2013), National Conference on Challenges in (pp. 1-5). IET. |
|
784 |
|
Yajurvedi, A. H., & Kulkarni, S. (2013, January). An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 203-212). Springer India. |
|
785 |
|
Saejung, S., Boondee, A., Preechasuk, J., & Chantrapornchai, C. (2013, September). On the comparison of digital image steganography algorithm based on DCT and wavelet. In Computer Science and Engineering Conference (ICSEC), 2013 International (pp. 328-333). IEEE. |
|
786 |
|
Fayyaz, N., Imranuddin, R., Anwar, S. U., & Rukh, L. (2013). Steganography Based Authentication to Prevent IP Spoofing. Life Science Journal, 10(12s). |
|
787 |
|
Nagaty, K. A. (2013). Secret Sharing using Image Hashing. International Journal of Computer Applications, 73(20), 14-22. |
|
788 |
|
Sagheer, A. M., Abdulhameed, A. A., & AbdulJabbar, M. A. (2013, December). SMS Security for Smartphone. In Developments in eSystems Engineering (DeSE), 2013 Sixth International Conference on (pp. 281-285). IEEE. |
|
789 |
|
Begum, M. B., & Venkataramani, Y. (2013). A new compression scheme for secure transmission. International Journal of Automation and Computing, 10(6), 578-586. |
|
790 |
|
Patil, M., & Sahu, V. (2013). A Survey of Compression and Encryption Techniques for SMS. |
|
791 |
|
Ahmed, Z. H. (2013). An exact algorithm for the clustered travelling salesman problem. Opsearch, 50(2), 215-228. |
|
792 |
|
Ahmed, Z. H. (2013). A hybrid genetic algorithm for the bottleneck traveling salesman problem. ACM Transactions on Embedded Computing Systems (TECS), 12(1), 9. |
|
793 |
|
Ahmed, Z. H. (2013). A new reformulation and an exact algorithm for the quadratic assignment problem. Indian Journal of Science and Technology, 6(4), 4368-4377. |
|
794 |
|
Kale, K. V., Deshmukh, P. D., Chavan, S. V., Kazi, M. M., & Rode, Y. S. (2013, October). Zernike moment feature extraction for handwritten Devanagari compound character recognition. In Science and Information Conference (SAI), 2013 (pp. 459-466). IEEE. |
|
795 |
|
Dineshkumar, R., & Suganthi, J. (2013). A research survey on sanskrit offline handwritten character recognition. International Journal of Scientific and Research Publications (IJSRP), 3, 13-16. |
|
796 |
|
Kazi, M. M., & Rode, Y. S. (2013). Handwritten and Printed Devanagari Compound using Multiclass SVM Classifier with Orthogonal moment Feature. |
|
797 |
|
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013, March). Handwritten devnagari consonants recognition using mlpnn with five fold cross validation. In Circuits, Power and Computing Technologies (ICCPCT), 2013 International Conference on (pp. 1222-1226). IEEE. |
|
798 |
|
Garg, N. K., Kaur, L., & Jindal, M. (2013). Recognition of Offline Handwritten Hindi Text Using SVM. International Journal of Image Processing (IJIP), 7(4), 395. |
|
799 |
|
Thaker, H. R., & Kumbharana, C. K. (2013). Study of Different Off-line Handwritten Character Recognition Algorithms for Various Indian Scripts. International Journal of Computer Applications, 65(16). |
|
800 |
|
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013, August). Design and analysis of LRTB feature based classifier applied to handwritten Devnagari characters: A neural network approach. In Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on (pp. 96-101). IEEE. |
|
801 |
|
Goyal, M., & Garg, N. K. (2013). Techniques for Recognition of Handwritten Devanagari Numeral. International Journal of Advanced Research in Computer Science, 4(9). |
|
802 |
|
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013). Classification of Devnagari Handwritten Characters using Single Hidden Layer Neural Network with Mixed Activation Function. |
|
803 |
|
Choudhury, A. (2013). Recognition of Handwritten Bangla Numerals using Template Matching (Doctoral dissertation, jadavpur university kolkata). |
|
804 |
|
Arora, S. Studies on some Soft Computing Techniques: A Case Study for Constrained Handwritten Devnagari Characters and Numerals. |
|
805 |
|
Shinde, S., & Mane, M. V. LBG Vector Quantization for Recognition of Handwritten Marathi Barakhadi. |
|
806 |
|
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. Offline Recognition of Devanagari Handwritten Consonants Using Projection features and mlpnn. |
|
807 |
|
Ikram, A., Anjum, A., Hill, R., Antonopoulos, N., Liu, L., & Sotiriadis, S. (2013). Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience. |
|
808 |
|
Skracic, K., Pale, P., & Jeren, B. (2013, May). Knowledge based authentication requirements. In Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention on (pp. 1116-1120). IEEE. |
|
809 |
|
Kumar, S. B. on-chip address and test pattern generation for image watermarking sram. |
|
810 |
|
Uma, M., & Padmavathi, G. (2013). A Survey on Various Cyber Attacks and their Classification. IJ Network Security, 15(5), 390-396. |
|
811 |
|
Tanwar, S., & Prema, K. V. (2013). Threats & Security Issues in Ad hoc network: A Survey Report. International Journal of Soft Computing and Engineering, 2(6). |
|
812 |
|
Kumar, B. A., Kavuri, K., & Batchanaboyina, M. (2013). A Novel Approach for Preventing Hackers in Data Communication. International Journal of Advanced Studies in Computers, Science and Engineering, 2(2), 1. |
|
813 |
|
Grochocki, D. (2013). Deployment considerations for intrusion detection systems in advanced metering infrastructure. |
|
814 |
|
Khubalkar, A. S., & Ragha, L. R. (2013, July). Security enabled DSR for establishing symmetric key and security in MANETS. In Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on (pp. 1-5). IEEE. |
|
815 |
|
Mandala, S., Abdullah, A. H., Ismail, A. S., Haron, H., Ngadi, M. A., & Coulibaly, Y. (2013, November). A review of blackhole attack in mobile adhoc network. In Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), 2013 3rd International Conference on (pp. 339-344). IEEE. |
|
816 |
|
Gupta, N. K., & Garg, A. (2013). Trust and Shortest Path Selection based Routing Protocol for MANET. International Journal of Computer Applications, 76(12). |
|
817 |
|
Saxena, N., Kumar, S., & Saxena, V. (2013). Performance Analysis of AODV Routing Protocol under the Different Attacks Through The Use Of OPNET Simulator. International Journal of Innovative Research and Development, 2(12). |
|
818 |
|
Shrivastava, S., & Jain, S. (2013). A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network. International Journal of Computer Science & Engineering Technology (IJCSET), 4(3). |
|
819 |
|
Singhal, P., & Kumar, R. (2013). Analyzing Misbehavior of Selfish Nodes in Mobile Adhoc Network. International Journal of Computer Applications (0975–8887) Volume. |
|
820 |
|
Ahmed, M. N., Abdullah, A. H., & El-Sayed, A. (2013). A survey of MANET survivability routing techniques. |
|
821 |
|
Singh, J. P., & Gupta, A. K. (2013). Protocol Stack based Security Vulnerabilities in MANETs. International Journal of Computer Applications (0975–8887), 69(21). |
|
822 |
|
Singh, D. (2013). Intrusion Detection System based on Fuzzy C Means Clustering and Probabilistic Neural Network. |
|
823 |
|
Singh, A., Khanna, O. S., Singh, S. P., & Singh, J. (2013). Multipath Algorithm For Prevention Of Wormhole Attack In Manet. |
|
824 |
|
Shrivastava, A., & Ahirwal, R. R. (2013). A SVM and K-means Clustering based Fast and Efficient Intrusion Detection System. International Journal of Computer Applications, 72(6), 25-29. |
|
825 |
|
Callegari, C., Giordano, S., Mannella, S., & Pagano, M. (2013). Design and Implementation of a Testbed for the Security Assessment of MANETs. In Cyberspace Safety and Security (pp. 228-242). Springer International Publishing. |
|
826 |
|
Nirmala, G., Thudupathi, E., & Nadu, T. (2013). Risk-Aware Response Mechanism with Extended DS theory. Risk, 2(1), 6-15. |
|
827 |
|
Gupta, N. K., & Pandey, K. (2013, August). Trust based Ad-hoc on Demand Routing protocol for MANET. In Contemporary Computing (IC3), 2013 Sixth International Conference on (pp. 225-231). IEEE. |
|
828 |
|
ON, S. O. B. H. A. (2013). A STUDY OF DIFFERENT ATTACKS IN MANET AND DISCUSSION ABOUT SOLUTIONS OF BLACK HOLE ATTACK ON AODV PROTOCOL. |
|
829 |
|
Chen, P. Y., & Lin, F. Y. S. (2013). Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques. Journal of Applied Mathematics, 2013. |
|
830 |
|
Dhiman, D., & Nayyar, A. (2013). Complete Scenario of Routing Protocols, Security Leaks and Attacks in MANETs. International Journal, 3(10). |
|
831 |
|
Shukla, R., & Bhandari, R. (2013). A Novel Minimized Computational Time Based Encryption and Authentication Using ECDSA. International Journal of Modern Education and Computer Science (IJMECS), 5(9), 19. |
|
832 |
|
Yadav, N. A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks. |
|
833 |
|
Elamathi, N. a study of routing attacks in wireless mobile adhoc networks. |
|
834 |
|
Barcena-Humanes, J. L., Mata-Moya, D., Jarabo-Amores, M. P., del Rey-Maestre, N., & Martin de Nicolas-Presa, J. (2013, June). Analysis of NNs Detectors for Targets with Unknown Correlation in Gaussian Interference. In Computational Intelligence, Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on (pp. 48-53). IEEE. |
|
835 |
|
Zamani, A., Sorbi, M. R., & Safavi, A. A. (2013). Application of neural network and ANFIS model for earthquake occurrence in Iran. Earth Science Informatics, 6(2), 71-85. |
|
836 |
|
Kodali, R. K., Patel, K. H., & Sarma, N. N. (2013). Implementation of Energy Efficient Scalar Point Multiplication Techniques for ECC. International Journal on Recent Trends in Engineering & Technology, 9(1), 14. |
|
837 |
|
Kodali, R. K., Patel, K. H., & Sarma, N. (2013, February). Energy efficient elliptic curve point multiplication for WSN applications. In Communications (NCC), 2013 National Conference on (pp. 1-5). IEEE. |
|
838 |
|
Zele, A. P., & Wadhe, A. P. Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography. |
|
839 |
|
Kulkarni, V. (2013). Speaker identification using orthogonal transforms and vector quantization. |
|
840 |
|
Kekre, H. B., & Kulkarni, V. (2013, January). Closed set and open set Speaker Identification using amplitude distribution of different Transforms. In Advances in Technology and Engineering (ICATE), 2013 International Conference on (pp. 1-8). IEEE. |
|
841 |
|
Siddiqui, S. T., Hamatta, H. S., & Bokhari, M. U. (2013). Multilevel Security Spiral (MSS) Model: NOVEL Approach. International Journal of Computer Applications, 65(20). |
|
842 |
|
Pirnau, M. (2013, June). The analysis of the. NET architecture security system. In Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on (pp. 1-6). IEEE. |
|
843 |
|
Athawale, A. (2013). Information Hiding in image and audio files. |
|
844 |
|
Xu, L., Yeh, Y. R., Lee, Y. J., & Li, J. (2013). A Hierarchical Framework Using Approximated Local Outlier Factor for Efficient Anomaly Detection. Procedia Computer Science, 19, 1174-1181. |
|
845 |
|
Sladic, G., Vidakovic, M., & Konjovic, Z. (2013). Network Monitoring Using Intelligent Mobile Agents. In Intelligent Systems: Models and Applications (pp. 301-318). Springer Berlin Heidelberg. |
|
846 |
|
Chaoyu, Y. A. N. G., Yerong, H. E., & Minli, S. O. N. G. (2013). Wireless Sensor Network Topology Control Based on Agent. Sensors & Transducers (1726-5479), 160(12). |
|
847 |
|
Kotenko, I., & Chechulin, A. (2013, June). A cyber attack modeling and impact assessment framework. In Cyber Conflict (CyCon), 2013 5th International Conference on (pp. 1-24). IEEE. |
|
848 |
|
Mazumder, J. A., & Hemachandran, K. (2013). A high capacity and secured color image steganographic technique using discrete wavelet transformation. International Journal of Computer Science and Information Technologies, 4(4), 583-589. |
|
849 |
|
Mann, V. K., & Dhaliwal, H. S. (2013). 32* 32 Colour Image Steganography. International Journal of Engineering Trends and Technology (IJETT) Vol, 4. |
|
850 |
|
Mazumder, J. A., & Hemachandran, K. (2013). Study of Image steganography using LSB, DFT and DWT. International Journal of Computers & Technology, 11(5), 2618-2627. |
|
851 |
|
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42. |
|
852 |
|
Atawneh, S., & Sumari, P. (2013). Hybrid and Blind Steganographic Method for Digital Images Based on DWT and Chaotic Map. Journal of Communications, 8(11). |
|
853 |
|
Zhou, Y., & Ng, W. W. (2013, July). A study of influence between digital watermarking and steganography. In Wavelet Analysis and Pattern Recognition (ICWAPR), 2013 International Conference on (pp. 49-55). IEEE. |
|
854 |
|
Lin, Q., Wang, R., Ye, N., & Wang, Z. (2013). Energy efficient distributed steganography for secure communication in wireless multimedia sensor networks. Journal of Electronics (China), 30(1), 9-16. |
|
855 |
|
Kanzariya, N., Nimavat, A., & Patel, H. (2013). Security of Digital Images using Steganography Techniques based on LSB, DCT and Huffman Encoding. |
|
856 |
|
Yajurvedi, A. H., & Kulkarni, S. (2013, January). An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 203-212). Springer India. |
|
857 |
|
Mondal, A., Sahana, S., & Mahata, S. K. (2013, April). A Pictorial Block Steganography based Secure Algorithm for Data Transfer. In IJCA Special Issue on International Conference on Computing, Communication and Sensor Network (No. 4, pp. 12-15). Foundation of Computer Science (FCS). |
|
858 |
|
Dagar, S. (2013). RGB Based Dual Key Image Steganography. |
|
859 |
|
Sahana, S., Sen, J., & Mondal, C. Secure Adaptive N-cryption (SAN). |
|
860 |
|
Shahana, T. A Secure DCT Image Steganography based on Public-Key Cryptography. |
|
861 |
|
Kamble, S. V., & Warvante, B. G. A Review on Novel Image Steganography Techniques. |
|
862 |
|
Mann, V. K., Dhaliwal, H. S., & Dhaliwal, H. S. Nav view search. |
|
863 |
|
Maan, V. K., & Dhaliwal, H. S. 32× 32 Vector Quantization Based Colour Image Steganography. |
|
864 |
|
Chaturvedi, P., & Bairwa, R. K. Image Steganography Method for Hiding Secret Message in Colored Images by Using IWT. |
|
865 |
|
Wang, D., Chen, D., & Guo, R. (2013). DDoS mitigation in content distribution networks. International Journal of Wireless and Mobile Computing, 6(5), 508-514. |
|
866 |
|
Cartier, G., Cartier, J. F., & Fernandez, J. M. (2013). Next-generation dos at the higher layers: A study of smtp flooding. In Network and System Security (pp. 149-163). Springer Berlin Heidelberg. |
|
867 |
|
Bou-Harb, E., Pourzandi, M., Debbabi, M., & Assi, C. (2013). A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. Security and Communication Networks, 6(12), 1478-1489. |
|
868 |
|
Bedi, D. S. (2013). Information security in hospitality SMMEs in the Cape Metropole area: policies and measures in the online environment (Doctoral dissertation, Cape Peninsula University of Technology). |
|
869 |
|
Aye, N., Khin, H. S., Win, T. T., KoKo, T., Than, M. Z., Hattori, F., & Kuwabara, K. (2013). Multi-domain public key infrastructure for information security with use of a multi-agent system. In Intelligent Information and Database Systems (pp. 365-374). Springer Berlin Heidelberg. |
|
870 |
|
Peng, B., & Li, L. (2013). QoS Multicast Routing Algorithm Based on Genetic Algorithm and Ant Colony Optimization. International Information Institute (Tokyo). Information, 16(10), 7717. |
|
871 |
|
Chen, H., & Zhou, P. (2013, July). An ant algorithm for solving the four-coloring map problem. In Natural Computation (ICNC), 2013 Ninth International Conference on (pp. 491-495). IEEE. |
|
872 |
|
Nakhumwa, J. N. (2013). Adoption of E-commerce Payment Systems by Commercial Banks in Kenya (Doctoral dissertation, University of Nairobi). |
|
873 |
|
Kerrigan, M. (2013). A capability maturity model for digital investigations. Digital Investigation, 10(1), 19-33. |
|
874 |
|
Saleem, S., Popov, O., & Appiah-Kubi, O. K. (2013). Evaluating and comparing tools for mobile device forensics using quantitative analysis. In Digital Forensics and Cyber Crime (pp. 264-282). Springer Berlin Heidelberg. |
|
875 |
|
Fenu, G., & Solinas, F. (2013). computer forensics investigation an approach to evidence in cyperspace. In The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) (pp. 77-88). The Society of Digital Information and Wireless Communication. |
|
876 |
|
Neil, A. M., Elmogy, M., & RIAD, A. (2013). A Proposed Framework for Crime Investigation Based On Windows Registry Analysis. Journal of Engineering and Applied Science, Faculty of Engineering, Cairo University, 60(1). |
|
877 |
|
Fenu, G., & Solinas, F. (2013). Computer forensics between the italian legislation and pragmatic questions. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2(1), 9-24. |
|
878 |
|
Vlachopoulos, K., Magkos, E., & Chrissikopoulos, V. (2013). A model for hybrid evidence investigation. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, 150. |
|
879 |
|
Bulbul, H. I., Yavuzcan, H. G., & Ozel, M. (2013). Digital forensics: An Analytical Crime Scene Procedure Model (ACSPM). Forensic science international, 233(1), 244-256. |
|
880 |
|
Hewling, M. O. (2013). Digital forensics: an integrated approach for the investigation of cyber/computer related crimes. |
|
881 |
|
Krishnan, M., Karthikeyan, T., Chinnusamy, T. R., & Murugesan, A. (2013). Dynamic Scheduling of Flexible Manufacturing System Using Scatter Search Algorithm. International Journal of Emerging Technology and Advanced Engineering, 3(10), 329-341. |
|
882 |
|
Ismail, M. A. (2013, April). Multi-core processor based parallel implementation for finding distribution vectors in Markov processes. In Electronics, Communications and Photonics Conference (SIECPC), 2013 Saudi International (pp. 1-5). IEEE. |
|
883 |
|
Shahi, G., & Singh, C. (2013). To Secure and Compress the Message on Local Area Network. International Journal of Computer Applications, 69(17), 43-47. |
|
884 |
|
Dutta, S., Kumar, C., & Chakraborty, S. (2013). A symmetric key algorithm for cryptography using music. International Journal of Engineering and Technology, 5(3), 3109-3115. |
|
885 |
|
Rote, G. D., & Patil, A. M. Steganography with Cryptography Technique For Data Hiding. |
|
886 |
|
Das, D., Lanjewar, U. A., & Sharma, S. J. The Art of Cryptology: From Ancient Number System to Strange Number System. |
|
887 |
|
Nithyaa, A. N., Premkumar, R., Kanchana, D., & Krishnan, N. A. (2013). Automated Detection and Classification of Blood Diseases. In Recent Advancements in System Modelling Applications (pp. 393-404). Springer India. |
|
888 |
|
Suradkar, P. T. (2013). Detection of malarial parasite in blood using image processing. International Journal of Engineering and Innovative Technology (IJEIT), 2(10). |
|
889 |
|
Waghmare, V., & Akhter, S. Image Analysis Based System for Automatic Detection of Malarial Parasite in Blood Images. |
|
890 |
|
Opoku-Ansah, J., Anderson, B., Eghan, J. M., Boampong, J. N., Adueming, P. O. W., Amuah, C. L. Y., & Akyea, A. G. (2013). Automated Protocol for Counting Malaria Parasites (P. falciparum) from Digital Microscopic Image Based on L* a* b* Colour Model and K-Means Clustering. |
|
891 |
|
Elmir, A., Elmir, B., & Bounabat, B. (2013, November). Multi-facet quality assessment of process driven services in collaborative networks. In ISKO-Maghreb, 2013 3rd International Symposium (pp. 1-7). IEEE. |
|
892 |
|
Könst, W. J. (2013). Usability of Networked Information. |
|
893 |
|
Elmir, A., Elmir, B., & Bounabat, B. (2013). Towards an Assessment-oriented Model for External Information System Quality Characterization. arXiv preprint arXiv:1310.8111. |
|
894 |
|
Mahajan, D., & Sachdeva, M. (2013, December). Distinguishing DDoS Attack from Flash Event Using Real-World Datasets with Entropy as an Evaluation Metric. In Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on (pp. 90-94). IEEE. |
|
895 |
|
Kaur, S., & Bansal, R. (2013). enhanced technique for secured and reliable watermarking using mfhwt. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(5), pp-1674. |
|
896 |
|
Mishra, S., Mahapatra, A., & Mishra, P. (2013). A survey on Digital watermarking techniques. International Journal of Computer Science and Information Technologies, 4(3), 451-456. |
|
897 |
|
Shrirao, D. W., & Honole, S. A Survey on Improving Robustness of Image Watermarking By Using Gradient. |
|
898 |
|
Hasan, H. R., Sulong, G. B., & Selamat, A. A Novel Blind Color Image Watermarking Technique in Hybrid Domain Using LSB Approach and Discrete Slantlet Transform. |
|
899 |
|
Nilizadeh, A. F., & Nilchi, A. R. N. (2013). Steganography on RGB Images Based on a “Matrix Pattern” using Random Blocks. International Journal of Modern Education and Computer Science (IJMECS), 5(4), 8. |
|
900 |
|
Mann, V. K., & Dhaliwal, H. S. (2013). 32* 32 Colour Image Steganography. International Journal of Engineering Trends and Technology (IJETT) Vol, 4. |
|
901 |
|
Maan, V. K., & Dhaliwal, H. S. 32× 32 Vector Quantization Based Colour Image Steganography. |
|
902 |
|
Mohebbi, K., Ibrahim, S., & Idris, N. B. (2013). Prediction of relevance between requests and web services using ANN and LR models. In Intelligent Information and Database Systems (pp. 40-49). Springer Berlin Heidelberg. |
|
903 |
|
Shibata, S. I., Sato, F., Kimura, H., & Oyabu, T. A Fluctuation Characteristic of Plant Bioelectric Potential for Evaluating Abnormal Growth in Physiological Disorders. |
|
904 |
|
Das, S., Zaman, J. U., & Ghosh, R. (2013). Generation of AES S-boxes with Various Modulus and Additive Constant Polynomials and Testing their Randomization. Procedia Technology, 10, 957-962. |
|
905 |
|
Riman, C., & Hallal, H. H. (2013, January). DES Based Educational Encryption System. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp). |
|
906 |
|
Yadav, S., & Lakhani, K. (2013). A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET. International Journal of Distributed and Parallel Systems, 4(2), 17. |
|
907 |
|
Sivagurunathan, S., & Prathapchandran, K. (2013). Survey of Cluster-Based Cryptographic Schemes to Secure MANET. In Proceedings of the International Conference on Applied Mathematics and Theoretical Computer Science (p. 243). |
|
908 |
|
Oguike, O. E. (2013). Recursive Shortest Route Algorithm Using Abstract Data Type, Graph. African Journal of Computing & ICT, 6(2). |
|
909 |
|
Shaikh, E. A., & Dhale, A. AGV Path Planning and Obstacle Avoidance Using Dijkstra’s Algorithm. |
|
910 |
|
Ismail, M. N., Aborujilah, A., Musa, S., & Shahzad, A. (2013, January). Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. In Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication (p. 36). ACM. |
|
911 |
|
Chawla, I., Kaur, D., & Luthra, P. DDoS Attacks in Cloud and Mitigation Techniques. |
|
912 |
|
Shah, N., Chaudhary, L., Rajmane, A., Patil, N., & Khatke, K. (2013). Implementation Of C-Trend For Commercial Application. |
|
913 |
|
Sardar, M., & Majumder, K. Asurvey on trust based secure routing in manet. |
|
914 |
|
Ganesh, M. S., & Thanushkodi, K. (2013).Fashcep: Fuzzy and Analogy Based Hybrid Software Cost Estimation Process. International Review on Computers and Software (IRECOS), 8(7), 1497-1505. |
|
915 |
|
Pauline, M., Aruna, P., & Shadaksharappa, B. Comparison of available Methods to Estimate Effort, Performance and Cost with the Proposed Method. |
|
916 |
|
Aljahdali, S., & Sheta, A. (2013).Evolving software effort estimation models using multigene symbolic regression genetic programming. Int. J. Adv. Res. Artif. Intell, 2, 52-57. |
|
917 |
|
Haghshenas, m., & jeddi, k. Y. (2013). Using mobile devices to improve learning technologies. Ijitr, 1(6), 519-523. |
|
918 |
|
Gómez ardila, s. E. (2013). Learning design implementation in context-aware and adaptive mobile learning. |
|
919 |
|
Sun, g. (2013). Teamwork as a service: design of a cloud-based system for enhancing teamwork performance in mobile learning. |
|
920 |
|
Mehigan, t. J. (2013). Automatic detection of learner-style for adaptive elearning. |
|
921 |
|
Ahmad, A. (2013).A model of distributed rights allocation in online social interaction: a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology at Massey University, Albany, Auckland, New Zealand (Doctoral dissertation). |
|
922 |
|
Zheng, Y., Huang, Z., & He, T. (2013). Classification based on both attribute value weight and tuple weight under the cloud computing. Mathematical Problems in Engineering, 2013. |
|
923 |
|
Vern, R., & Dubey, S. K. (2013). A Survey on Evaluation of the Quality of Software System by Using Fuzzy Logic Approach. Global Journal of Computer Science and Technology, 13(1). |
|
924 |
|
Tegegne, W., Belachew, M., & Kifle, M. (2013). Quantification of Software Requirements Specification and Software Quality: Quantitative Approach. HiLCoE Journal of Computer Science and Technology, 144. |
|
925 |
|
Hmood, A. (2013). A Unified Metamodel for Assessing and Predicting Software Evolvability Quality (Doctoral dissertation, Concordia University). |
|
926 |
|
Tomar, A., & Thakare, V. M. (2013). A Customized Model on Software Quality Assurance & Reuse. International Journal Of Computer Science And Applications, 6(2). |
|
927 |
|
Ibrahim, N. H., Mustapha, A., Rosli, R., & Helmee, N. H. (2013). A hybrid model of hierarchical clustering and decision tree for rule-based classification of diabetic patients. International Journal of Engineering and Technology (IJET), 5(5), 3986-91. |
|
928 |
|
Thakare, S., & Wadhe, A. P. (2013). A literature Review on Desktop Phishing Based on Visual Appearance Analysis. International Journal of Research in Computer Engineering & Electronics, 2(2). |
|
929 |
|
Mitev, I., & Maimarev, R. International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net. |
|
930 |
|
Gayathri, C., & Kalpana, V. (2013). Study on Image Steganography Techniques. International Journal of Engineering and Technology (IJET) Vol, 5. |
|
931 |
|
Al-Bahadili, H. (2013). A Secure Block Permutation Image Steganography Algorithm. Submitted to the International Journal on Cryptography and Information Security (IJCIS) on 30th July. |
|
932 |
|
Kelash, H. M., Abdel Wahab, O. F., Elshakankiry, O., & El-sayed, H. S. (2013, October). Hiding data in video sequences using steganography algorithms. In ICT Convergence (ICTC), 2013 International Conference on (pp. 353-358). IEEE. |
|
933 |
|
Chugh, G. (2013). Image Steganography Techniques: A Review Article. acta technica corviniesis-Bulletin of engineering Tome VI July-September, 97-104. |
|
934 |
|
Sharda, S., & Budhiraja, S. (2013). Performance Analysis of Image Steganography based on DWT and Arnold Transform. International Journal of Computer Applications, 69(21). |
|
935 |
|
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42. |
|
936 |
|
Chee, A. (2013). Steganographic techniques on social media: investigation guidelines (Doctoral dissertation, Auckland University of Technology). |
|
937 |
|
Sohag, S. A., Islam, D. M. K., & Islam, M. B. (2013). A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key. American Journal of Engineering Research (AJER) Volume-02, Issue-09. |
|
938 |
|
Shah, H., Shinde, P., & Kukreja, J. (2013). Retouching Detection and Steganalysis. International Journal of Engineering Innovations and Research, 2(6), 487. |
|
939 |
|
Ali, A. A., & Saad, A. H. S. (2013). New Image Steganography Method by Matching Secret Message with pixels of Cover Image (SMM). International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), 3 (2), 1-10. |
|
940 |
|
Saejung, S., Boondee, A., Preechasuk, J., & Chantrapornchai, C. (2013, September). On the comparison of digital image steganography algorithm based on DCT and wavelet. In Computer Science and Engineering Conference (ICSEC), 2013 International (pp. 328-333). IEEE. |
|
941 |
|
Patil, H. H., & Hingway, S. P. Improved Way of Image Stegnography for JPEG2000 Compression Standard by Using EBCOT. |
|
942 |
|
Poongavanam, V., & Shamala, l. m. an enhanced difference pair mapping steganography method to improve embedding capacity. |
|
943 |
|
FADHIL, J. A. (2013). A New Method for Improving the Capacity of Data Hiding in an Image Steganography. |
|
944 |
|
Rad, J. M. (2013). Intensity Adaptive LSB Method Applying a Revised Matching. International Journal of Computer Applications, 70(27). |
|
945 |
|
Bedwal, T., & Kumar, M. (2013). An Enhanced and Secure Image Steganographic Technique Using RGB-Box Mapping. |
|
946 |
|
Arora, A., Neeru, M. N., & Taqdir, M. image steganography techniques: an overview. |
|
947 |
|
Jassim, F. A. (2013). A Novel Robust Method to Add Watermarks to Bitmap Images by Fading Technique. arXiv preprint arXiv:1307.1166. |
|
948 |
|
Lal, G. J., Veena, V. K., & Soman, K. P. (2013). A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition. In Security in Computing and Communications (pp. 52-62). Springer Berlin Heidelberg. |
|
949 |
|
Shihab, A. M., Mohammed, R. K., & Abed, W. M. (2013). evaluating the performance of the secure block permutation image steganography algorithm. international journal of network security & its applications, 5(5), 167. |
|
950 |
|
Nagaty, K. A. (2013). Secret Sharing using Image Hashing. International Journal of Computer Applications, 73(20), 14-22. |
|
951 |
|
Patil, A. U., Hingway, S. P., & Hingway, S. P. Nav view search. |
|
952 |
|
Barmawi, A. M. (2013, November). Strengthening Dynamic Cell Spreading (DCS) image steganography. In Information and Network Security (ICINS 2013), 2013 International Conference on (pp. 1-6). IET. |
|
953 |
|
Yunus, Y. A., Ab Rahman, S., & Ibrahim, J. (2013). Steganography: A Review of Information Security Research and Development in Muslim World. American Journal of Engineering Research (AJER), 2(11), 122-128. |
|
954 |
|
AKTAS, H., & KALKAN, M. An Application of the Crystography. |
|
955 |
|
Kovtun, VY, Hnatiuk, S., & Kinzeryavyy, A. (2013). Systematics modern methods of computer steganography. Safety information, 19 (3), 209-217. |
|
956 |
|
Rodrigues, P., Belguinha, A., Gomes, C., Cardoso, P., Vilas, T., Mestre, R., & Rodrigues, J. M. F. (2013). Open source technologies involved in constructing a web-based football information system. In Advances in Information Systems and Technologies (pp. 715-723). Springer Berlin Heidelberg. |
|
957 |
|
Syamala, P. J., Vimalai, R., & Vimala, R. Nav view search. |
|
958 |
|
Kuseler, T., Lami, I. A., & Al-Assam, H. (2013, May). Location-assured, multifactor authentication on smartphones via LTE communication. In SPIE Defense, Security, and Sensing (pp. 87550B-87550B). International Society for Optics and Photonics. |
|
959 |
|
Al-Assam, H., Lami, I. A., & Kuseler, T. (2013). Integrating Cancellable Biometrics with Geographical Location for Effective Unattended Authentication of Users of Mobile Devices. Journal of Communications, 8(11). |
|
960 |
|
Namayanja, J. M., & Janeja, V. P. (2013, June). Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks. In Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on (pp. 191-196). IEEE. |
|
961 |
|
Mandal, S., Saha, G., & Pal, R. K. (2013). An Approach towards Automated Disease Diagnosis & Drug Design Using Hybrid Rough-Decision Tree from Microarray Dataset. J Comput Sci Syst Biol, 6, 337-343. |
|
962 |
|
Yinkfu Chuye, K. (2013). Design and Implementation of Machine Learning and Rule-Based System for Verifying Automation System Designs. |
|
963 |
|
Gabriel, I., Charles, A. O., & Officer, A. C. (2013). Fingerprint Matching using Neighbourhood Distinctiveness. |
|
964 |
|
Babatunde, I. G., & Charles, A. O. (2013). A Fingerprint-based Authentication Framework for ATM Machines. J Comput Eng Inf Technol 2: 3. doi: http://dx. doi. org/10.4172/2324, 9307, 2. |
|
965 |
|
Babatunde, I. G., Charles, A. O., & Officer, A. C. (2013, October). Fingerprint matching by neighbourhood characteristics. In Science and Information Conference (SAI), 2013 (pp. 434-442). IEEE. |
|
966 |
|
Angaye, C. O., Akinyokun, O. C., & Iwasokun, g. b. experimental study of minutiae based algorithm for fingerprint matching. |
|
967 |
|
Han, S. W., Jeoune, D. S., & Yoon, Y. W. (2013). New Minutiae Detection Algorithm from Fingerprint Image using the Improved Tracing on Ridge Curve. International Journal of Security and Its Applications, 7(4), 343-352. |
|
968 |
|
Babatunde, I. G., Charles, A. O., & Olatunbosun, O. (2013). Uniformity Level Approach to Fingerprint Ridge Frequency Estimation. International Journal of Computer Applications, 62(22). |
|
969 |
|
Jain, N., Sharma, S. K., & Pal, B. L. (2013). Development of a Multimodal Biometric Identification and Verification System using Two Fingerprints. International Journal of Computer Applications, 74(12). |
|
970 |
|
Sahu, M., & Shukla, N. Rotation Invariant Approach of SURF for Unimodal Biometric System. |
|
971 |
|
Peng xi, peng xiao-qi, zhong yunfei, tang ying, & left the dragon. (2013). extraction of minutiae identity detection method.computer applications and software, 30 (6), 132-136. |
|
972 |
|
Dogra, N., & Kaur, H. (2013). Cloud Computing Security: Issues and Concerns. International Journal of Emerging Technology and Advanced Engineering, 3(3). |
|
973 |
|
Beham, M. P., & Roomi, S. M. M. (2013). A review of face recognition methods. International Journal of Pattern Recognition and Artificial Intelligence, 27(04), 1356005. |
|
974 |
|
Shah, S., Khan, S. A., & Riaz, N. (2013). Analytical Study of Face Recognition Techniques. |
|
975 |
|
Thomas, L. L., Gopakumar, C., & Thomas, A. A. Face Recognition based on Gabor Wavelet and Backpropagation Neural Network. |
|
976 |
|
Sahraoui, S., & Bouam, S. (2013). Secure routing optimization in hierarchical cluster-based wireless sensor networks. International Journal of Communication Networks and Information Security (IJCNIS), 5(3). |
|
977 |
|
Yuhong Zhen, Wu Yonghao, & Zhou Fengli. (2013). Based on vehicle terminal system design µC / OS-? Computer Applications and Software, 30 (2), 324-327. |
|
978 |
|
Left flat, Yunfang, Wangsan Fu, & Wang ya. (2013). A new proxy signature scheme without certificate directional Computer Applications and Software, 30 (2), 315-316. |
|
979 |
|
Chen, B. C., & Yeh, H. T. (2013). Secure proxy signature schemes from the Weil pairing. The Journal of Supercomputing, 65(2), 496-506. |
|
980 |
|
Zambrano, J. G., Guzmán-Ramírez, E., & Pogrebnyak, O. (2013). Search Algorithm for Image Recognition Based on Learning Algorithm for Multivariate Data Analysis. INTECH Open Access Publisher. |
|
981 |
|
Hoelz, B. W., & Ralha, C. G. (2013, March). A framework for semantic annotation of digital evidence. In Proceedings of the 28th Annual ACM Symposium on Applied Computing (pp. 1966-1971). ACM. |
|
982 |
|
Tanner, A., & Duncan, S. On Integrating Mobile Applications into the Digital Forensic Investigative Process. |
|
983 |
|
Ezeah, G. H., Asogwa, C. E., & Edogor, I. O. (2013). Social media use among students of universities in South-East Nigeria. Journal of Humanities and Social Sciences, 16, 23-32. |
|
984 |
|
Shittu, A. T., Madarsha, K. B., AbduRahman, N. S. N., & Ahmad, T. B. T. (2013). Determinants of social networking software acceptance: A multi-theoretical approach. The Malaysian Online Journal of Educational Technology, 1(1), 27-43. |
|
985 |
|
koçak, n. g., kaya, s., & EROL, E. Social Media from the Perspective of Diffusion of Innovation Approach. |
|
986 |
|
Mahmud, Y., Rahim, N. Z. A., & Miskon, S. (2013, October). Developing a conceptual framework of Social Network Site (SNS) appropriation in family context. In Science and Information Conference (SAI), 2013 (pp. 288-293). IEEE. |
|
987 |
|
Yaghmaei, & F. Users tend to use this system to evaluate the hospital information system based on innovation diffusion model Razi hospital. Journal of Health Administration. |
|
988 |
|
Patel, A., & Verma, M. K. Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET: Reliability Value based Approach. International Journal of Computer Applications (0975-8887) Volume. |
|
989 |
|
Patel, A., & Verma, M. K. (2013). Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET. International Journal of Computer Applications, 82(1). |
|
990 |
|
Shrivastava, S. Normalized Worm-Hole Local Intrusion Detection Algorithm (NWLIDA). |
|
991 |
|
Gupta, A., & Malviya, M. A Novel Recommendation Trust Proxy (RTP) Based Pre-emptive Malicious Node Detection Mechanism for AODV in MANET. |
|
992 |
|
Seo, D., Lee, H., & Perrig, A. (2013). APFS: adaptive probabilistic filter scheduling against distributed denial-of-service attacks. Computers & Security, 39, 366-385. |
|
993 |
|
Chellani, G., & Kalla, A. (2013). A Review: Study of Handover Performance in Mobile IP. arXiv preprint arXiv:1312.2108. |
|
994 |
|
Kumar, R., Verma, P., & Singh, Y. (2013). Mobile Ad Hoc Networks and It’s Routing Protocols. World Academy of Science, Engineering and Technology International Journal of Computer, Information, Systems and Control Engineering, 7(8). |
|
995 |
|
Roopak, M., & Reddy, B. (2013). Blackhole Attack Implementation in AODV Routing Protocol. International Journal of Scientific & Engineering Research, 4(5), 402-406. |
|
996 |
|
Mobadersany, P., Khanmohammadi, S., & Ghaemi, S. (2013, May). An efficient fuzzy method for path planning a robot in complex environments. In Electrical Engineering (ICEE), 2013 21st Iranian Conference on (pp. 1-6). IEEE. |
|
997 |
|
Jafarzadeh, H., Gholami, S., & Bashirzadeh, R. (2013). Decision Science Letters. |
|
998 |
|
Garbervetsky, D., & Kim, S. (2013). Report from 2nd international workshop on developing tools as plug-ins (TOPI 2012). ACM SIGSOFT Software Engineering Notes, 38(1), 49-51. |
|
999 |
|
Singh, Y., Khatkar, A., Rani, P., Deepika, D., & Barak, D. D. (2013, April). Wormhole Attack Avoidance Technique in Mobile Adhoc Networks. In Advanced Computing and Communication Technologies (ACCT), 2013 Third International Conference on (pp. 283-287). IEEE. |
|
1000 |
|
Fritzsche, M., & Gilani, W. (2013). U.S. Patent No. 8,438,533. Washington, DC: U.S. Patent and Trademark Office. |
|
1001 |
|
Elkabbany, G. F., & Elnemr, H. A. (2013). An Efficient Parallel Based Diabetic Retinopathy Grading Algorithm. International Journal of Computer Science and Information Security, 11(9), 12. |
|
1002 |
|
Younes, O., & Thomas, N. (2013). Modelling and performance analysis of multi-hop ad hoc networks. Simulation Modelling Practice and Theory, 38, 69-97. |
|
1003 |
|
Krishnakumar, L., & Varughese, N. M. (2013, December). High speed classification of vulnerabilities in cloud computing using collaborative network security management. In Advanced Computing and Communication Systems (ICACCS), 2013 International Conference on (pp. 1-6). IEEE. |
|
1004 |
|
Kaur, R. (2013). Energy efficient routing protocols in mobile ad hoc network based on AODV protocol. Int. J. Appl. Innov. Eng. Manag.(IJAIEM), 2(1), 323-324. |
|
1005 |
|
Rajeshkanna, R., & Saradha, A. (2013). Energy Efficient Enhanced AODV Routing Protocol for maximize the lifetime of Mobile Ad hoc Networks. International Journal of Computer Technology and Applications, 4(5), 856. |
|
1006 |
|
Gupta, R., & Aggarwal, H. (2013). Network Density based Analysis of MANET Routing Protocols. International Journal of Computer Applications, 77(10). |
|
1007 |
|
Gupta, R. (2013). Ad-hoc routing protocol “review paper”. Journal of Global Research in Computer Science, 4(5), 26-29. |
|
1008 |
|
Bernard, T., Fouchal, H., Linck, S., & Perrin, E. (2013, June). Impact of routing protocols on packet retransmission over wireless networks. In Communications (ICC), 2013 IEEE International Conference on (pp. 2979-2983). IEEE. |
|
1009 |
|
Rajeshkanna, R., Senthilkumar, S. P., & Kumuthini, C. (2013). Energy Efficient Routing Protocols in Mobile Ad hoc Network Based on Enhanced AODV Protocol. |
|
1010 |
|
Bhushan, S., Saroliya, A., & Singh, V. (2013). Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols. International Journal of Advanced Research in Computer and Communication Engineering, 2(6). |
|
1011 |
|
Sharma, V., Singh, H., & Kant, S. (2013, September). AODV based energy efficient IEEE 802.16 G VANET network. In Communication and Computing (ARTCom 2013), Fifth International Conference on Advances in Recent Technologies in (pp. 35-43). IET. |
|
1012 |
|
Arya, P., Vijay, S., Gupta, V., & Pandey, A. (2013). Effect of File Mobility Pattern on AODV, DSDV and ZRP Routing Protocols in MANET. International Journal of Computer Applications, 80(2). |
|
1013 |
|
Yibyeonggwan , and jeongeunhui . (2013) . GSK (Group Secret Key) based SAODV (Secure AODV) routing protocol to detect packet injection attacks. Security Engineering Research Institute Journal of Security Engineering, 10 (6), 681-694. |
|
1014 |
|
Agarwal, M. (2013). Text steganographic approaches: a comparison. arXiv preprint arXiv:1302.2718. |
|
1015 |
|
Awad, W. S., & Zolait, A. H. (2013). E-Mail as an Official Communication Tool in Bahrain: Individual and Public Organization Perspectives. International Journal of E-Services and Mobile Applications (IJESMA), 5(1), 51-76. |
|
1016 |
|
da Rocha, M. C., & Saraiva, J. T. (2013). A discrete evolutionary PSO based approach to the multiyear transmission expansion planning problem considering demand uncertainties. International Journal of Electrical Power & Energy Systems, 45(1), 427-442. |
|
1017 |
|
Latha, K., Rajinikanth, V., & Surekha, P. M. (2013). PSO-based PID controller design for a class of stable and unstable systems. ISRN Artificial Intelligence, 2013. |
|
1018 |
|
Arasomwan, M. A., & Adewumi, A. O. (2013, June). An adaptive velocity particle swarm optimization for high-dimensional function optimization. In Evolutionary Computation (CEC), 2013 IEEE Congress on (pp. 2352-2359). IEEE. |
|
1019 |
|
Arasomwan, M. A., & Adewumi, A. O. (2013). On the performance of linear decreasing inertia weight particle swarm optimization for global optimization. The Scientific World Journal, 2013. |
|
1020 |
|
Arasomwan, M. A., & Adewumi, A. O. (2013, April). On adaptive chaotic inertia weights in particle swarm optimization. In Swarm Intelligence (SIS), 2013 IEEE Symposium on (pp. 72-79). IEEE. |
|
1021 |
|
Jadon, S. S., Sharma, H., Bansal, J. C., & Tiwari, R. (2013, January). Self adaptive acceleration factor in particle swarm optimization. In Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012) (pp. 325-340). Springer India. |
|
1022 |
|
Yavari, S., Zoej, V., Mohammad, J., Mohammadzadeh, A., & Mokhtarzade, M. (2013). Particle swarm optimization of RFM for georeferencing of satellite images. Geoscience and Remote Sensing Letters, IEEE, 10(1), 135-139. |
|
1023 |
|
Pessin, G., Osório, F. S., Souza, J. R., Ueyama, J., Costa, F. G., Wolf, D. F., ... & Vargas, P. A. (2013). Investigation on the evolution of an indoor robotic localization system based on wireless networks. Applied Artificial Intelligence, 27(8), 743-758. |
|
1024 |
|
Wang, L. (2013). An improved cooperative particle swarm optimizer. Telecommunication Systems, 53(1), 147-154. |
|
1025 |
|
Chen, R. M., & Wu, D. S. (2013). Solving Scheduling Problem Using Particle Swarm Optimization with Novel Curve Based Inertia Weight and Grouped Communication Topology. International Journal of Digital Content Technology and its Applications, 7(7), 94. |
|
1026 |
|
Ramphuengnit, P., & Polvichai, J. An Effective Hybrid-DEPSO applied with Dynamic Sigmoid Weights. |
|
1027 |
|
Costeira da Rocha, M., & Tome Saraiva, J. (2013, June). Transmission expansion planning—A multiyear PSO based approach considering load uncertainties. In PowerTech (POWERTECH), 2013 IEEE Grenoble (pp. 1-6). IEEE. |
|
1028 |
|
Singh, N., & Singh, S. B. (2013, September). A New Modified Approach of Mean Particle Swarm Optimization Algorithm. In Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on (pp. 296-300). IEEE. |
|
1029 |
|
Chen, R. M., & Hsu, C. C. (2013). Guiding Search Using an Asymmetric Decline Control Function for Solving Flowshop Problems. Journal of Convergence Information Technology, 8(6). |
|
1030 |
|
Bahaa-Eldin, A. M. (2013). A medium resolution fingerprint matching system. Ain Shams Engineering Journal, 4(3), 393-408. |
|
1031 |
|
Lim, J. F., & Chin, R. K. Y. (2013, December). Enhancing Fingerprint Recognition Using Minutiae-Based and Image-Based Matching Techniques. In Artificial Intelligence, Modelling and Simulation (AIMS), 2013 1st International Conference on (pp. 261-266). IEEE. |
|
1032 |
|
Chockaian, K., Vayanaperumal, R., & Kanagaraj, B. R. (2013). New approach for identifying hereditary relation using primary fingerprint patterns. Image Processing, IET, 7(5), 423-431. |
|
1033 |
|
Babu, K. R., & Sunitha, K. V. N. (2013). Enhancing Hazy Images with the Aid of Particle Swarm Optimization (PSO) and Morphological Operation. International Review on Computers and Software (IRECOS), 8(1), 21-28. |
| | |