International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Computer Science: Page 177: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Computer Science

Downloads: 121 | Views: 502

Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1034 - 1037

A Survey on Self-Destruction of Data Using Active Storage

Avinash P. Khadse | Prof. Pravin D. Soni

Downloads: 121 | Views: 589

Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1038 - 1043

Honeypots: Approach and Implementation

Kumar Shridhar | Mayank Jain

Downloads: 121 | Views: 524

Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1315 - 1316

Literature Survey on a NVSS Scheme for Sharing Digital Secret Image

Nasla K

Downloads: 121 | Views: 496

Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1984 - 1987

Automatic VOE Techniques using CRF and Visual Saliency Method

Dr. Swathi. K | Sivabalan.T | Vijayanathan.R

Downloads: 121 | Views: 612

Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 123 - 126

VANET: A Survey on Secure Routing

Omkar Shete | Sachin Godse

Downloads: 121 | Views: 575

Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 402 - 409

WBANs for Patient Monitoring Systems: A Survey and Outlook

Nikhil Walke | R.K. Bedi

Downloads: 121 | Views: 448

Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 415 - 419

A Survey on Different Existing Technique for Detection of Black Hole Attack in MANETs

Heta Changela | Amit Lathigara

Downloads: 121 | Views: 463

Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 433 - 436

Study of Detection and Prevention Techniques for Flooding attack on AODV in MANET

Shruti Bhalodiya | Krunal Vaghela

Downloads: 121 | Views: 450

Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 735 - 739

Comparative Analysis of Privacy Preserving Techniques in Distributed Database

Sapana Anant Patil | Dr. Abhijit Banubakode

Downloads: 121 | Views: 503

Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 942 - 946

Efficient Resource Utilization through Sensor Virtualization

Monali G. Sonule | Prof. Swati Nikam

Top