International Journal of Science and Research (IJSR)
Computer Science
Downloads: 148 | Views: 561
Computer Science & Engineering, Mexico, Volume 8 Issue 5, May 2019
Pages: 1046 - 1052Model for the Management of Software Projects Between Universities and Companies Based on CMMI-DEV Ver. 1.3
Lic. Daniela Munoz Coyotzi | PhD. Jose Juan Hernandez Mora | Ing. Erika Gonzalez Botello
Downloads: 148 | Views: 478
Computer Science & Engineering, United States, Volume 9 Issue 3, March 2020
Pages: 723 - 726IT Risk Register and Responses
Anshuman Awasthi
Downloads: 147 | Views: 594
Computer Science & Engineering, India, Volume 2 Issue 1, January 2013
Pages: 298 - 301Survey on Security Systems for Mobile Network
Lokesh Giripunje | Sonali Nimbhorkar
Downloads: 147 | Views: 545
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 654 - 658Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks Using Server Hopping Model Using Distributed Firewall
Prajyoti P.Sabale | Anjali B. Raut
Downloads: 147 | Views: 626
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 97 - 106Implementation of Mobile-Healthcare using Cloud Computing with Access Control, Security and Privacy
Smitha Kr | Rajashekar SA
Downloads: 147 | Views: 746
Computer Science & Engineering, Egypt, Volume 5 Issue 1, January 2016
Pages: 13 - 17Improvement Skull Stripping Algorithm of MRI Brain Images Based on Fuzzy Morphological Operation
Shaima Abd El-Kader | Mohamed Morse | Mohy Eldin A. Abo-Elsoud | Rasheed Mokhtar
Downloads: 147 | Views: 525
Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 412 - 414Secure Authentication and Cyber Crime Mitigation for Social Networking Sites
Anjitha T | Harsha V
Downloads: 147 | Views: 494
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 541 - 544Data Mining, Its Issues, and Approaches: A Survey
Simarpreet Kaur | Jyoti Arora
Downloads: 147 | Views: 682
Computer Science & Engineering, India, Volume 5 Issue 9, September 2016
Pages: 69 - 74Shared Key Based Jamming Mitigation in Wireless Network using Diffie Hellman Elliptic Curve Cryptography
S. Rajeswari | Dr V. Anuratha
Downloads: 147 | Views: 563
Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 314 - 317Review of Recommendation System for Web Application
Preeti Bhole | Neetish Kumar Chandrakar | Virendra Swarnkar