International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Computer Science: Page 31: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Computer Science

Downloads: 148 | Views: 561

Computer Science & Engineering, Mexico, Volume 8 Issue 5, May 2019

Pages: 1046 - 1052

Model for the Management of Software Projects Between Universities and Companies Based on CMMI-DEV Ver. 1.3

Lic. Daniela Munoz Coyotzi | PhD. Jose Juan Hernandez Mora | Ing. Erika Gonzalez Botello

Downloads: 148 | Views: 478

Computer Science & Engineering, United States, Volume 9 Issue 3, March 2020

Pages: 723 - 726

IT Risk Register and Responses

Anshuman Awasthi

Downloads: 147 | Views: 594

Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 298 - 301

Survey on Security Systems for Mobile Network

Lokesh Giripunje | Sonali Nimbhorkar

Downloads: 147 | Views: 545

Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 654 - 658

Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks Using Server Hopping Model Using Distributed Firewall

Prajyoti P.Sabale | Anjali B. Raut

Downloads: 147 | Views: 626

Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 97 - 106

Implementation of Mobile-Healthcare using Cloud Computing with Access Control, Security and Privacy

Smitha Kr | Rajashekar SA

Downloads: 147 | Views: 746

Computer Science & Engineering, Egypt, Volume 5 Issue 1, January 2016

Pages: 13 - 17

Improvement Skull Stripping Algorithm of MRI Brain Images Based on Fuzzy Morphological Operation

Shaima Abd El-Kader | Mohamed Morse | Mohy Eldin A. Abo-Elsoud | Rasheed Mokhtar

Downloads: 147 | Views: 525

Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 412 - 414

Secure Authentication and Cyber Crime Mitigation for Social Networking Sites

Anjitha T | Harsha V

Downloads: 147 | Views: 494

Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 541 - 544

Data Mining, Its Issues, and Approaches: A Survey

Simarpreet Kaur | Jyoti Arora

Downloads: 147 | Views: 682

Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 69 - 74

Shared Key Based Jamming Mitigation in Wireless Network using Diffie Hellman Elliptic Curve Cryptography

S. Rajeswari | Dr V. Anuratha

Downloads: 147 | Views: 563

Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 314 - 317

Review of Recommendation System for Web Application

Preeti Bhole | Neetish Kumar Chandrakar | Virendra Swarnkar

Top