International Journal of Science and Research (IJSR)
Computer Science
Downloads: 106 | Views: 486
Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015
Pages: 1367 - 1372Comparative Study for Steganography Techniques
Zainalabideen Abdual Samad Rasheed
Downloads: 106 | Views: 534
Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1285 - 1288Integrity Attestation for Software-as-a Service Clouds
Chashu Mol R | Alfia A P
Downloads: 106 | Views: 540
Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2113 - 2116DMMI Methods for Theoretic Clustering using Data Mining
Ankita G. Joshi | R. R. Shelke
Downloads: 106 | Views: 592
Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2173 - 2176Knowledge Retrieval from Web Server Logs Using Web Usage Mining
Naresh Kumar Kar | H. R. Sharma | Asha Ambhaikar
Downloads: 106 | Views: 601
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1292 - 1296User Ranking Based Social Network Platform for Cloud Environment
Abhijeet Mishra | S.Niveditha | Debojyoti Sengupta | Rakesh Kumar
Downloads: 106 | Views: 659
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1537 - 1542Remote Sensing Satellite Image Fusion Using Fast Curvelet Transforms
Namratha H. N. | Raghu M. T.
Downloads: 106 | Views: 566
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1966 - 1971Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET
Pallavi P Puri | Nitin R. Chopde
Downloads: 106 | Views: 615
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2174 - 2177Key Agreement Protocol Based On EC-MQV Algorithm for Cooperative Wireless Communication
Anagha Dhargave | S. U. Nimbhorkar
Downloads: 106 | Views: 522
Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande | Sonali U. Nimbhorkar
Downloads: 106 | Views: 585
Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2085 - 2089Implementation and Analysis of DoS Attack Detection Algorithms
Rupesh Jaiswal | Dr. Shashikant Lokhande | Aditya Gulavani