International Journal of Science and Research (IJSR)
Computer Science
Downloads: 139 | Views: 823
Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 51 - 53A Survey on Detection of Jamming Attacks in Time-Critical Wireless Applications
Sheetal S Shete | N. D. Kale
Downloads: 139 | Views: 533
Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 178 - 182Efficient Method for Detecting and Localizing Concept Drifts from Event Logs In Process Mining
Trupti Kakkad | Dr. Rahila Sheikh
Downloads: 139 | Views: 470
Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 829 - 832An Efficient Way to Prevent Dos/DDos Attack in the Cloud Environment
Vaishali Hase | Harish Barapatre
Downloads: 139 | Views: 538
Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 187 - 193A Survey and Comparison of Artificial Intelligence Techniques for Image Classification and Their Applications
Vishal.T.V | Srinidhi.S | Srividhya.S | Sri Vishnu Kumar.K | Swathika R
Downloads: 139 | Views: 571
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 282 - 290J-Botnet Detector: A Java Based Tool for HTTP Botnet Detection
Thejiya V | N Radhika | B Thanudhas
Downloads: 139 | Views: 626
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 291 - 295A Review of Literature on Water Resource Management Using Data Mining Techniques
Pratap Singh Solanki | R. S. Thakur
Downloads: 139 | Views: 488
Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 684 - 688Preventing Malware Proliferation in Large Scale Network Topology
N Chandra Sekhar Reddy | Dr. Purna Chandra Rao | Dr. A Govardhan
Downloads: 139 | Views: 532
Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 201 - 204A Review on Big Data Challenges and Techniques Used to Overcome from IT
Bibhudutta Jena
Downloads: 139 | Views: 528
Computer Science & Engineering, United States, Volume 6 Issue 4, April 2017
Pages: 394 - 403Cloud Computing - An Overview of Architectures, Security Threats and Their Solutions
Ashwini Phadke | Devashree Jadhav
Downloads: 139 | Views: 753
Computer Science & Engineering, India, Volume 6 Issue 7, July 2017
Pages: 70 - 74Project Management of Estimation, Planning and Tracking
Rima Debnath | Dr. Amit Asthana