International Journal of Science and Research (IJSR)
Computer Science
Downloads: 134 | Views: 516
Computer Science & Engineering, Bangladesh, Volume 2 Issue 2, February 2013
Pages: 150 - 158A Survey of E-Commerce of Bangladesh
Md. Akbor Hossain | Md. Akkas Ali | Muhammad Golam Kibria | Mohammad Nuruzzaman Bhuiyan
Downloads: 134 | Views: 750
Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 34 - 38Countering Phishing Threats using Visual Cryptography
G. Pavithra | D. S. John Deva Prasanna
Downloads: 134 | Views: 505
Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 319 - 322Efficient Regular Expression Signature Generation for Network Traffic Classification
Vinoth George C | Vinodh Ewards
Downloads: 134 | Views: 627
Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 279 - 283A Novel TAB Based Preemptive Multi-Hop Local Repair Algorithm for AODV in MANET
Deepika Patil | Nitika Vats Doohan
Downloads: 134 | Views: 628
Computer Science & Engineering, Bangladesh, Volume 2 Issue 8, August 2013
Pages: 413 - 419Local Gray Code Pattern (LGCP): A Robust Feature Descriptor for Facial Expression Recognition
Mohammad Shahidul Islam
Downloads: 134 | Views: 437
Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 413 - 418A Study on Threats in Wireless Sensor Networks
Muruganandam. A | Bagyalakshmi. P
Downloads: 134 | Views: 601
Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 372 - 374A Review on Database Security
Tejashri R. Gaikwad | A. B. Raut
Downloads: 134 | Views: 637
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 273 - 276Performance Evaluation of Secured Reactive Routing Protocols in MANETs
Shwetha T R | Dr Arun Biradar
Downloads: 134 | Views: 840
Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 33 - 37A Comparison of Data Mining Tools using the implementation of C4.5 Algorithm
Divya Jain
Downloads: 134 | Views: 772
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 51 - 53OPASS Authentication Schemes Using Android Mobile Application in Providing Web Security
P. Shailaja