Browse Title Index


 
Issue Title
 
Vol 1, No 10 (2014): Vol-1_Issue-10_November_2014 DETAILED CONCEPT OF INTEGRATED SERVICES DIGITAL NETWORK Abstract   PDF
Smridhi Malhotra, Sarita rani, Vinesh Sangwan
 
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 Detailed Study Of Bitumen Emulsion In Gravel Road Abstract   PDF
Jegannathan. S
 
Vol 1, No 9 (2014): Vol-1_Issue-9_October_2014 Detailed Study of RS-232 Serial Interface Abstract   PDF
Sarita Rani, Smridhi Malhotra, Vinesh Sangwan
 
Vol 7, No 2 (2020): Vol-7-Issue-2-February-2020 Detect Financial Fraud Detection with Anamaly Feature Detection Abstract   PDF
Nayab Saleema Tabassum, Mr. Venkat, mr. Charan
 
Vol 6, No 13 (2019): Vol-6-Issue-13-December-2019 Detect Financial Fraud Detection with Anamaly Feature Detection Abstract   PDF
Nayab Saleema Tabassum, Mr. Venkat, Mr. Charan
 
Vol 1, No 4 (2014): Vol-1_Issue-4_May_2014 Detect Fraud Using Mobile Applications Courses Leading Mining Abstract   PDF
V.Shiva Kumar, Daya Gupta
 
Vol 5, No 15 (2018): Vol-05-Issue-15-May-2018 Detect Malevolent Account In Interpersonal Union Abstract   PDF
SUBHASHINI DEVI GUDISE, V.DINESH BABU
 
Vol 3, No 12 (2016): Vol-3_Issue-12_August_2016 Detecting Fraud Ranking for Mobile Apps Abstract   PDF
Pala Karthik, Mrs .M .Sruthi, Dr. I. Satyanarayana
 
Vol 1, No 11 (2014): Vol-1_Issue-11_December_2014 Detecting Adversary Location in Mobile Sensor Networks Abstract   PDF
Pushadapu Venkata Pradeep, Ch. Harika
 
Vol 6, No 11 (2019): Vol-6-Issue-11-October-2019 Detecting Credit Card Fraud By Using Adaboost And Majority Voting Abstract   PDF
MURRAY HAVILA, B.V.V.SATYANARAYANA RAO, PATHAN HUSSAIN BASHA
 
Vol 6, No 7 (2019): Vol-6-Issue-7-June-2019 Detecting fake apps and restricting access to app store using Malware code detection and rating review analysis Abstract   PDF
Sunkari Shekar, Mrs. R. Sujatha
 
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 Detecting Malicious Applications Over Social Networking Sites Abstract   PDF
Boini Sunanda, Ch. Srivalli
 
Vol 5, No 4 (2018): Vol-05-Issue-04-February-2018 Detecting Malicious Attacks in Facebook Applications Abstract   PDF
N. Devender, R. Sandeep
 
Vol 3, No 01 (2016): Vol-3_Issue-1_January_2016 Detecting Malicious Facebook Applications Abstract   PDF
K Vara Prasad, J B Srinivas Rao, K Rama Krishniah, D Sarath Babu
 
Vol 3, No 14 (2016): Vol-3_Issue-14_October_2016 Detecting Masquerade Attacks by Using a Data-Driven Semi-Global Alignment Approach Abstract   PDF
KURRI SHIREESHA, B. VENKANNA
 
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 Detecting Masquerader Attacks Using Data Driven Semi Global Alignment Approach Abstract   PDF
Mohammed Muqeethuddin, K.Goutham Raju, V. Janaki
 
Vol 5, No 7 (2018): Vol-05-Issue-07-March-2018 Detecting Mobile Malicious Web Pages in Real Time Environment Abstract   PDF
G. Satish, N.Vamshi Krishna, G.Karthik Yadav, D.Sai Aditya, S. Neharika
 
Vol 2, No 9 (2015): VOL-2_ISSUE-09_September_2015 Detecting Moving Targets from Traffic Video Based BSFD- Background Subtraction Frame Difference Algorithm Abstract   PDF
Uday Kumar, T. Mohan Rao
 
Vol 4, No 13 (2017): Vol-04-Issue-13-October-2017 Detecting Multi Party Privacy Conflicts In Social Media Abstract   PDF
Malan Sk, Avuku Obulesh, Vishnu Murthy
 
Vol 5, No 7 (2018): Vol-05-Issue-07-March-2018 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach Abstract   PDF
J P.Aruna Kumari, P. Veera muthu
 
Vol 6, No 3 (2019): Vol-6-Issue-3-March-2019 Detecting Node Failures In Mobile Wireless Networks: A Probabilistic approach Abstract   PDF
Sareddy Maheswarareddy, V. Sravani
 
Vol 6, No 10 (2019): Vol-6-Issue-10-September-2019 Detecting of Rash Driving using Rescue System Abstract   PDF
Maheshwari Mane, Pooja Ghawate, Dipti Jadhav, Dhanashri Mungase, Ritesh Thakur
 
Vol 4, No 7 (2017): Vol-04_Issue-07_June_2017 Detecting Packet Drop and Forgery Attacks in Wireless Sensor Networks Abstract   PDF
B Charishma, P.Srinivas Rao, M Narender
 
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 Detecting Packet-Drops In Wireless Adhoc Networks Using Linear Authentication Based Approach. Abstract   PDF
Kyatham Sravanthi, P. Shylaja, V. Janaki
 
Vol 3, No 14 (2016): Vol-3_Issue-14_October_2016 Detecting Provenance Forgery with Lightweight Secure using Wireless Sensor Networks Abstract   PDF
THUDI. SWETHA, G.A.V.A NAGENDRA KUMAR
 
5901 - 5925 of 15699 Items << < 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 > >>