Article
Title Date
A basion MobileID-Based Authentication Technique (MBBAT)
Enhancing RFID Security Against Brute Force Based Attacks
Enhancing Wireless Sensor Network Security Using Artificial Neural Network Based Trust Model
An intelligent classification model for phishing email detection)
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)
SQL Injection Prevention using Query Dictionary Based Mechanism
Spam Reduction by using E-mail History and Authentication(SREHA)
Adaptive Weighted Clustering Algorithm for Mobile Ad-hoc Networks (AWCAMAN)
An Enhanced Steganographic Model Based on DWT-LSB Combined with Encryption and Error Detection Techniques
Enhancing the connectivity of mobile Ad-hoc networks by considering the power, mobility and activity of nodes
Least Recently Plus Five Least frequently Replacement policy (LR+5LF)
An Efficient Scheme For MANET Domain Formation
Simple Scalar as an eLearning Mashup web application (eScalar)
The Preferable Bank Number for Multibanked-Caches
Low Power Architecture Cache for Embedded Systems
A New MultiPathTCP Flooding Attacks Mitigation Technique
Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique
Software Obfuscation Technique Based On Recurrent Neural Network
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)
test