A basion MobileID-Based Authentication Technique (MBBAT)
Monday, October 31, 2016
Enhancing RFID Security Against Brute Force Based Attacks
Thursday, December 31, 2015
Enhancing Wireless Sensor Network Security Using Artificial Neural Network Based Trust Model
Thursday, December 31, 2015
An intelligent classification model for phishing email detection)
Thursday, June 30, 2016
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
Friday, September 30, 2016
Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)
Thursday, November 30, 2017
SQL Injection Prevention using Query Dictionary Based Mechanism
Tuesday, May 31, 2016
Spam Reduction by using E-mail History and Authentication(SREHA)
Saturday, July 2, 2016
Adaptive Weighted Clustering Algorithm for Mobile Ad-hoc Networks (AWCAMAN)
Sunday, April 3, 2016
An Enhanced Steganographic Model Based on DWT-LSB Combined with Encryption and Error Detection Techniques
Monday, November 30, 2015
Enhancing the connectivity of mobile Ad-hoc networks by considering the power, mobility and activity of nodes
Friday, February 28, 2014
Least Recently Plus Five Least frequently Replacement policy (LR+5LF)
Saturday, December 31, 2011
An Efficient Scheme For MANET Domain Formation
Wednesday, August 31, 2011
Simple Scalar as an eLearning Mashup web application (eScalar)
Monday, May 31, 2010
The Preferable Bank Number for Multibanked-Caches
Thursday, December 31, 2009
Low Power Architecture Cache for Embedded Systems
Friday, January 1, 2010
A New MultiPathTCP Flooding Attacks Mitigation Technique
Tuesday, May 31, 2016
Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique
Wednesday, September 5, 2018
Software Obfuscation Technique Based On Recurrent Neural Network
Saturday, June 30, 2018
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)
Wednesday, March 27, 2019
test
Tuesday, November 15, 1977