A basion MobileID-Based Authentication Technique (MBBAT) |
|
Enhancing RFID Security Against Brute Force Based Attacks |
|
Enhancing Wireless Sensor Network Security Using Artificial Neural Network Based Trust Model |
|
An intelligent classification model for phishing email detection) |
|
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT) |
|
Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT) |
|
SQL Injection Prevention using Query Dictionary Based Mechanism |
|
Spam Reduction by using E-mail History and Authentication(SREHA) |
|
Adaptive Weighted Clustering Algorithm for Mobile Ad-hoc Networks (AWCAMAN) |
|
An Enhanced Steganographic Model Based on DWT-LSB Combined with Encryption and Error Detection Techniques |
|
Enhancing the connectivity of mobile Ad-hoc networks by considering the power, mobility and activity of nodes |
|
Least Recently Plus Five Least frequently Replacement policy (LR+5LF) |
|
An Efficient Scheme For MANET Domain Formation |
|
Simple Scalar as an eLearning Mashup web application (eScalar) |
|
The Preferable Bank Number for Multibanked-Caches |
|
Low Power Architecture Cache for Embedded Systems |
|
A New MultiPathTCP Flooding Attacks Mitigation Technique |
|
Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique |
|
Software Obfuscation Technique Based On Recurrent Neural Network |
|
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV) |
|
test |
|