Archived Papers for Journal
International Journal of Computer Engineering and Technology (IJCET) >>
Vol.5, No.12
Publisher: IAEME Publication
Publishing Date: 2014-12-29
- A SECURE ALERT MESSAGING FOR VEHICULAR AD HOC NETWORKSAuthors: SHIKHA SAJU; SMITHA SURESH
- A SURVEY ON WEIGHTED CLUSTERING TECHNIQUES IN MANETSAuthors: ASWATHY P SREEVATSAN; DIYA THOMAS
- INTEGRATED HONEYPOTAuthors: ANSONA N; S.SASIDHAR BABU; SHEEMA M; P.JAYAKUMAR
- EXPOSING TRANSIENT SECRETS AND DETECTING MALWARE VARIANTS USING CONTROL AND DATA FLOW ANALYSISAuthors: ANJU S; SHEEMA M; P.JAYAKUMAR; S.SASIDHAR BABU
- SECUREDSMS: A PROTOCOL FOR SMS SECURITYAuthors: DEEPTHI SUCHEENDRAN; ARUN R; S.SASIDHAR BABU; P.JAYAKUMAR
- ARCHITECTURAL STUDY OF LITTORAL ZONE SENSING USING UNDERWATER ACOUSTIC WIRELESS SENSOR NETWORKAuthors: SREERANJINI NANDAKUMAR; P.KRISHNA KUMARAN THAMPI
- STUDY OF VARIOUS TECHNIQUES FOR DRIVER BEHAVIOR MONITORING AND RECOGNITION SYSTEMAuthors: VIDHYA P M; AMBILY MOHAN
- INVESTIGATIVE ANALYSIS OF SECURITY ISSUES AND CHALLENGES IN CLOUD COMPUTING AND THEIR COUNTER MEASURESAuthors: SAJAY K R; SUVANAM SASIDHAR BABU; VIJAYALAKSHMI Y.
- HUMAN ACTIVITY DETECTION BASED ON EDGE POINT MOVEMENTS AND SPATIO-TEMPORAL FEATURES IN INDOORAuthors: LAKSHMI PRIYA K M; SMITHA SURESH
- AN ENERGY EFFICIENT PROTOCOL BASED STUDY OF WSN TO INCREASE THE LIFETIMEAuthors: ANJUMOL O N; THAMPI P.K.K
- CONTROLLER AREA NETWORK AS THE SECURITY OF THE VEHICLESAuthors: AROMAL C M; JINI KURIAKOSE; SUJITH KUMAR P S
- SECURITY IN MANET VIA DIFFERENT INTRUSION DETECTION TECHNIQUESAuthors: JEENA KURIAKOSE; RESHMA RAJAN; GAYATHRY K. V
- USING METADATA IN FILTERED LOGS FOR PREVENTION OF DATABASE INTRUSION THROUGH OWNER LEVEL INTERACTIONAuthors: NAYANA SANTHOSH; SACHU.P.SAHI; ARUN R
- AN AUTOMATIC FILTERING TASK IN OSN USING CONTENT BASED APPROACHAuthors: SACHU.P.SAHI; NAYANA SANTHOSH; SILPA KAMALAN
- WAY TO GREEN: INTELLIGENT TRAFFIC CONTROL WITH VANETAuthors: JINI KURIAKOSE; AROMAL C M; GAYATHRY K. V
- PERFORMANCE BOOSTING OF DISCRETE COSINE TRANSFORM USING PARALLEL PROGRAMMING METHODOLOGYAuthors: APARNA M.P; SMITHA SURESH; ANOOP M.P
- CONGESTION MANAGEMENT THROUGH MVCM AND CONGESTION CONTROL BASED ON MOBILE AGENTSAuthors: RESHMA RAJAN; JEENA KURIAKOSE; VIDHYA PM
- A SURVEY ON VARIOUS TIME SYNCHRONIZATION TECHNIQUES IN UNDERWATER SENSOR NETWORKSAuthors: ANIL C.B.; VANI SREEKUMAR; MANJARI JOSHI
- IMPACT OF ELECTRONIC COMMERCE IN MARKETING AND BRAND DEVELOPINGAuthors: DIJESH P; SUVANAM SASIDHAR BABU; VIJAYALAKSHMI Y
- NVRAM APPLICATIONS IN THE ARCHITECTURAL REVOLUTIONS OF MAIN MEMORY IMPLEMENTATION ? A MEMRISTOR WALKTHROUGHAuthors: HITHA PAULSON; RAJESH R
- COLOR VS. TEXTURE FEATURE EXTRACTION AND MATCHING IN VISUAL CONTENT RETRIEVAL BY USING GLOBAL COLOR HISTOGRAMAuthors: SHIMI P.S.
- EFFECTIVENESS OF VARIOUS USER AUTHENTICATION TECHNIQUESAuthors: NIMISHA PAULOSE; SARIKA S
- SPACE EFFICIENT STRUCTURES FOR JSON DOCUMENTSAuthors: RINCY T. A.; RAJESH R
- AUDIO - VIDEO STEGANOGRAPHY USING FORENSIC TECHNIQUEFOR DATA SECURITYAuthors: ATHIRA MOHANAN; RESHMA REMANAN; SASIDHAR BABU SUVANAM; KALYANKAR N V
- DETECTION AND PREVENTION METHOD OF ROOTING ATTACK ON THE ANDROID PHONESAuthors: LITTY ANTONY; HARLAY MARIA MATHEW; JAYAKUMAR.P