Volume 8, Issue 1, Jan, 2015
ISSN: 2306-6474 , Journal IMPACT Factor: 8.95
Volume 8, Issue 1, Jan, 2015
The Impact of Digital Transformation on Corporate Strategy
Authors: Deepika
A Survey on Security Issues in Mobile Ad Hoc Networks.
Authors: K. Jeevan Pradeep, Prashanth Kumar Shukla
Performance Analysis of Routing Protocols in Delay Tolerant Networks.
Authors: Neetha George
A Study on Energy Efficient Scheduling Algorithms for Cloud Computing.
Authors: Jianhang Liu
Volume 8, Issue 2, Feb, 2015
The Impact of Digital Transformation on Corporate Strategy
Authors: Brij B. Gupt
A Review of Intrusion Detection Systems for Wireless Sensor Networks.
Authors: Tarik Chafiq
A Survey on Data Mining Techniques for Big Data Analysis.
Authors: C.Pooja, A. Sabarmathi
Volume 8, Issue 3, Mar, 2015
A Study on Computer Vision Techniques for Object Recognition.
Authors: Prakash Khanale
A Survey on AI Applications in Healthcare.
Authors: Mridul Mishra
A Review of AI Ethics and Bias.
Authors: Nrutyangana Mohapatra
Secure Routing Protocols for Mobile Ad-hoc Networks: A Comparative Analysis.
Authors: Anup Roy
Enhancing Network Security with Intrusion Detection Systems: A Machine Learning Approach.
Authors: Dr. Arnab Bhattacharya
Volume 8, Issue 4, April, 2015
Network Forensics: Investigating Cybercrime in Cloud Environments.
Authors: Arnold Mashud Abukari
Performance Evaluation of SDN Controllers in Data Center Networks.
Authors: Seidu Nimatu
The Impact of 5G on IoT Security: Challenges and Solutions.
Authors: Jhansi Bharathi
Real-World Emissions Testing and Analysis of Electric Vehicles
Authors: Mr. Veeranna C M
Volume 8, Issue 5, May, 2015
Blockchain Technology for Secure Data Sharing in Cloud Computing.
Authors: Damian Schofield
A Survey on Denial-of-Service Attacks and Mitigation Techniques.
Authors: S. Suresu
Cybersecurity in Smart Cities: Vulnerabilities and Countermeasures.
Authors: Saptarshi Bhattacharyya
Volume 8, Issue 6, June, 2015
Security Challenges in Wireless Sensor Networks for Industrial Applications.
Authors: Xing Zhao, Ooi Boon Keat , Jacquline Tham
Privacy-Preserving Techniques in Big Data Analytics.
Authors: Surekha Lanka, Nay Myo Sandar
Energy-Efficient Routing Protocols for Wireless Sensor Networks.
Authors: Michael Ceasar R
Volume 8, Issue 7, July, 2015
The Impact of Digital Transformation on Corporate Strategy
Authors: R. Vijayalakshmi, R. S. Ravichandran
Quality of Service (QoS) Provisioning in Software-Defined Networking.
Authors: K. Shravani, A.Srinivasula Reddy
Congestion Control Algorithms for High-Speed Networks.
Authors: Pramod V.R, Mrs. Aparna.M
Volume 8, Issue 8, Aug, 2015
Network Virtualization for Cloud Computing: Performance and Security.
Authors: Raj Vikram Singh
The Role of AI in Network Security Automation.
Authors: Saurabhi Chaudhary
Securing the Internet of Medical Things (IoMT): Challenges and Solutions.
Authors: Bijendra Kumar
A Comparative Study of Network Simulation Tools.
Authors: S. Meena Rani
Volume 8, Issue 9, Sep, 2015
Mobile Ad Hoc Network Routing Protocols: A Performance Comparison.
Authors: E S V Subrahmanyam , Ranabothu Govardhan, Krishnakartik M
Delay Tolerant Networks: Routing and Security Challenges.
Authors: Varsha M
Volume 8, Issue 10, Oct, 2015
Securing Cloud Storage: Encryption and Access Control Mechanisms.
Authors: Jeffrey Ken B. Balangao
Intrusion Detection in IoT Networks using Machine Learning.
Authors: Bishnupriya Mishra
Blockchain for Secure Data Management in Healthcare.
Authors: B Bhaskar Rao, Chandrakant Naikodi
Volume 8, Issue 11, Nov, 2015
The Future of Network Security: Quantum Computing and Cryptography.
Authors: Swati Arya, Ashwani
Edge Computing Security: Protecting Data at the Network Edge.
Authors: Dogha Mohamed Soufiane
Secure Communication Protocols for Industrial Control Systems.
Authors: Vaibhav V. Khond
Volume 8, Issue 12, Dec, 2015
Software Defined Networking Security: Challenges and Solutions.
Authors: R.Nathiya
The Impact of Network Function Virtualization on Security.
Authors: Prajeesha M.P., S. Packialakshmi
Security Considerations for Mobile Cloud Computing.
Authors: Cheekati Sushmasree