2019 |
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV) |
2018 |
Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique |
2018 |
Software Obfuscation Technique Based On Recurrent Neural Network |
2017 |
Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT) |
2016 |
A basion MobileID-Based Authentication Technique (MBBAT) |
2016 |
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT) |
2016 |
Spam Reduction by using E-mail History and Authentication(SREHA) |
2016 |
An intelligent classification model for phishing email detection) |
2016 |
SQL Injection Prevention using Query Dictionary Based Mechanism |
2016 |
A New MultiPathTCP Flooding Attacks Mitigation Technique |
2016 |
Adaptive Weighted Clustering Algorithm for Mobile Ad-hoc Networks (AWCAMAN) |
2016 |
Enhancing RFID Security Against Brute Force Based Attacks |
2016 |
Enhancing Wireless Sensor Network Security Using Artificial Neural Network Based Trust Model |
2015 |
An Enhanced Steganographic Model Based on DWT-LSB Combined with Encryption and Error Detection Techniques |
2014 |
Enhancing the connectivity of mobile Ad-hoc networks by considering the power, mobility and activity of nodes |
2012 |
Least Recently Plus Five Least frequently Replacement policy (LR+5LF) |
2011 |
An Efficient Scheme For MANET Domain Formation |
2010 |
Simple Scalar as an eLearning Mashup web application (eScalar) |
2010 |
Low Power Architecture Cache for Embedded Systems |
2010 |
The Preferable Bank Number for Multibanked-Caches |
1977 |
test |