Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018

SUBMISSION
September 30, 2019

NOTIFICATION
October 31, 2019

PUBLICATION
November 30, 2019

HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJCSS

CITATION ANALYSIS

IJCSS Citation Impact
(2086 - 5) / 314 = 6.627

Refer to Citation Report for 2018 for complete details.
 

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Academia
Academic Index
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

CITATION REPORT FOR IJCSS

Below calculations are based on in-process citations that are extracted through Google Scholar.


Total Citations = 2086
Self Citations = 5
Total Publications = 314


Citation Impact
(Total Citations - Self Citations) / Total Publications

Citation Impact
(2086 - 5) / 314 = 6.627

 
SR
M-CODE
CITATION
1
Al-Hawari, F., Alufeishat, A., Alshawabkeh, M., Barham, H., & Habahbeh, M. (2017). The software engineering of a three-tier web-based student information system (MyGJU). Computer Applications in Engineering Education, 25(2), 242-263.
2
Al-Hawari, F. H. (2017). MyGJU Student View and its Online and Preventive Registration Flow. International Journal of Applied Engineering Research, 12(1), 119-133.
3
Thompson, R. C. (2017). Determining critical success factors for implementation of on-line registration systems (Doctoral dissertation).
4
Agwa-Ejon, J. F., & Pradhan, A. (2017, July). Technology Connectivity: A Tool for the Selection, Recruitment and Enrolment of Potential Students in South African Universities. In Management of Engineering and Technology (PICMET), 2017 Portland International Conference on (pp. 1-8). IEEE.
5
Wahaba, N. A., Marimuthub, R., Othmana, J., & SaifulNizamWarrisa, C. S. P. (2017). Evaluating the Usability of COREs-an Online Conference Registration System. DEPARTMENT OF COMPUTER AND MATHEMATICAL SCIENCES UNIVERSITI TEKNOLOGI MARA CAWANGAN PULAU PINANG PENANG, MALAYSIA, 38.
6
Jabbar, M. A., Deekshatulu, B. L., & Chandra, P. (2016). A Novel Algorithm for Utility-Frequent Itemset Mining in Market Basket Analysis. In Innovations in Bio-Inspired Computing and Applications (pp. 337-345). Springer International Publishing.
7
Renza , D., Ballesteros , D. M., & Rincon, R. (2016 ) . Concealment method for steganography image pixel grayscale on color images . Engineering and Science , 12 ( 23) , 145-162.
8
Stephanie, F. L., & Sharma, R. S. (2016). Health on a Cloud: Modeling Digital Flows in an E-health Ecosystem. Journal of Advances in Management Sciences & Information Systems, 2, 1-20.
9
Pillai, J. S., & Padma, T. (2016). The Analysis of PQ Sequences Generated from Continued Fractions for Use as Pseudorandom Sequences in Cryptographic Applications. In Artificial Intelligence and Evolutionary Computations in Engineering Systems (pp. 633-644). Springer India.
10
Singh, K. (2016). Image Steganography Scheme Using Parent Child Relationship in Wavelet Domain. British Journal of Applied Science & Technology, 14(4), 1.
11
Barve, S., Desai, S., & Sardinha, R. (2016).Query-Based Extractive Text Summarization for Sanskrit. In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 (pp. 559-568). Springer India.
12
Shanmuganathan, S. (2016). A Hybrid Artificial Neural Network (ANN) Approach to Spatial and Non-spatial Attribute Data Mining: A Case Study Experience. In Artificial Neural Network Modelling (pp. 443-472). Springer International Publishing.
13
Dhveya, R., & Amudha, T. (2016). Role of Bio-Inspired Optimization in Disaster Operations Management Research. In Innovations in Bio-Inspired Computing and Applications (pp. 565-575). Springer International Publishing.
14
Iwasokun, G. B., & Akinyokun, O. C. Singular-minutiae points relationship-based approach to fingerprint matching.
15
Jamont, J. P. (2016). Démarche, modèles et outils multi-agents pour l'ingénierie des collectifs cyber-physiques (Doctoral dissertation, Université Grenoble Alpes).
16
Adewumi, A. O., & Arasomwan, M. A. (2016). On the performance of particle swarm optimisation with (out) some control parameters for global optimisation. International Journal of Bio-Inspired Computation, 8(1), 14-32.
17
Gkartzonikas , A . , & Theoharatos , D . ( 2016 ) . Discovery Framework Information : particle swarm optimization and optimum stop theory.
18
Viola, A. V., Ese, O. D., & Charles, S. O. A Proposed Hybrid Component Complexity Metrics For Component Based Software Development.
19
Rathore, M. M., Ahmad, A., & Paul, A. (2016). Real time intrusion detection system for ultra-high-speed big data environments. The Journal of Supercomputing, 1-22.
20
Ruuhwan, R., Riadi, I., & Prayudi, Y. (2016). Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone. Jurnal Edukasi dan Penelitian Informatika (JEPIN), 2(1).
21
Al-Fayoumi, A., & Hassan, M. (2016). Interactive Visual Search System Based onMachine Learning Algorithm. International Arab Journal of Information Technology (IAJIT), 13.
22
Tarek, M., Ouda, O., & Hamza, T. (2016). Robust cancellable biometrics scheme based on neural networks. IET Biometrics.
23
Al-Dmour, H., & Al-Ani, A. (2016). Quality optimized medical image information hiding algorithm that employs edge detection and data coding. Computer Methods and Programs in Biomedicine, 127, 24-43.
24
Jahantigh , F Firuzi , due to race , R. , Jahantigh , & M. Firuzi . (2016 ) . Identify , evaluate and rank the risk factors Weight & # 1705 ... Journal of Mazandaran University of Medical Sciences (JMUMS), 25 (133).
25
Rashid, F., Miri, A., & Woungang, I. (2016). Secure image deduplication through image compression. Journal of Information Security and Applications.
26
Md Yunus, N. A., Othman, M., Mohd Hanapi, Z., & Lun, K. Y. (2016). Reliability Review of Interconnection Networks. IETE Technical Review, 1-11.
27
Khanna, N. (2016). Mitigation of Collaborative Blackhole Attack using TRACEROUTE Mechanism with Enhancement in AODV Routing Protocol.
28
Jung, S., & Kumar, R. (2016). Security of Routing Protocols in MANETs: A Survey. Global Sci-Tech, 8(1), 22-36.
29
Pop, F., Tutueanu, R. I., Barbieru, C., Vasile, M. A., & Kolodziej, J. (2016). Adaptive Resource Allocation in Cloud Computing Based on Agreement Protocols. In Intelligent Agents in Data-intensive Computing (pp. 193-213). Springer International Publishing.
30
Anju, P. S., Kuriakose, B., & Paul, V. A Survey On Steganographic Methods Used in Information Hiding.
31
Mubeen, S., Srinath, N. K., & Subramanya, K. N. (2016). Double Securing from Hackers in B2B E-commerce.
32
Opoku-Ansah, J., Eghan, M. J., Anderson, B., Boampong, J. N., & Buah-Bassuah, P. K. (2016). Laser-Induced Autofluorescence Technique for Plasmodium falciparum Parasite Density Estimation. Applied Physics Research, 8(2), 43.
33
Ramesh, M. R., & Reddy, C. S. (2016). a survey on security requirement elicitation methods: classification, merits and demerits. International Journal of Applied Engineering Research, 11(1), 64-70.
34
Bistouni, F., & Jahanshahi, M. (2015). Pars network: a multistage interconnection network with fault-tolerance capability. Journal of Parallel and Distributed Computing, 75, 168-183.
35
Li, D., & Wang, Y. (2015). The Image Retrieval Based on the Hybrid Algorithm of the Primary Color and Color Layout Descriptor.
36
Anchor , & Abdul race. ( 2015). Identify phishing in online banking site using the optimization algorithm inclined plates . Journal of electronic and cyber defense , 3 ( ??1 ).
37
Uzunov, A. V., Falkner, K., & Fernandez, E. B. (2015). A comprehensive pattern-oriented approach to engineering security methodologies. Information and Software Technology, 57, 217-247.
38
Veshkurtsev ,JM model management and monitoring of network elements Telecommunication network using theory of fuzzy sets.
39
Nayebi, F., Abran, A., & Desharnais, J. M. (2015). Automated selection of a software effort estimation model based on accuracy and uncertainty. Artificial Intelligence Research, 4(2), p45.
40
Tripathy, A., Agrawal, A., & Rath, S. K. (2015). Classi?cation of Sentimental Reviews Using Machine Learning Techniques. Procedia Computer Science, 57, 821-829.
41
Bhatia, S., & Attri, V. K. Estimation of Software Development Effort with Machine Learning Approaches: A Review.
42
Tripathya, A., Agrawalb, A., & Rathc, S. K. Classification of Sentimental Reviews Using Machine Learning Techniques.
43
Chen, N. (2015). Research on Detection of Business Constraints based on AOP. International Journal of u-and e-Service, Science and Technology, 8(2), 243-250.
44
An, B., Qu, T., & Qi, H. (2015). Chinese MOOC Search Engine. In Intelligent Computation in Big Data Era (pp. 453-458). Springer Berlin Heidelberg.
45
Kapur, R. K., & Khatri, S. K. (2015, March). Analysis of attacks on routing protocols in MANETs. In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in (pp. 791-798). IEEE.
46
Al-Saeedan, W., & Menai, M. E. B. (2015). Swarm intelligence for natural language processing. International Journal of Artificial Intelligence and Soft Computing, 5(2), 117-150.
47
Alguliyev, R. M., Aliguliyev, R. M., & Isazade, N. R. (2015). an unsupervised approach to generating generic summaries of documents. Applied Soft Computing.
48
Mohamed, K., Pauzi, M. N. M., Ali, F. H. H. M., & Ariffin, S. (2015, August). Linearity Test Framework for S-Box in Block Cipher. In IT Convergence and Security (ICITCS), 2015 5th International Conference on (pp. 1-5). IEEE.
49
McIntosh, H. (2015). Vevo and the Business of Online Music Video Distribution. Popular Music and Society, (ahead-of-print), 1-14.
50
Fatima, M., Ahmad, S. F., & Hasan, M. (2015). Fuzzy Based Software Cost Estimation Methods: A Comparative Study. International Journal for Innovative Research in Science and Technology, 1(7), 287-290.
51
Iraji, M. S. (2015). Fuzzy Agent Oriented Software Effort Estimate with COCOMO.
52
Mohammadpoor, M., & Mehdizadeh, A. An Efficient ECC-based Authentication and Key Agreement Protocol.
53
Verma, K., Shukla, D., & Gangele, S. (2015). Approximating the Probability of Traffic Sharing by Numerical Analysis Techniques between Two Operators in a Computer Network. Open Journal of Computer Science and Information Technology, 3(1), 026-039.
54
Persson, J., & Lundbladh, M. (2015). Våga vara dig själv: Att fo¨rsta° och skapa en illusion av ljus med digitala medier.
55
Olaniyi, O. M., Arulogun, O. T., Omidiora, O. E., & Okediran, O. O. (2015). Implementing generic security requirements in e–voting using modified stegano–cryptographic approach. International Journal of Information and Computer Security, 7(1), 64-90.
56
Omotosho, A., Adegbola, O., Mikail, O. O., & Emuoyibofarhe, J. (2015). A Secure Electronic Prescription System Using Steganography with Encryption Key Implementation. arXiv preprint arXiv:1502.01264.
57
Sathisha, N., Babu, K. S., Raja, K. B., & Venugopal, K. R. (2015). Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT. International Journal of Image Processing (IJIP), 9(2), 41.
58
Patil, P. (2015). encryption for secure sms transmission. Compusoft, 4(6), 1876.
59
Jasuja, B., & Pandya, A. (2015). Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding. International Journal of Computer Applications, 116(21).
60
Kumar, V., & Purusotham, S. (2015). A Lexi-Search Approach of Variant Vehicle Routing Problem. International Journal of Advanced Research in Computer Science, 6(1).
61
Babu, K. S. international journal of engineering sciences & research technology a data guided lexi-serach approach for time dependent travelling salemsman problem.
62
Kundaikar, T. C., & Laxminarayana, J. A. (2015). Efficient Recognition of Devanagari Handwritten Text. In Computational Intelligence in Data Mining-Volume 2 (pp. 81-88). Springer India.
63
Kulkarni, P. P., Patil, S., & Dhanokar, G. (2015). Marathi And Sanskrit Word Identification By Using Genetic Algorithm.
64
Singh, P., Verma, A., & Chaudhari, N. S. (2015). On the Performance Improvement of Devanagari Handwritten Character Recognition. Applied Computational Intelligence and Soft Computing, 2015.
65
Jayakumar, A., Babu, G. S., Raman, R., & Nedungadi, P. (2015, October). Integrating Writing Direction and Handwriting Letter Recognition in Touch-Enabled Devices. In Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015 (Vol. 2, p. 393). Springer.
66
Joshi, D., & Pansare, S. (2015, February). Combination of Multiple Image Features along with KNN Classifier for Classification of Marathi Barakhadi. In Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on (pp. 607-610). IEEE.
67
Dhaka, V. P., & Sharma, M. K. An efficient segmentation technique for Devanagari offline handwritten scripts using the Feedforward Neural Network. Neural Computing and Applications, 1-13.
68
Kabir, K. L., Shafin, M. K., Anannya, T. T., Debnath, D., Kabir, M. R., Islam, M. A., & Sarwar, H. Projection-Based Features: A Superior Domain for Handwritten Bangla Basic Characters Recognition.
69
Ajmire, P. E., Dharaskar, R. V., & Thakare, V. M. Feature Extraction and recognition of Modifiers in Handwritten Marathi (Devanagari) Text.
70
Shing, L., Astacio, J., Figueroa, A., & Shing, C. C. (2015, August). Vulnerabilities of radio frequencies. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on (pp. 2682-2686). IEEE.
71
Kannan, D., & Gobi, M. (2015). An extensive research on robust digital image watermarking techniques: a review. International Journal of Signal and Imaging Systems Engineering, 8(1-2), 89-104.
72
Roy, A. J., & Student, F. Y. U. Emotional Text to Speech Synthesis in Indian Language.
73
Anil, M. C., & Shirbahadurkar, S. D. Expressive Speech Synthesis using Prosodic Modification for Marathi Language.
74
Shrivastava, S., Agrawal, C., & Jain, A. (2015). An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET. arXiv preprint arXiv:1502.04801.
75
Maheswari, R., MCA, M. S. R., & PHIL, M. (2015, March). A Review on Types of Jamming Attack In Mobile Ad-Hoc Network. In Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications.
76
Pandhare, S. S., & Jawandiya, P. M. (2015, March). Security Goals and Attacks in Mobile Ad Hoc Networks: An exclusive survey. In National Conference “CONVERGENCE (Vol. 2015, p. 28).
77
Filipek, J., & Hudec, L. (2015, January). Distributed firewall in Mobile Ad Hoc Networks. In Applied Machine Intelligence and Informatics (SAMI), 2015 IEEE 13th International Symposium on (pp. 233-238). IEEE.
78
Mohammed, A., Sofiane, B. H., & kamel Mohamed, F. (2015). A Cross Layer for Detection and Ignoring Black Hole Attack in MANET.
79
Mittal, V. (2015). Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach. Prevention, 4(5).
80
Paliwal, G., Mudgal, A. P., & Taterh, S. (2015, January). A Study on Various Attacks of TCP/IP and Security Challenges in MANET Layer Architecture. In Proceedings of Fourth International Conference on Soft Computing for Problem Solving (pp. 191-203). Springer India.
81
Dorri, A., Kamel, S. R., & Kheirkhah, E. (2015). Security challenges in mobile ad hoc networks: a survey. arXiv preprint arXiv:1503.03233.
82
Singh, J., Singh, A., & Shree, M. R. (2015). An Assessment of Frequently Adopted Security Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective. Journal of Wireless Network and Microsystems, 4(1-2).
83
Suja, K. R., & Raglend, J. (2015). Cuckoo search (CS)-NFC-based UPQC for compensating voltage sag of nonlinear load. Journal of Experimental & Theoretical Artificial Intelligence, (ahead-of-print), 1-18.
84
Priest, B. W., Vuksani, E., Wagner, N., Tello, B., Carter, K. M., & Streilein, W. W. (2015, April). Agent-based simulation in support of moving target cyber defense technology development and evaluation. In Proceedings of the 18th Symposium on Communications & Networking (pp. 16-23). Society for Computer Simulation International.
85
Wagner, N., Lippmann, R., Winterrose, M., Riordan, J., Yu, T., & Streilein, W. W. (2015, April).Agent-based simulation for assessing network security risk due to unauthorized hardware. In Proceedings of the Symposium on Agent-Directed Simulation (pp. 18-26). Society for Computer Simulation International.
86
Singh, Y., & Chugh, U. Clustering, Information Fusion and Event Detection in Wireless Sensor Networks: A Review.
87
Houngbo, P. J., & Hounsou, J. T. (2015). Measuring Information Security: Understanding And Selecting Appropriate Metrics. International Journal of Computer Science and Security (IJCSS), 9(2), 108.
88
Rani, C., & Goel, S. CSAAES: An Expert System for Cyber Security Attack Awareness.
89
Rasheed, Z. A. S. (2015). ’Steganography Technique for Binary Text Image. International Journal of Science and Research (IJSR) ISSN (Online), 2319-7064.
90
Rubab, S., & Javed, Y. (2015). Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption. International Journal of Computer Network and Information Security (IJCNIS), 7(2), 15.
91
Sahu, P., & Chourasia, B. (2015). State of the Art in Modern Steganography-A review. International Journal of Advanced Electronics and Communication Systems, 4(1).
92
Houngbo, P. J., & Hounsou, J. T. (2015). Measuring Information Security: Understanding And Selecting Appropriate Metrics. International Journal of Computer Science and Security (IJCSS), 9(2), 108.
93
Sen, P., Ahmed, R. A., & Islam, M. R. (2015). A Study on E-Commerce Security Issues and Solutions.
94
Aigbe, P., & Onibere, A. (2015). An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System. International Journal of Computer Applications, 122(18).
95
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handling in the cloud. Computers & Security, 49, 45-69.
96
Amann, P., & James, J. I. (2015). Designing robustness and resilience in digital investigation laboratories. Digital Investigation, 12, S111-S120.
97
Agarwal, R., & Kothari, S. (2015). Review of Digital Forensic Investigation Frameworks. In Information Science and Applications (pp. 561-571). Springer Berlin Heidelberg.
98
Jafari, F., & Satti, R. S. (2015). Comparative Analysis of Digital Forensic Models. Journal of Advances in Computer Networks, 3(1).
99
Satti, R. S., & Jafari, F. (2015). Domain Specific Cyber Forensic Investigation Process Model. Journal of Advances in Computer Networks, 3(1).
100
Jiang, J. G., Yang, B., Lin, S., Zhang, M. X., & Liu, K. Y. (2015, April). A Practical Approach for Digital Forensic Triage. In Applied Mechanics and Materials (Vol. 742, pp. 437-444).
101
Prayudi, Y., & Sn, A. (2015). Digital Chain of Custody: State of the Art. International Journal of Computer Applications, 114(5), 1-9.
102
Satti, R. S., & Jafari, F. (2015). Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes.
103
Saleem, S. (2015). Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics.
104
Mushtaque, K., Ahsan, K., & Umer, A. (2015). DIGITAL FORENSIC INVESTIGATION MODELS: AN EVOLUTION STUDY. JISTEM-Journal of Information Systems and Technology Management, 12(2), 233-243.
105
Mushtaque, K., Ahsan, K., & Umer, A. (2015).Digital Forensic investigation models:an evolution study. JISTEM-Journal of Information Systems and Technology Management, 12(2), 233-243.
106
Kurniati, F. T., Santoso, A. J., & Suyoto, S. (2015).printer forensik untuk identifikasi dokumen cetak. semnasteknomedia online, 3(1), 5-10.
107
Prayudi, Y., & Ashari, A. A Study on Secure Communication for Digital Forensics Environment.
108
KHAWASE, M. D. S.,deshmukh, m., kuche, s., & mahalle, a. international journal of pure and applied research in engineering and technology.
109
Swamy, V., Sampath, S., Nanjesh, B. R., & Sagar, B. B. (2015). Development of Common Parallel Programming Platform for MPI and PVM. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 95-103). Springer India.
110
Yadav, M. R., & Gill, N. S. (2015). Improvement in Performance of RSA Algorithm Using SLSB.
111
Bhanot, R., & Hans, R. (2015). A Review and Comparative Analysis of Various Encryption Algorithms. International Journal of Security & Its Applications, 9(4).
112
Farajallah, M. (2015). Chaos-based crypto and joint crypto-compression systems for images and videos (Doctoral dissertation, UNIVERSITE DE NANTES).
113
Ayokunle, T. B., Ogah, U. S., & Binitie, A. P. (2015). Encryption and Decryption of Messages Using Advanced Encryption Standard and System of Nonlinear Equations. International Journal of Pure and Applied Sciences and Technology, 27(1), 1.
114
Kulkarni, s. international journal of pure and applied research in engineering and technology.
115
Razzak, I. (2015). Malarial Parasite Classification using Recurrent Neural Network. International Journal of Image Processing (IJIP), 9(2), 69.
116
DAS, D., Mukherjee, R., & Chakraborty, C. (2015). Computational microscopic imaging for malaria parasite detection: a systematic review. Journal of microscopy.
117
Razzak, M. I. (2015). Automatic Detection and Classification of Malarial Parasite. International Journal of Biometrics and Bioinformatics (IJBB), 9(1), 1.
118
Savkare, S. S., & Narote, S. P. (2015, January). Automated system for malaria parasite identification. In Communication, Information & Computing Technology (ICCICT), 2015 International Conference on (pp. 1-4). IEEE.
119
Chayadevi, M. L., & Raju, G. T. (2015). Automated Colour Segmentation of Malaria Parasite with Fuzzy and Fractal Methods. In Computational Intelligence in Data Mining-Volume 3 (pp. 53-63). Springer India.
120
Hutagalung, B. T., & Syahputra, A. watermarking citra digital dengan information dispersal algorithm (ida) dan algoritma huffman.
121
Alabaichi, A. M. (2015). A Dynamic 3D S-Box based on Cylindrical Coordinate System for Blowfish Algorithm. Indian Journal of Science and Technology, 8(30).
122
Alabaichi, A., & Salih, A. I. (2015, October). Enhance security of advance encryption standard algorithm based on key-dependent S-box. In Digital Information Processing and Communications (ICDIPC), 2015 Fifth International Conference on (pp. 44-53). IEEE.
123
Pourahmad, S., Azad, M., & Paydar, S. (2015). Diagnosis of Malignancy in Thyroid Tumors by Multi-Layer Perceptron Neural Networks With Different Batch Learning Algorithms. Global Journal of Health Science, 7(6), p46.
124
Jasim, O. K., Abbas, S., Horbaty, E. S. M., & Salem, A. B. M. (2015). Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm. arXiv preprint arXiv:1503.04796.
125
Kazlauskas, K., Vaicekauskas, G., & Smaliukas, R. (2015). An Algorithm for Key-Dependent S-Box Generation in Block Cipher System. INFORMATICA, 26(1), 51-65.
126
Shing, L. P., Shing, L. H., Shing, M. L., & Shing, C. C. (2015). modeling data integrity under stochastic linear constraints. International Journal of Electronic Commerce Studies, 6(2), 233-242.
127
Kariuki, P. (2015). generic process model for android smartphones live memory forensics (Doctoral dissertation).
128
Jeon, S., Fujita, H., & Toshiyoshi, H. (2015). A MEMS-based interactive laser scanning display with a collocated laser range finder. IEICE Electronics Express, 12(10), 20150072-20150072.
129
Fister, I., Ljubic, K., Suganthan, P. N., & Perc, M. (2015). Computational intelligence in sports: Challenges and opportunities within a new research domain. Applied Mathematics and Computation, 262, 178-186.
130
Korhonen, H. (2015). Improving Transparency in Demand-Supply Chain With Visual Business Intelligence Tools.
131
Alhirz, H., & Sajeev, A. S. M. (2015). Do cultural dimensions differentiate ERP acceptance? A study in the context of Saudi Arabia. Information Technology & People, 28(1), 163-194.
132
Almishal, A., & Alsaud, M. A. (2015). Implementing ERP Systems in Government: Case Study of Saudi Organization. Lecture Notes on Software Engineering, 3(2), 120.
133
Hammad, J. (2015). A Comparative Study between Various Sorting Algorithms. IJCSNS, 15(3), 11.
134
Bjeljac, P., Zecevic, I., & Perisic, B. (2015, May). Integrating Learning Management System and Faculty Information System-service oriented approach. In Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2015 38th International Convention on (pp. 773-777). IEEE.
135
Kavila, S. D., & Radhika, Y. (2015).Extractive Text Summarization Using Modified Weighing and Sentence Symmetric Feature Methods.
136
Loto, m., & durán, e. B. (2015). Diseño de una aplicación móvil personalizada de apoyo al aprendizaje de redes de computadoras. In x congreso sobre tecnología en educación & educación en tecnología (te & et)(corrientes, 2015).
137
Koondhar, m. Y., rind, m. M., chandio, f. H., & shah, a. (2015). Pervasive learning environment with emerging technologies and learning transformation. In international multi-topic conference.
138
Mohy, N. N., Mokhtar, H. M., & El-Sharkawi, M. E. (2015, July).Delegation enabled provenance-based access control model. In Science and Information Conference (SAI), 2015 (pp. 1374-1379). IEEE.
139
Dewi, D. (2015).Identifikasi goresan dasar mandarin dengan metode multilayer perceptron.CSRID Journal, 7(1), 12-23.
140
Yadav, M., & Dhankhar, A. (2015). A-Review on Image Steganography. International Journal for Innovative Research in Science and Technology, 2(2), 243-248.
141
Yahlali, M., & Chouarfia, A. (2015). Towards a software component assembly evaluation. Software, IET, 9(1), 1-6.
142
Aigbe, P., & Onibere, A. (2015).An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System. International Journal of Computer Applications, 122(18).
143
Alhazmi, O. H. Evaluating Disaster Recovery Plans Using Computer Aided Disaster Recovery Tools.
144
Das, S., & Ghosh, R. (2015). Study of randomness in AES ciphertexts produced by various types of dynamic S-boxes. International Journal of Information and Communication Technology, 7(6), 537-561.
145
Kaur, P. J., Kaul, V., Bharadi, V. A., & Narayankhedkar, S. K. Article: Development of Security Enhancement Techniques for 3G/4G Networks}. In IJAIS Proceedings on International Conference and Workshop on Communication, Computing and Virtualization} (pp. 41-46).
146
Kalaiselvi, K., & Mangalam, H. (2015). Power efficient and high performance VLSI architecture for AES algorithm. Journal of Electrical Systems and Information Technology.
147
Vaicekauskas, G. BLOKINIŲ ŠIFRŲ ANALIZĖ IR KOKYBĖS PAGERINIMAS.
148
Ahamed, S. K., Naidu, M. M., & Reddy, C. S. R. (2015). MOST INFLUENTIAL OBSERVATIONS-SUPER EFFICIENCY. International Journal on Computer Science and Engineering, 7(9), 82.
149
Ibrahim, M. H. AATCT: Anonymously Authenticated Transmission on the Cloud with Traceability. International Journal of Advanced Computer Science & Applications, 1(6), 251-259.
150
Pan Lan Lan Yuchi school Biao , Huan Lei , institutions, & statistics . (2015 ) . A rapid assessment authoritative DNS DDoS attacks impact on the way services Computer Application Research , 32 ( 11 ) , 3456-3459
151
Nagarajan, P., & Perumal, G. (2015). Detection of Denial of Service Attack in Cloud using Fuzzy Time Series Analysis and EM Algorithm. International Journal of Advancements in Computing Technology, 7(5), 25.
152
KARIMIZADEH, M. M., RAFEAZADEH, E., AMIRI, P., & KHOLGHNIK, D. (2015). Enhancing and Optimization Sorting Algorithms: An Empirical Study. Cumhuriyet Science Journal, 36(6), 254-266.
153
Faujdar, N., & Ghrera, S. P. (2015, April). Analysis and Testing of Sorting Algorithms on a Standard Dataset. In Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on (pp. 962-967). IEEE.
154
Biedermann, S. (2015). Transparent Security Services for an Infrastructure-as-a-Service Cloud.
155
Redundancy, m. (2015). selection of robust feature subsets for phish webpage prediction using maximum relevance and minimum redundancy criterion. journal of theoretical and applied information technology, 81(2).
156
Yaramasa, T., & Kishore, G. K. (2015, January). Enhanced Privacy and Surveillance for Online Social Networks. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 189-196). Springer International Publishing.
157
Khalane, V. P., & Bhadade, U. S. A Review on Encryption Techniques in Signal Processing.
158
Khan, M., Jamil, A., Haleem, F., Zahoor, J., Muhammad, S., & Sung Wook, B. (2015). A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. KSII Transactions on Internet and Information Systems (TIIS), 9(5), 1938-1962.
159
Muhammad, K., Ahmad, J., Sajjad, M., & Zubair, M. (2015). Secure Image Steganography using Cryptography and Image Transposition. arXiv preprint arXiv:1510.04413.
160
Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., & Baik, S. W. (2015). A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications, 1-27.
161
Al-Dmour, H., & Al-Ani, A. (2015, November). A Medical Image Steganography Method Based on Integer Wavelet Transform and Overlapping Edge Detection. In Neural Information Processing (pp. 436-444). Springer International Publishing.
162
Olaniyi, O. M., Arulogun, O. T., Omidiora, O. E., & Okediran, O. O. (2015). Implementing generic security requirements in e–voting using modified stegano–cryptographic approach. International Journal of Information and Computer Security, 7(1), 64-90.
163
Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., & Okediran, O. O. (2015). Enhanced Stegano-Cryptographic Model for Secure Electronic Voting. Journal of Information Engineering and Applications, 5(4), 1-15.
164
Badhan, S., & Juneja, M. (2015). A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks. In Intelligent Computing, Communication and Devices (pp. 183-190). Springer India.
165
Mehndiratta, A. (2015). Data Hiding System Using Cryptography & Steganography: A Comprehensive Modern Investigation.
166
Wahab, O. F. A., Badawy, M. B., Elshakankiry, O. A., & El-sayed, H. S. (2015). Utilizations of Reversible Lossless Data Hiding Techniques in Video Sequences. Int. J. Com. Net. Teach, 3(1).
167
Din, R., Yusof, S. A. M., Amphawan, A., Hussain, H. S., Yaacob, H., Jamaludin, N., & Samsudin, A. (2015). Performance Analysis on Text Steganalysis Method Using A Computational Intelligence Approach. Proceeding of the Electrical Engineering Computer Science and Informatics, 2(1).
168
Azizifard, A., Qermezkon, M., & Farshidi, R. Information Steganography within 3D Images Using Residue Number System.
169
Deepa, S., & Umarani, R. (2015). A Prototype for Secure Information using Video Steganography. image, 4(8).
170
Liu, L., Chang, C. C., & Wang, A. (2015). Reversible data hiding scheme based on histogram shifting of n-bit planes. Multimedia Tools and Applications, 1-16.
171
Ahmad, M., Jung, L. T., & Bhuiyan, M. A. A. (2015). On Fuzzy Semantic Similarity Measure for DNA Coding. Computers in Biology and Medicine.
172
Anvary, M. D., Feshki, M. G., & Ahrabi, A. A. A. (2015). Efficient Security Alert Management System. International Journal of Computer Science and Security (IJCSS), 9(4), 218.
173
Feshki, M. G., Sojoodi, O., & Anvary, M. D. (2015). Managing Intrusion Detection Alerts Using Support Vector Machines. International Journal of Computer Science and Security (IJCSS), 9(5), 266.
174
Rai, P. K., & Singh, P. (2015). Studies and Analysis of Popular Database Models.
175
Khadka, I. The accuracy of location services and the potential impact on the admissibility of GPS Based evidence in court cases.
176
Chuchuen, C., & Chanvarasuth, P. (2015). Relationship between Phishing Techniques and User Personality Model of Bangkok Internet Users.
177
Jain, A., & Buksh, B. Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques.
178
Babatunde, I. G. (2015). Fingerprint Matching Using Minutiae-Singular Points Network. International Journal of Signal Processing, Image Processing and Pattern Recognition, 8(2), 375-388.
179
Narayanan, R. C. Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Recognition Biometric System.
180
Patel, A. (2015). Risk based prioritization of Asthma Burden Using Artificial Neuro Fuzzy Inference System.
181
Chowdhury, C. R., & Saha, B. (2015). Efficient Fingerprint Matching Based Upon Minutiae Extraction. International Journal of Advanced Computer Research, 5(21), 347.
182
Ahmad, F., Darbari, M., & Asthana, R. (2015). Different Approaches of Soft Computing Techniques (Inference System) which are used in Clinical Decision Support System for Risk based Prioritization. Asian Journal of Computer and Information Systems, 3(1).
183
Iwasokun, G. B., Udoh, S. S., & Akinyokun, O. K. (2015). Multi-Modal Biometrics: Applications, Strategies and Operations. Global Journal of Computer Science and Technology, 15(2).
184
Owusu, E., Gavua, E. K., & Zhan, Y. Z. (2015). Facial Expression Recognition–A Comprehensive Review. The Fourth Edition of the International Journal of Technology and Management Research, 1(4), 29-46.
185
Tamimi, A. A., AL-Allaf, O. N., & Alia, M. A. (2015). Real-Time Group Face-Detection for an Intelligent Class-Attendance System.
186
Anissa, B., Naouar, B., Arsalane, Z., & Jamal, K. (2015, March). Face recognition:Compar ative study between linear and non linear dimensionality reduction methods. In Electrical and Information Technologies (ICEIT), 2015 International Conference on (pp. 224-228). IEEE.
187
Vijayalakshmi, V., Sharmila, R., & Shalini, R. (2015, March). Hierarchical key management scheme using Hyper Elliptic Curve Cryptography in Wireless Sensor Networks. In Signal Processing, Communication and Networking (ICSCN), 2015 3rd International Conference on (pp. 1-5). IEEE.
188
Tomar, G. S., Kevre, P., & Shrivastava, L. Energy model based Performance Analysis of cluster based wireless sensor network.
189
Ye, F., Qian, Y., & Hu, R. Q. (2015). HIBaSS: hierarchical identity-based signature scheme for AMI downlink transmission. Security and Communication Networks.
190
Aboud, S., & Al-fayoumi, M. (2012). proxy signature scheme for warrant partial delegation. In The International Conference on Computing, Networking and Digital Technologies (ICCNDT2012) (pp. 107-113). The Society of Digital Information and Wireless Communication.
191
Jain, M., & Tripathi, K. C. Auto Associative Neural Networks for Nonlinear Principal Components Analysis of Sea Surface Temperature Anomalies in Indian Ocean.
192
Fayed, S., Youssef, S. M., El-Helw, A., Patwary, M., & Moniri, M. (2015). Adaptive compressive sensing for target tracking within wireless visual sensor networks-based surveillance applications. Multimedia Tools and Applications, 1-25.
193
Kishore, N. (2015). Parllel hashing algorithms for security and Forensic Applicatons.
194
Fasola, O. S. (2015). Perceptions and acceptance of librarians towards using Facebook and Twitter to promote library services in Oyo State, Nigeria. The Electronic Library, 33(5), 870-882.
195
Claybaugh, C. C., Haried, P., & Yu, W. B. (2015). Diffusion of a Professional Social Network: Business School Graduates in Focus. International Journal of Human Capital and Information Technology Professionals (IJHCITP), 6(4), 80-96.
196
Caldwell, J. M. (2015). Going where students are: comparing faculty and student uses and perceptions of social networking in higher education.
197
Borena, B., Belanger, F., & Egigu, D. (2015, January). Information Privacy Protection Practices in Africa: A Review Through the Lens of Critical Social Theory. In System Sciences (HICSS), 2015 48th Hawaii International Conference on (pp. 3490-3497). IEEE.
198
Larsen, E. S. H., & Seim, G. G. (2015). Entering a Developing Country with a Solar Cooker: Strategies for Start-ups.
199
Jhaveri, R. H., & Patel, N. M. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks, 1-18.
200
Mahajan, N., Bedi, R., & Gupta, S. K. Defending Against Byzantine and Resource Consumption Attacks by Malicious Nodes in MANETs.
201
Mittal, V. (2015). Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach. Prevention, 4(5).
202
Yadav, N. A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks.
203
Sharma, M., & Singla, R. Impact of Jamming Attack in Performance of Mobile Ad hoc Networks.
204
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1.
205
Caselli, M., Zambon, E., & Kargl, F. (2015, April). Sequence-aware Intrusion Detection in Industrial Control Systems. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (pp. 13-24). ACM.
206
Feshki, M. G., Sojoodi, O., & Anvary, M. D. (2015). Managing Intrusion Detection Alerts Using Support Vector Machines. International Journal of Computer Science and Security (IJCSS), 9(5), 266.
207
Anvary, M. D., Feshki, M. G., & Ahrabi, A. A. A. (2015). Efficient Security Alert Management System. International Journal of Computer Science and Security (IJCSS), 9(4), 218.
208
Gunduz, S., Arslan, B., & Demirci, M. (2015, December).A Review of Machine Learning Solutions to Denial-of-Services Attacks in Wireless Sensor Networks. In 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA) (pp. 150-155). IEEE.
209
Chaudhry, M. T., & Sher, M. Secure Group Based Biometric Authentication Approach for Mobile Ad hoc Networks.
210
Padma, T., Pillai, J. S., & Ambili, P. S. Continued Fraction Based Sequences for Content Based Image Authentication.
211
Pillai, J. S., & Padma, T. ParQuoSCI: Pseudorandom Partial Quotient Sequences for Content based Image Authentication.
212
Tazir, M. L., Azouaoui, O., Hazerchi, M., & Brahimi, M. (2015, July). Mobile robot path planning for complex dynamic environments. In Advanced Robotics (ICAR), 2015 International Conference on (pp. 200-206). IEEE.
213
Mobadersany, P., Khanmohammadi, S., & Ghaemi, S. A fuzzy multi-stage path-planning method for a robot in a dynamic environment with unknown moving obstacles. Robotica, 1-17.
214
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1.
215
Anchor, Nafisa, & Abdul race. (2015). Identify phishing websites in internet banking using optimization algorithm inclined pages. Electronic and cyber defense Journal, 3 (1).
216
Idris, M. I. A., Elsid, A. G., & Alhady, M. N. (2015). Enhancement the Ad-hoc On-demand Distance Vector of Network.
217
Elizabeth Jim, L., & Gregory, M. A. (2015, November). State analysis of Mobile Ad Hoc Network nodes. In Telecommunication Networks and Applications Conference (ITNAC), 2015 International (pp. 314-319). IEEE.
218
Yibyeonggwan , and jeongeunhui . (2015) . Efficient wormhole attack detection and removal techniques designed for the safe route on VANET. Security Engineering Research Institute Journal of Security Engineering, 12 (4), 415-426.
219
Bhatta, J., & Pandey, L. P. (2015, December). Performance analysis of various optimization techniques for elliptic curve cryptosystems on resource-constrained devices. In 2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA) (pp. 1-7). IEEE.
220
Zellagui, M., Benabid, R., Boudour, M., & Chaghi, A. (2015). Mixed Integer Optimization of IDMT Overcurrent Relays in the Presence of Wind Energy Farms Using PSO Algorithm. Periodica Polytechnica-Electrical Engineering and Computer Science, 59(1), 7-19.
221
Khurana, M., & Massey, K. (2015). Swarm algorithm with adaptive mutation for airfoil aerodynamic design. Swarm and Evolutionary Computation, 20, 1-13.
222
Neshat, M., & Sepidname, G. (2015). A new hybrid optimization method inspired from swarm intelligence: Fuzzy adaptive swallow swarm optimization algorithm (FASSO). Egyptian Informatics Journal, 16(3), 339-350.
223
Adewumi, A. O., & Arasomwan, M. A. (2015). Improved Particle Swarm Optimizer with Dynamically Adjusted Search Space and Velocity Limits for Global Optimization. International Journal on Artificial Intelligence Tools.
224
Chenshou Wen. (2015) based on the centroid and adaptive inertia weight index improved particle swarm optimization. Computer Engineering and Applications, 51 (5).
225
Chenshou Wen . ( 2015 ) . Based on the centroid and adaptive inertia weight index improved particle swarm algorithm . Journal of Computer Applications , 35 ( 3 ) , 675-679.
226
Kessentini, S., & Barchiesi, D. Particle Swarm Optimization with Adaptive Inertia Weight.Chen, R. M., & Huang, S. C. (2015, August). Particle swarm optimization for scheduling problems by curve controlling based global communication topology. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on (pp. 1716-1720). IEEE.
227
Yang, C. T. (2015). Based on plant location and to adapt to deviate from the value of the governor enhanced particle swarm optimization method . Kung University Thesis Institute of Information Management , 1-60 .
228
Iwasokun, G. B., Udoh, S. S., & Akinyokun, O. K. (2015). Multi-Modal Biometrics: Applications, Strategies and Operations. Global Journal of Computer Science and Technology, 15(2).
229
Mijac, M., & Stapic, Z. (2015, January). Reusability Metrics of Software Components: Survey. In Central European Conference on Information and Intelligent Systems (p. 221). Faculty of Organization and Informatics Varazdin.
230
Mijac, M., & Stapic, Z. (2015, January). Reusability Metrics of Software Components: Survey. In 26th Central European Conference on Information and Intelligent Systems (CECIIS 2015).
231
Mandala, S., Ngadi, M. A., Sharif, J. M., Zahid, M. S. M., & Mohamed, F. (2015). Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks. International Journal of Embedded Systems, 7(3-4), 296-305.
232
Hussain, M. A. (2015). Energy Efficient Intrusion Detection Scheme with Clustering for Wireless Sensor Networks. TELKOMNIKA Indonesian Journal of Electrical Engineering, 15(1), 128-141.
233
masoud Javidi, M., & Aliahmadipour, L. (2015). Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs. Computer Engineering and Applications, 4(1).
234
Samaras, N. S., Kokkinos, K., Chaikalis, C., & Vlachos, V. (2015). On intrusion detection in opportunistic networks. International Journal of Innovation and Regional Development, 6(3), 222-242.
235
Meenatchi, I., & Palanivel, K. An Enhanced Cross layer intrusion detection and adaptive response mechanism for MANETs.
236
EL MOURABIT, Y. O. U. S. E. F., toumanari, a., bouirden, a., & el moussaid, n. a. d. i. a. (2015). a comparative evaluation of intrusion detection techniques in wireless sensor network. journal of theoretical & applied information technology, 76(1).
237
Jacobs, M., Chang, L. C., Pulkkinen, A., & Romano, M. (2015). Automatic analysis of double coronal mass ejections from coronagraph images. Space Weather, 13(11), 761-777.
238
RAVI, M., & basavaprasad, b. a comparative study on segmentation methods for medical imaging.
239
Alimi, I. A., & Aboderin, O. (2015). Enhanced encryption algorithm based on a modified confusion and diffusion scheme. American Journal of Mobile Systems, Applications and Services, 1(1), 20-29.
240
Saqib, Z., Shahid, M. A., & Ashraf, M. U. Encryption and Decryption Using Automata Theory.
241
Gandhi, R. A., & Gosai, A. M. (2015). A Study on Current Scenario of Audio Encryption. International Journal of Computer Applications, 116(7), 13-17.
242
Amounas, f. international journal of engineering sciences & research technology a multi-level approach of elliptic curve cryptosystem for enhanced security of amazigh alphabet using cellular automata.
243
Prasad, M. R. (2015). Improving RGB Data Security with Advance Cryptography Algorithm.
244
Gosai, D. A. M. (2015). International Journal of Computer Applications.
245
Kalidasan, S., & Pandian, P. Available Online through Research Article www. ijptonline. com.
246
Wong, C. H. H. (2015). A study of mobile learning for Guangzhou’s University students.
247
Srivastava, S., & Misra, M. (2015). Tracking technology trajectory through regression modelling: a retrospective techno-analysis. Technology Analysis & Strategic Management, 27(4), 420-436.
248
Sumathi, A., & Sundaram, B. V. (2015). An ANN Approach in Ensuring CIA Triangle using an Energy based Secured Protocol E-AODV for Enhancing the Performance in MANETS. Indian Journal of Science and Technology, 8(34).
249
Das, J., & Das, P. (2015). An Overview of Wireless Ad hoc Networks. International Journal of Advanced Research in Computer Science, 6(1).
250
Naheed, M., Mahmood, H., & Murtza, I. (2015, October). Secure multipath routing using link compromise metric in mobile ad hoc networks. In Electrical Engineering (RAEE), 2015 Symposium on Recent Advances in (pp. 1-5). IEEE.
251
Chauhan, A., Rani, P., & Student, M. T. A Detail Review of Routing Attacks in Mobile Ad Hoc Networks.
252
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1.
253
Jin-peng, Q., Jie, Q., Fang, P., & Tao, G. (2015, July). Multi-channel detection for abrupt change based on the Ternary Search Tree and Kolmogorov statistic method. In Control Conference (CCC), 2015 34th Chinese (pp. 4968-4973). IEEE.
254
Akila, A., & Chandra, E. (2015). Word based tamil speech recognition using temporal feature based segmentation. ictact Journal on Image & Video Processing, 5(4).
255
Ramli, I. (2015). Regular paper Sentence boundary detection without speech recognition: A case of an under-resourced language. J. Electrical Systems, 11(3), 308-318.
256
Das, A. P., & Thampi, S. M. (2015, August). Secure communication in mobile underwater wireless sensor networks. In Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on (pp. 2164-2173). IEEE.
257
Ramezani, H., Fazel, F., Stojanovic, M., & Leus, G. (2015). Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization.
258
Carneiro, J. H. C. C. (2015). localização de emissores acústicos em ambientes submarinos com redes de sensores móveis (doctoral dissertation, universidade federal do rio de janeiro).
259
Dell'Erba, R. (2015). Determination of Spatial Configuration of an Underwater Swarm with Minimum Data. Int J Adv Robot Syst, 12, 97.
260
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1.
261
Emam, M. M., Aly, A. A., & Omara, F. A. A Modified Image Steganography Method based on LSB.
262
Thanekar, S. A. (2015). Eight Pixel Pairs Value Differencing Image Steganography. IJETT, 2(1).
263
Sakthivel, S. M., & Ravi Sankar, A. (2015, February). A VLSI architecture for watermarking of grayscale images using weighted median prediction. In Electronics and Communication Systems (ICECS), 2015 2nd International Conference on (pp. 1128-1131). IEEE.
264
Amsaveni, A., & Vanathi, P. T. (2015). A comprehensive study on image steganography and steganalysis techniques. International Journal of Information and Communication Technology, 7(4-5), 406-424.
265
Deshmukh, M. A. P., & Suralkar, S. R. (2015). Literature Survey-Digital Watermarking on Camera Captured Color Images.
266
Manjula, G. R., & Danti, A. (2015). A novel hash based least significant bit (2-3-3) image steganography in spatial domain. arXiv preprint arXiv:1503.03674.
267
Swain, G., & Lenka, S. K. (2015). A novel steganography technique by mapping words with LSB array. International Journal of Signal and Imaging Systems Engineering, 8(1-2), 115-122.
268
Al-Hada, M., Naser, A. M., & Al-Thamary, M. Hide Image in Image Based on LSB Replacement and Arnold Transform.
269
Tajuddin, T. B., & Manaf, A. A. Forensic Investigation and Analysis on Digital Evidence Discovery through Physical Acquisition on Smartphone.
270
Martin, K. K. (2015). An Investigation of Digital Forensic Models Applicable in the Public Sector (A case of Kenya National Audit Office) (Doctoral dissertation).
271
Lin, T. S., Lin, I. L., & Leu, F. Y. (2015, July). Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015 9th International Conference on (pp. 420-425). IEEE.
272
Rauter, S., Fister, I., & Fister Jr, I. (2015). How to Deal with Sports Activity Datasets for Data Mining and Analysis: Some Tips and Future Challenges. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 7(2), 27-37.
273
Antonio, T., & Paramita, A. S. (2015). Feature Selection Technique Impact for Internet Traffic Classification Using Naïve Bayesian. Jurnal Teknologi, 72(5).
274
Paramita, A. S. (2014). Feature Selection Technique Using Principal Component Analysis For Improving Fuzzy C-Mean Internet Traffic Classification. Australian Basic and Applied Sciences (AJBAS): 2014 International on Engineering Conference on Sciences and Technology Innovation–ISSN: 1997-8178–American-Eurasian Network for Scientific Information (AENSI).
275
Paramita, A. S. (2016). Principal Feature Selection Impact for Internet Traffic Classification Using Naïve Bayes. In Proceedings of Second International Conference on Electrical Systems, Technology and Information 2015 (ICESTI 2015) (pp. 475-480). Springer Singapore.
276
Mayilvaganan, M., & Geethamani, G. S. A Preliminary Survey on Genetic Algorithm Techniques.
277
Persis, D. J., & Robert, T. P. (2015). Ant Based Multi-objective Routing Optimization in Mobile AD-HOC Network. Indian Journal of Science and Technology, 8(9), 875-888.
278
Joardar, S., Bhattacherjee, V., & Giri, D. (2015). SiCaL: a swarm inspired congestion aware probabilistically load balance routing in MANETs. International Journal of Information and Communication Technology, 7(6), 585-606.
279
Sensarma, D. (2015). AQTR: The Ant Based Qos Aware Improved Temporally Ordered Routing Algorithm for Manets. Available at SSRN 2556278.
280
Karthikeyan, P., & Baskar, S. (2015). Genetic algorithm with ensemble of immigrant strategies for multicast routing in Ad hoc networks. Soft Computing, 19(2), 489-498.
281
Cao, M. S., Pan, L. X., Gao, Y. F., Novák, D., Ding, Z. C., Lehký, D., & Li, X. L. Neural network ensemble-based parameter sensitivity analysis in civil engineering systems. Neural Computing and Applications, 1-8.
282
Ravi, V., Koparkar, S., Raju, N. P., & Sridher, S. (2015). Improving retail banking loans recovery via data mining techniques: a case study from Indian market. International Journal of Electronic Customer Relationship Management, 9(2-3), 189-201.
283
Teshnizi, S. H., & Ayatollahi, S. M. T. (2015). A Comparison of Logistic Regression Model and Artificial Neural Networks in Predicting of Student’s Academic Failure. Acta Informatica Medica, 23(5), 296.
284
Senthilkumar, D., & Paulraj, S. Prediction of Low Birth Weight Infants and Its Risk Factors Using Data Mining Techniques.
285
Jain, N., Sharma, A., & Sharma, A. Nav view search.
286
Yunus, N. A. M., & Othman, M. (2015). Reliability Evaluation for Shuffle Exchange Interconnection Network. Procedia Computer Science, 59, 162-170.
287
Gangele, S., & Dongre, A. (2015). Area Estimation for Web Browsing Performance of Users by Applying Numerical Method. International Journal of Computer Applications, 120(9), 6-11.
288
Patidar, B., & Shivhare, R. R. (2015). Detection of Wormhole Attack using Round Trip Time and Node Workload. International Journal of Computer Applications, 112(11).
289
Ramana, V. V., & Reddy, A. R. M. (2015). Secure routing in MANETs: a bio–inspired approach with honey bees. International Journal of Wireless and Mobile Computing, 8(1), 82-89.
290
Lakshmi, A. A., & Valluvan, K. R. (2015). Support vector machine and fuzzy-based intrusion detection and prevention for attacks in MANETs. International Journal of Mobile Network Design and Innovation, 6(2), 63-72.
291
Schoofs, M. HIV VULNERABILITY FOUND via STOCK MARKET ANALYSIS.
292
Singh, N., & Shrivastava, L. (2015). Impact of Antenna model with the variation of speed for Reactive and Hybrid routing protocols in Mobile Ad-Hoc Networks.
293
Rajkumar, B., & Narsimha, G. (2015). Trust-based light weight authentication routing protocol for MANET. International Journal of Mobile Network Design and Innovation, 6(1), 31-39.
294
Sardana, A., Saini, A., Bedwal, T., & Tayal, R. (2015, March). Black hole attack's effect mobile ad-hoc networks (MANET). In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in (pp. 966-970). IEEE.
295
Xiong, X., Feng, J., & Jiang, L. (2015, October). Automatic digital modulation classification for ORS satellite relay communication. In Wireless Communications & Signal Processing (WCSP), 2015 International Conference on (pp. 1-5). IEEE.
296
Hussain, J., Lalmuanawma, S., & Chhakchhuak, L. (2015). A Novel Network Intrusion Detection System Using Two-Stage Hybrid Classification Technique. IJCCER, 3(2), 16-27.
297
Mansouri, m., golsefid, m. t., & nematbakhsh, n. (2015). a hybrid intrusion detection system based on multilayer artificial neural network and intelligent feature selection. cumhuriyet science journal, 36(3), 2686-2692.
298
JAWANJAL, S. D. INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY.
299
Chaczko, Z., Jacak, W., & Luba, T. (2015). Computational Intelligence and Efficiency in Engineering Systems (Vol. 595). G. Borowik (Ed.). Springer.
300
Dhankar, M. (2015). Network Security-Authentication Methods and Firewall. IITM Journal of Management and IT, 6(1), 73-79.
301
Sekulski, R., & Woda, M. (2015). Authorial, Adaptive Method of Users’ Authentication and Authorization. In Computational Intelligence and Efficiency in Engineering Systems (pp. 171-184). Springer International Publishing.
302
Sekulski, R., & Woda, M. (2015). A Novel Approach to Users Authentication and Authorization. Studia Informatica, 36(2), 5-22.
303
Aujla, S., & Ummat, A. Task scheduling in Cloud Using Hybrid Cuckoo Algorithm. International Journal of Computer Networks and Applications (IJCNA), 2(3), 144-150.
304
Mao, Y., Zhong, H., & Li, X. (2015, August). Hierarchical model-based associate tasks scheduling with the deadline constraints in the cloud. In Information and Automation, 2015 IEEE International Conference on (pp. 268-273). IEEE.
305
Neves, D., Lourenco, N., & Horta, N. (2015, September). Scheduling evaluation tasks for increased efficiency of parallel analog IC synthesis. In Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design (SMACD), 2015 International Conference on (pp. 1-4). IEEE.
306
Pop, F., Dobre, C., Cristea, V., Bessis, N., Xhafa, F., & Barolli, L. (2015). Reputation-guided evolutionary scheduling algorithm for independent tasks in inter-clouds environments. International Journal of Web and Grid Services, 11(1), 4-20.
307
Kalra, M., & Singh, S. (2015). A review of metaheuristic scheduling techniques in cloud computing. Egyptian Informatics Journal, 16(3), 275-295.
308
Hashimi, H., Hafez, A., & Mathkour, H. (2015). Selection criteria for text mining approaches. Computers in Human Behavior, 51, 729-733.
309
El-Said, A. M., ELDESOKY, A., & Arafat, H. A. (2015). An Efficient Approach to Construct Object Model of Static Textual Structure with Dynamic Behavior Based on Q-learning. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 31(4), 1267-1289.
310
Priest, B., Vuksani, E., Wagner, N., Tello, B., Carter, K. M., & Streilein, W. W. Agent-Based Decision Support for Moving Target Technology Deployment.
311
Kaur, R., & Prabha, E. C. a novel technique of image steganography.
312
Ujianto, e., harjoko, a., wardoyo, r., & moesriami, a. (2015). cascaded image steganography to increase robustness againts attack of the stego image. journal of theoretical & applied information technology, 79(3).
313
Saputra, D. E., Supangkat, S. H., & Sutikno, S. (2015, November). Review and classification of electronic cash research. In 2015 International Conference on Information Technology Systems and Innovation (ICITSI) (pp. 1-5). IEEE.
314
ESTEDLAL, M. M. (2015). Introduction and Evaluation of Computer Security Incident Response Team (CSIRT) in Organizations. Cumhuriyet Science Journal, 36(6), 246-253.
315
Je, Y. M., You, Y. Y., & Na, K. S. Information Security Evaluation Using Multi-Attribute Threat Index. Wireless Personal Communications, 1-13.
316
AL-Nasrawi, D. A., Almukhtar, A. F., & AL-Baldawi, W. S. (2015). From Arabic Alphabets to Two Dimension Shapes in Kufic Calligraphy Style Using Grid Board Catalog. Communications in Applied Sciences, 3(2).
317
Montasari, R., Peltola, P., & Evans, D. (2015). Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations. In Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security (pp. 83-95). Springer International Publishing.
318
History Xin Ling, & Zheng Shuli . ( 2015 ) . Research and development of network forensics of network security technology and applications, ( 2 ) , 110-111.
319
Wen Min . ( 2015 ) . Design and implementation of information exchange security suite system. Network Security Technology and Application, ( 2 ) , 114-116.
320
Gaber, A. M., Mazen, S., & Hassanei, E. E. (2015). Framework for Integrating Software Project Tasks and Change Requests. International Journal of Computer Applications, 125(12).
321
Al-Azawi, R. K. (2015). Agent Oriented Software Engineering (AOSE) Approach to Game Development Methodology.
322
Faculty of Computer Science And Information Technology - Universiti Putra Malaysia (UPM)
323
Bistouni, F., & Jahanshahi, M. (2014). Improved extra group network: a new fault-tolerant multistage interconnection network. The Journal of Supercomputing, 69(1), 161-199.
324
Vimina, E. R., & Jacob, K. P. (2014). An Evaluation of Image Matching Algorithms for Region Based Image Retrieval. International Journal of Advancements in Computing Technology, 6(6), 75.
325
Sardar, M., Banerjee, S., Majhi, K., & Majumder, K. (2014). Trust Based Network Layer Attacks Prevention in MANET. In Emerging Trends in Computing and Communication (pp. 193-204). Springer India.
326
Sardar, M., & Majumder, K. (2014). A New Trust Based Secure Routing Scheme in MANET. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 321-328). Springer International Publishing.
327
Hassan, W. A., & Rahman, T. A. (2014). Coexistence model for compatibility between IMT-advanced and other wireless communication services. Wireless Personal Communications, 79(3), 2025-2039.
328
Curilem, M., Vergara, J., San Martin, C., Fuentealba, G., Cardona, C., Huenupan, F., Chacón, M., Khan, M. S., Hussein, W. & Yoma, N. B. (2014). Pattern recognition applied to seismic signals of the Llaima volcano (Chile): An analysis of the events' features. Journal of Volcanology and Geothermal Research, 282, 134-147.
329
Curilem, M., Huenupan, F., San Martin, C., Fuentealba, G., Cardona, C., Franco, L., Acuña, G., Chacón, M., (2014). Feature Analysis for the Classification of Volcanic Seismic Events Using Support Vector Machines. In Nature-Inspired Computation and Machine Learning (pp. 160-171). Springer International Publishing.
330
Chaubey, A., Chelladurai, H., Lamba, S. S., (2014). Condition monitoring of rotating shaft using virtual instrumentation" 5th International & 26th All India Manufacturing Technology, Design and Research Conference (AIMTDR 2014), pp. 557-(1-6). IIT Guwahati, Assam, India.
331
Adly, F., Yoo, P. D., Muhaidat, S., & Al-Hammadi, Y. (2014, May). Machine-Learning-Based Identification of Defect Patterns in Semiconductor Wafer Maps: An Overview and Proposal. In Parallel & Distributed Processing Symposium Workshops (IPDPSW), 2014 IEEE International (pp. 420-429). IEEE.
332
Hussien, N. S., Sulaiman, S., & Shamsuddin, S. M. (2014). A Review of Intelligent Methods for Pre-fetching in Cloud Computing Environment. In Recent Advances on Soft Computing and Data Mining (pp. 647-656). Springer International Publishing.
333
Selvakumar, L., Vivekanandan, K., & Amilan, S. (2014). New Linkage Learning Technique in Genetic Algorithm for Stock Selection Problem. International Journal of Advanced Research in Computer Science, 5(3).
334
Gautam, G., & Yadav, D. (2014, August). Sentiment analysis of twitter data using machine learning approaches and semantic analysis. In Contemporary Computing (IC3), 2014 Seventh International Conference on (pp. 437-442). IEEE.
335
Suresh Joseph, K. (2014). Genetic algorithm based hybrid imputation model for software effort estimation.
336
Khan, R. A. (2014). Machine Learning: Techniques and Application. Artificial Intelligent Systems and Machine Learning, 6(5), 169-175.
337
Spamers, A. J., & Grobler, H. Real-time Face Detection and Tracking from a Non-static Video Camera.
338
Chung, S. H., Robertson, S., Minnaar, A., Cook, M., & Sun, L. (2014, January). Developing a Knowledge Management System Using an Ontological Approach in Global Organization. In ICISO (pp. 340-347).
339
Yuan, Y., Chen, D., Li, Y., Yu, D., Yan, L., & Zhu, Z. (2014). The improved Shark Search Approach for Crawling Large-scale Web Data. International Journal of Multimedia & Ubiquitous Engineering, 9(8).
340
Khanbary, L. M. O., & Vidyarthi, D. P. (2014). Agent-based energy constrained channel allocation in mobile computing using GA. International Journal of Wireless and Mobile Computing, 7(4), 388-399.
341
Gaber, S. M. A., & Sumari, P. (2014). Predictive and content-aware load balancing algorithm for peer-service area based IPTV networks. Multimedia tools and applications, 70(3), 1987-2010.
342
Banafar, H., & Sharma, S. Secure Cloud Environment Using Hidden Markov Model and Rule Based Generation.
343
Sarhan, A., Elmogy, A. M., & Ali, S. M. (2014, December). New Web cache replacement approaches based on internal requests factor. In Computer Engineering & Systems (ICCES), 2014 9th International Conference on (pp. 383-389). IEEE.
344
Venketesh, P. (2014). New approaches in web prefetching to improve content access by end users.
345
Aswini, S., & Sundaram, G. S. (2014). Web cache memory compression for optimizing performance in web browsers.
346
Bhatnagar, U., & Gahlout, A. A Modern Way of Framework Design for the Client Side Web Caching and Prefetching Technique.
347
ShanmugaSundaram, G., & Aswini, S. Web cache memory compression for optimizing the performance in web browsers.
348
Konate, K., & Abdourahime, G. A. Y. E. (2014). Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks. Compusoft, 3(12), 1425.
349
Praveena, M., Thiribhurabhavan, R. M., Bhavadharini, R. M., & Karthik, D. S. (2014). An Enhanced Adaptive Security Protocol For Replica Attacks In Mobile Adhoc Networks. International Journal of software and hardware Research in Engg, 2(5), 79-83.
350
Kadu, A. A., & S Nagdive, A. (2014). “Real-Time 3D Game Using Sixth Sense and Haptic Technology”: A Review. IJRCCT, 3(1), 042-047.
351
Dhule, C., & Nagrare, T. (2014, April). Computer Vision Based Human-Computer Interaction Using Color Detection Techniques. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on (pp. 934-938). IEEE.
352
Bhatia, S. M., & Sharma, A. K. (2014). Fuzzy Quality Function Deployment and Software Engineering-A Literature Review. Software Engineering and Technology, 6(6), 159-168.
353
?icleanu, O. A. (2014). Nonlinear analysis on elliptic curves subspaces with cryptographic applications. Annals of the University of Craiova-Mathematics and Computer Science Series, 41(2), 292-299.
354
Imran, K., Mahfooz, S., Rauf, A., & Khusro, S. (2014). Enhanced Authentication Scheme for Proxy Mobile IPv6. Life Science Journal, 11(3s).
355
Shukla, D., & Verma, K. (2014). Bounded Area Estimation Using Simpson 3/8 Rule in Traffic Sharing Scenario in Computer Network.
356
Gangele, S., Verma, K., & Shukla, D. (2014). Bounded Area Estimation of Internet Traffic Share Curve. International Journal of Computer Science and Business Informatics (IJCSBI), 10(1), 54-67.
357
Tu, M. H. (2014). A method in a meaningful candidate styles mining image library of styles frequently . Sun Yat-sen Institute of Information Engineering Thesis , 1-102.
358
?icleanu, O. A. (2014). Nonlinear analysis on elliptic curves subspaces with cryptographic applications. Annals of the University of Craiova-Mathematics and Computer Science Series, 41(2), 292-299.
359
Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14(6), 10081-10106.
360
Babrahem, A. S., Alharbi, E. T., Alshiky, A. M., Alqurashi, S. S., & Kar, J. (2014). Study of the Security Enhancements in Various E-Mail Systems. Journal of Information Security, 6(01), 1.
361
Zhu, H., Hao, X., & Sun, Y. Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant.
362
Babrahem, A. S., Alharbi, E. T., Alshiky, A. M., Alqurashi, S. S., & Kar, J. Scientific Research Publishing.
363
Varsaki, E. E., Fotopoulos, V., & Skodras, A. N. (2014). A discrete Gould transform data hiding scheme. Mathematical Methods in the Applied Sciences, 37(2), 283-288.
364
Othman, J. A. (2014). Steganographic scheme to avoid statistical Steganalysis. J. Of College Of Education For Women, 25(1).
365
Bagade, A. M. (2014). A High Quality Steganographic Method Using Morphing. Journal of information processing systems, 10(2), 256-270.
366
Azaminezhad, M. S., & Bidgoli, A. M. (2014). A new high capacity steganography based on bit-inverting method in DWT domain. Journal of Advanced Computer Science & Technology, 3(2), 169-178.
367
Mandal, P. C. (2014). A study of Steganography Techniques using Discrete Wavelet Transform. Journal of Global Research in Computer Science, 5(5), 7-14.
368
aldeen najim Alzubaidy, D. (2014). Paper of Nagham. pdf.
369
Usha, B. A., Srinath, N. K., Nanjangud, N. C. A., Deshpande, A. M., & Rebello, A. (2014). A Survey on Secure and High Capacity Image Steganography Techniques. International Journal of Advanced Research in Computer and Communication Engineering, 2(3).
370
Abdullah, K. A., Al-Jawad, N., & Abdulla, A. A. (2014, May). Effect of using different cover image quality to obtain robust selective embedding in steganography. In SPIE Photonics Europe (pp. 913808-913808). International Society for Optics and Photonics.
371
Desmukh, P. R., & Rahangdale, B. (2014). Hash Based Least Significant Bit Technique For Video Steganography. International Journal of Engineering Research and Applications (IJERA), 4(1).
372
Kumar, S., Gupta, A., Chandwani, A., Yadav, G., & Swarnkar, R. (2014, September). RGB image watermarking on video frames using DWT. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 675-680). IEEE.
373
Alam, I., Khusro, S., Rauf, A., & Zaman, Q. (2014). Conducting surveys and data collection: From traditional to mobile and SMS-based surveys. Pakistan Journal of Statistics and Operation Research, 10(2), 169-187.
374
Kale, N. A., Natikar, S. B., & Karande, S. M. (2014). Secured Mobile Messaging for Android application.
375
Aprilianto, M., & Abdurohman, M. (2014, April). Improvement Text Compression Performance Using Combination of Burrows Wheeler Transform, Move to Front, and Huffman Coding Methods. In Journal of Physics: Conference Series (Vol. 495, No. 1, p. 012042). IOP Publishing.
376
Shaker, S. H., Jeiad, H. A., & Hassan, F. A. Propose a Model for Securing SMS.
377
Deshmukh, S. P., & Naware, A. M. Mobile Money: M-payment System for India.
378
LaRusic, J., & Punnen, A. P. (2014). The asymmetric bottleneck traveling salesman problem: Algorithms, complexity and empirical analysis. Computers & Operations Research, 43, 20-35.
379
Ahmed, Z. H. (2014). A data-guided lexisearch algorithm for the quadratic assignment problem. Indian Journal of Science and Technology, 7(4), 480-490.
380
Swiercz, A., Burke, E. K., Cichenski, M., Pawlak, G., Petrovic, S., Zurkowski, T., & Blazewicz, J. (2014). Unified encoding for hyper-heuristics with application to bioinformatics. Central European Journal of Operations Research, 22(3), 567-589.
381
Magare, S. S., Gedam, Y. K., Randhave, D. S., & Deshmukh, R. R. (2014). Character Recognition of Gujarati and Devanagari Script: A Review.
382
Magare, S. S., & Deshmukh, R. R. (2014). Offline Handwritten Sanskrit Character Recognition Using Hough Transform and Euclidean Distance. International Journal of Innovation and Scientific Research ISSN, 2351-8014.
383
Mendapara, M. B., & Goswami, M. M. (2014, March). Stroke identification in Gujarati text using directional feature. In Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on (pp. 1-5). IEEE.
384
El Korbi, I., & Zeadally, S. (2014). Energy-aware sensor node relocation in mobile sensor networks. Ad Hoc Networks, 16, 247-265.
385
Anil, M. C., & Shirbahadurkar, S. D. (2014, February). Speech modification for prosody conversion in expressive Marathi text-to-speech synthesis. In Signal Processing and Integrated Networks (SPIN), 2014 International Conference on (pp. 56-58). IEEE.
386
Banerjee, S., Sardar, M., & Majumder, K. (2014, January). Aodv based black-hole attack mitigation in manet. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 345-352). Springer International Publishing.
387
Gopalakrishnan, S., & Ganeshkumar, P. (2014). Intrusion detection in mobile ad hoc network using secure routing for attacker identification protocol. American Journal of Applied Sciences, 11(8), 1391.
388
Silwal, S., & Sharma, A. (2014). A new Security approach for integrating wireless adhoc network using octant bit computation and routing test. IJSEAT, 2(6), 154-157.
389
Banerjee, S., & Majumder, K. (2014). wormhole attack mitigation in manet: a cluster based avoidance technique. International Journal of Computer Networks & Communications, 6(1), 45.
390
Abomhara, M., & Koien, G. M. (2014, May). Security and privacy in the Internet of Things: Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on (pp. 1-8). IEEE.
391
Garg, G., Kaushal, S., & Sharma, A. (2014). Behavioural Study of Reactive Protocols with Wormhole Attack in Mobile ADHOC Networks. Journal of Emerging Technologies in Web Intelligence, 6(4), 445-455.
392
Sivagurunathan, S., & Prathapchandran, K. (2014, January). Trust and cluster based authentication schemes in mobile Ad Hoc networks—A review. In Power Signals Control and Computations (EPSCICON), 2014 International Conference on (pp. 1-5). IEEE.
393
Tamizarasu, k., kalpana, a., & rajaram, M. (2014). maliciousness in mobile ad hoc networks: a performance evaluation. Journal of Theoretical & Applied Information Technology, 65(3).
394
Patil, K. T., & Patil, M. E. (2014). Study of Attacks in MANET, Attacks on AES, Cryptographically Generated Addresses (CGAs) Methods and Possible Alleviation in IPV6 over MANET Area. International Journal of Computer Applications, 96(1).
395
Kirubakaran, N., & Kathirvel, A. (2014). Performance Improvement of Security Attacks in Wireless Mobile Ad Hoc Networks. Asian Journal of Information Technology, 13(2), 68-76.
396
Dureja, A., & Dahiya, V. (2014). performance evaluation of collaborative attacks in manet.
397
Jasim, S. I. (2014). pcf investigation to improve the performance of tora-based manet against jamming attacks. International Journal of Computer Science and Engineering Survey, 5(3), 17.
398
Guo, C., Xu, H., Ju, L., Jia, Z., & Xu, J. (2014, September). A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on (pp. 156-163). IEEE.
399
Sivagurunathan, S., & Prathapchandran, K. (2014, March). Trust Based Security Schemes in Mobile Ad Hoc Networks-A Review. In Intelligent Computing Applications (ICICA), 2014 International Conference on (pp. 291-295). IEEE.
400
Sardar, M., Banerjee, S., Majhi, K., & Majumder, K. (2014). Trust Based Network Layer Attacks Prevention in MANET. In Emerging Trends in Computing and Communication (pp. 193-204). Springer India.
401
Vaibhav, A. (2014). Security in Monitoring Schemes: A Survey. arXiv preprint arXiv:1411.5213.
402
Samanta, C. K., Hota, M. K., Nayak, S. R., Panigrahi, S. P., & Panigrahi, B. K. (2014). Energy management in hybrid electric vehicles using optimized radial basis function neural network. International Journal of Sustainable Engineering, 7(4), 352-359.
403
Kodali, R. K., & Boppana, L. (2014, September). FPGA implementation of energy efficient multiplication over GF (2 m) for ECC. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 1815-1821). IEEE.
404
Anagreh, M., Samsudin, A., & Omar, M. A. (2014). Parallel Method for Computing Elliptic Curve Scalar Multiplication Based on MOF. International Arab Journal of Information Technology (IAJIT), 11(6).
405
Abdulrazeg, A. A., Norwawi, N. M., & Basir, N. (2014, October). Extending V-model practices to support SRE to build secure web application. In Advanced Computer Science and Information Systems (ICACSIS), 2014 International Conference on (pp. 213-218). IEEE.
406
Chawla, D., & Kaur, M. (2014). System & Web based Modeling for Secure Software Development. International Journal of Computer Technology and Applications, 5(1), 257.
407
Moedjiono, s., rifai, a., & mantoro, t. (2014). a robust steganography approach with high embedding capacity using unique value embedding and codebook. Journal of Theoretical & Applied Information Technology, 66(1).
408
Doshi, J. C., Christian, M., & Trivedi, B. H. (2014). SQL FILTER–SQL Injection prevention and logging using dynamic network filter. In Security in Computing and Communications (pp. 400-406). Springer Berlin Heidelberg.
409
Manimegalai, R. (2014). Efficient joint compression and encryption techniques for video data.
410
Kansal, A., & Singh, Y. Survey on Machine Learning Techniques for Event Detection in Wireless Sensor Networks.
411
Medany, I., Shazly, M., & El-Sherbiny, M. G. (2014). Expert-Based-Computer Aided Design and Component Selection for Dust Collection Systems. International Journal of Scientific Research in Environmental Sciences, 2(1), 14.
412
Mehrasa, M., Zaker, S. R., Larki, B., Mehmandoust, M., Baghshahi, H., Sekhavati, M. H., & Gavanji, S. (2014). Computational Prediction and Analysis of Interaction of Silver Nitrate with Peptidoglycan-Associated lipoprotein (Pal). International Journal of Scientific Research in Environmental Sciences, 2(1), 8.
413
Kotenko, I., & Chechulin, A. Fast Network Attack Modeling and Security Evaluation based on Attack Graphs. Journal of Cyber Security, 3(1), 27-46.
414
Parul, M., & Rohil, H. (2014). Optimized Image Steganography using Discrete Wavelet Transform (DWT). International Journal of Recent Development in Engineering and Technology (IJRDET), 2(2), 75-81.
415
Nag, A., Singh, J. P., Biswas, S., Sarkar, D., & Sarkar, P. P. (2014). A Huffman Code Based Image Steganography Technique. In Applied Algorithms (pp. 257-265). Springer International Publishing.
416
Zan, M. M., & Aye, N. (2014). Implementation of Secure Steganography System Based on DWT in RGB Color Channel. IJCCER, 2(3), 114-118.
417
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication.
418
Azaminezhad, M. S., & Bidgoli, A. M. (2014). A new high capacity steganography based on bit-inverting method in DWT domain. Journal of Advanced Computer Science & Technology, 3(2), 169-178.
419
Mandal, P. C. (2014). A study of Steganography Techniques using Discrete Wavelet Transform. Journal of Global Research in Computer Science, 5(5), 7-14.
420
Kalami, A. (2014). A modified robust and effective algorithm with mathematical calculation for minutiae detection. Physical Sciences Research International, 2(1), 1-5.
421
Jana, B., Mondal, S. K., Jana, S., & Giri, D. (2014, February). Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach. In Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on (pp. 319-324). IEEE.
422
Garg, S., & Mathur, M. (2014, February). Chaotic map based steganography of gray scale images in wavelet domain. In Signal Processing and Integrated Networks (SPIN), 2014 International Conference on (pp. 689-694). IEEE.
423
REZA, W. (2014). Implementasi Slantlet Transform (SLT) dan Huffman Coding pada Steganografi Citra Grayscale. Skripsi, Fakultas Ilmu Komputer.
424
Thanikaiselvan, V., Arulmozhivarman, P., Chakrabarty, S., Agarwal, A., Subashanthini, S., & Amirtharajan, R. (2014). Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13(16), 2534.
425
Nag, A., Singh, J. P., Biswas, S., Sarkar, D., & Sarkar, P. P. (2014, January). A Huffman Code Based Image Steganography. In Applied Algorithms: First International Conference, ICAA 2014, Kolkata, India, January 13-15, 2014. Proceedings (Vol. 8321, p. 257). Springer..
426
Goel, S., Kumar, P., & Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator.
427
Nuri, S. A Modified Robust and Effective Algorithm with Mathematical Calculation for Minutiae Detection.
428
Madiavale, B. A. (2014). Information security management practices and organizational goals: a study of microfinanace organizations in Nairobi (Doctoral dissertation, University of Nairobi).
429
Peng, B., & Li, L. (2014). Combination of Genetic Algorithm and Ant Colony Optimization for QoS Multicast Routing. In Soft Computing in Artificial Intelligence (pp. 49-56). Springer International Publishing.
430
Prayudi, Y., Ashari, A., & Priyambodo, T. K. (2014). Digital Evidence Cabinets: A Proposed Frameworks for Handling Digital Chain of Custody. Int. J. Comput. Appl, 109(9), 30-36.
431
Saleem, S., Popov, O., & Bagilli, I. (2014). Extended abstract digital forensics model with preservation and protection as umbrella principles. Procedia Computer Science, 35, 812-821.
432
Rahman, A. F. A., Ahmad, R., & Mohamad, M. Z. (2014). Developing Forensic Readiness Secure Network Architecture for Wireless Body Area Network (WBAN). International Journal of Security and Its Applications, 8(5), 403-420.
433
Bera, A., Bhattacharjee, D., & Nasipuri, M. (2014). Hand Biometrics in Digital Forensics. In Computational Intelligence in Digital Forensics: Forensic Investigation and Applications (pp. 145-163). Springer International Publishing.
434
Malik, N. M. N. A., Yahya, S., & Abdullah, M. T. (2014). Critical Phases in Network Forensics-A Review. In The International Conference on Digital Security and Forensics (DigitalSec2014) (pp. 68-75). The Society of Digital Information and Wireless Communication.
435
Tonellotto, M. (2014). Evidenza informatica, computer forensics e best practices. Rivista di Criminologia, Vittimologia e Sicurezza, 8(2), 68-103.
436
Akosu, N., & Selamat, A. (2014). Incorporating Language Identification in Digital Forensics Investigation Framework. In Computational Intelligence in Digital Forensics: Forensic Investigation and Applications (pp. 63-78). Springer International Publishing.
437
Solinas, F. (2014). Technical and legal perspectives on forensics scenario.
438
Dlamini, M., Venter, H., Eloff, J., & Eloff, M. (2014, March). Requirements for Preparing the Cloud to Become Ready for Digital Forensic Investigation. In 13th European Conference on Cyber Warfare and Security ECCWS-2014 The University of Piraeus Piraeus, Greece (p. 242).
439
Bai, J., & Pu, T. C. (2014, May). Online Data Compression Technique for Real Time Data of Energy Management System in the Industrial Production. In Applied Mechanics and Materials (Vol. 519, pp. 70-73).
440
Pu, T., & Bai, J. (2014, May). An auto regression compression method for industrial real time data. In Control and Decision Conference (2014 CCDC), The 26th Chinese (pp. 5129-5132). IEEE.
441
Garba, A. M., & Zirra, P. B. Analysing Forward Difference Scheme on Huffman to Encode and Decode Data Losslessly.
442
Bharathi, K., & Vijaylakshmi, C. Optimization for Flexible Job Shop Scheduling by Evolutionary Representation.
443
Vignesh, B. (2014). Pipelined Quadratic Equation Based Novel Multiplication Method for Cryptographic Applications. Indian Journal of Science and Technology, 7(4), 34-39.
444
Chickerur, S., Rayudu, D. M. K., Hiriyannaiah, S., & Shabalina, O. (2014). Performance Analysis of Alternative Open Source Parallel Computing Approach to OpenMP on Multicore Processors. In Knowledge-Based Software Engineering (pp. 466-476). Springer International Publishing.
445
Lee, J. D., Im, H. J., Kang, W. M., & Park, J. H. (2014). Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices. Mathematical Problems in Engineering, 2014.
446
Mobhani, A. B., & Mishra, S. K. (2014). Diffusion of Cipher Blocks at Bit Level in Parallel AES to Improve Bit–Ratio Test thus Increasing Cryptanalysis Complexity.
447
Kumar, C., Dutta, S., & Chakborty, S. (2014, March). Musical cryptography using genetic algorithm. In Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference on (pp. 1742-1747). IEEE.
448
Sharma, R. S., Hiranwal, S., & Goyal, D. Analysis & Design Of Hybrid Cryptography Using Moving Image.
449
Sharma, R. S., Hiranwal, S., & Goyal, D. Analysis & Design Of Hybrid Cryptography Using Moving Image.
450
Jiji, G. W., Lakshmi, V. S., Lakshmi, K. V., & Priya, S. S. (2014). Diagnosis and Prognosis of the Arbovirus-Dengue using Intelligent Algorithm. Journal of The Institution of Engineers (India): Series B, 1-6.
451
Kang, Y. J., Ha, Y. R., & Lee, S. J. (2014). Microfluidic-based measurement of erythrocyte sedimentation rate for biophysical assessment of blood in an in vivo malaria-infected mouse. Biomicrofluidics, 8(4), 044114.
452
Opoku-Ansah, J., Eghan, M. J., Anderson, B., & Boampong, J. N. (2014). Wavelength Markers for Malaria (Plasmodium Falciparum) Infected and Uninfected Red Blood Cells for Ring and Trophozoite Stages. Applied Physics Research, 6(2), p47.
453
Kirongo, N. N. (2014). A Video Conferencing Security Framework For Synchronous Elearning (Doctoral dissertation).
454
El Mekawy, M., AlSabbagh, B., & Kowalski, S. (2014). The Impact of Business-IT Alignment on Information Security Process. In HCI in Business (pp. 25-36). Springer International Publishing.
455
Banerjee, C., & Banerjee, A. it security practices in an organization: balancing technology and management perspective. editorial board chief bebefactor, 495, 506.
456
Radouane, M., Messoussi, R., Touahni, R., & Boujiha, T. (2014, April). Robust method of digital image watermarking using SVD transform on DWT coefficients with optimal block. In Multimedia Computing and Systems (ICMCS), 2014 International Conference on (pp. 255-260). IEEE.
457
Wahaballa, A., Wahballa, O., Li, F., Ramadan, M., & Qin, Z. (2014). Multiple-Layered Securities Using Steganography and Cryptography. International Journal of Computers and Applications, 36(3), 93-100.
458
Thiruvengatanadhan, R., & Dhanalakshmi, P. (2014). A Fuzzy C-Means based GMM for Classifying Speech and Music Signals. International Journal of Computer Applications, 102(5).
459
Ramalingam, T., & Dhanalakshmi, P. (2014). Speech/music classification using wavelet based feature extraction techniques. Journal of Computer Science, 10(1), 34-44.
460
Pol, K. (2014). Image steganography based on DWT using Huffman LWZ Encoding. Int J Eng Tech Res, 2(3), 100-103.
461
Rajput, P., Arya, S., Kumari, S., & Lehana, P. (2014). Qualitative and quantitative analysis of non-uniform dark images. Advances in Image and Video Processing, 2(1), 23-34.
462
Thanikaiselvan, V., Arulmozhivarman, P., Chakrabarty, S., Agarwal, A., Subashanthini, S., & Amirtharajan, R. (2014). Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13(16), 2534.
463
Kaur, H., & Goyal, E. D. (2014). Performance Enhancement of a Transform Domain Based Steganographic Technique Using Segmentation.
464
Basatini, F. M., & Chinipardaz, R. (2014). Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting. Journal of Data Science, 12, 563-574.
465
Shibata, S. I., Sato, F., Kimura, H., & Oyabu, T. (2014). Evaluating Abnormal Condition in Physiological Disorder Using a Fluctuation Characteristic of Plant Bioelectric Potential. Sensors and Materials, 26(7), 483-493.
466
George, R., & Manimekalai, M. A. P. (2014, February). A novel approach for image compression using zero tree coding. In Electronics and Communication Systems (ICECS), 2014 International Conference on (pp. 1-5). IEEE.
467
Ortega-Corral, C., Palafox, L. E., García-Macías, J. A., Sánchez-García, J., & Aguilar, L. (2014). End-to-end message exchange in a deployable marine environment hierarchical wireless sensor network. International Journal of Distributed Sensor Networks, 2014.
468
Mafra, P. M., Fraga, J. S., & Santin, A. O. (2014). Algorithms for a distributed IDS in MANETs. Journal of Computer and System Sciences, 80(3), 554-570.
469
Azzawi, A. L. H. M. (2014). Enhancing The Encryption Process Of Advanced Encryption Standard (AES) By Using Proposed Algorithm To Generate S-Box. Journal of Engineering and Development, 18(2).
470
Kaul, V., Choudhari, P., & Narayankhedkar, S. K. (2014, September). Security enhancement for data transmission in 4G networks. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 373-378). IEEE.
471
Das, S., Zaman, J. S. U., & Ghosh, R. (2014). Study of Randomness in AES Ciphertexts Produced by Randomly Generated S-Boxes and S-Boxes with Various Modulus and Additive Constant Polynomials. Journal of The Institution of Engineers (India): Series B, 1-16.
472
Dara, M., & Manochehri, K. (2014). Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES. Information Security Journal: A Global Perspective, 23(1-2), 1-9.
473
Choudhari, P., Kaul, V., & Narayankhedkar, S. K. Security Enhancement Algorithms for Data Transmission in 4G Networks.
474
Kaur, N., & Behal, S. Audio Steganography Using LSB Edge Detection Algorithm.
475
Akhtar, M., Khusru, A., Usmani, A., & Sahoo, G. (2014). Nontransitive Ranking to Enhance Routing Decision in MANETS. arXiv preprint arXiv:1407.5385.
476
Patil, S., & Borade, D. (2014). Dynamic Cluster Based Intrusion Detection Architecture to Detect Routing Protocol Attacks in MANET. Sensor Netw Data Commun, 3(116), 2.
477
Rueda, J. S. R., & Bautista, D. R. (2014). análisis forense digital en dispositivos móviles. Revista de Semilleros de Investigación, 1(1).
478
Kasiaras, D., Zafeiropoulos, T., Clarke, N., & Kambourakis, G. (2014, December). Android forensics: Correlation analysis. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for (pp. 157-162). IEEE.
479
Cusack, B., & Lutui, R. (2014). Up-dating investigation models for smart phone procedures.
480
Mumba, E. R., & Venter, H. S. (2014, August). Mobile forensics using the harmonised digital forensic investigation process. In Information Security for South Africa (ISSA), 2014 (pp. 1-10). IEEE.
481
NK, P. J. K. (2014). an overview of mobile phone forensics. global journal of multidisciplinary studies, 4(1).
482
Shrivastava, G., & Gupta, B. B. (2014, October). An Encapsulated Approach of Forensic Model for digital investigation. In Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on (pp. 280-284). IEEE.
483
Morrell, C., Ransbottom, J. S., Marchany, R., & Tront, J. G. (2014, December). Scaling IPv6 address bindings in support of a moving target defense. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for (pp. 440-445). IEEE.
484
Victor, A. (2014). Splice Zerocopy System optimization using dual pipe schemes (Doctoral dissertation, TELKOM UNIVERSITY).
485
Wei, J., Zhihong, T., Chao, C., & Bei, G. (2014). Bottleneck analysis for data acquisition in high-speed network traffic monitoring. Communications, China, 11(1), 110-118.
486
Eisfeld, A. (2014). Entwurf und Analyse von Konzepten zur effizienten Datenübertragung von Grafikrendering-Befehlen auf eingebetteten Systemen.
487
Ali Tandra, S., & Rizvi, S. M. (2014). Security for Cloud Based Services.
488
Latif, R., Abbas, H., & Assar, S. (2014). Distributed denial of service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review. Journal of medical systems, 38(11), 1-10.
489
Kumar Shridhar, N. G. (2014). A Prevention of DDos Attacks in Cloud Using Honeypot. International Journal of Science and Research, 3(11), 2378-2383.
490
Aishwarya, R., & Malliga, S. (2014, April). Intrusion detection system-An efficient way to thwart against Dos/DDos attack in the cloud environment. In Recent Trends in Information Technology (ICRTIT), 2014 International Conference on (pp. 1-6). IEEE.
491
Dupin-Bryant, P. A., & Olsen, D. H. (2014). Business Intelligence, Analytics And Data Visualization: A Heat Map Project Tutorial. International Journal of Management & Information Systems (IJMIS), 18(3), 185-200.
492
Tarek, M., Ouda, O., & Hamza, T. (2014). Tokenless Cancelable Biometric Templates Based on Hetroassociation Neural Network. International Journal of Biometrics and Bioinformatics (IJBB), 8(2), 8.
493
Shiri, S., Anvari, A., & Soltani, H. An Assessment of Readiness Factors for Implementing ERP Based on Agility (Extension of Mckinsey 7s Model).
494
Ghafoor, I., Jattalai, I., Durranit, S., & Ch, M. T. Analysis of OpenSSL Heartbleed Vulnerability for Embedded Systems.
495
Sharvani, C. S. (2014). Development of Swarm Intelligent Systems for MANET: ACO based routing in MANETs for effective communication.
496
Sheta, A. F., Kassaymeh, S., & Rine, D. Estimating the Number of Test Workers Necessary for a Software Testing Process Using Artificial Neural Networks.
497
Rao, P. S., Rao, K. V., Varma, P. S., & Kim, T. H. (2014). Programming Evaluation Process Using Hybrid Cost Estimation Model. International Journal of Software Engineering and Its Applications, 8(10), 55-64.
498
KUMAR, M. S., & RAJAN, B. C. (2014).Experimental evaluation of fuzzy-based function point analysis for software effort estimation. Journal of Theoretical & Applied Information Technology, 67(2).
499
Kumar, G., & Bhatia, P. K. (2014).Automation of software cost estimation using neural network technique. International Journal of Computer Applications, 98(20).
500
Kalinic, z., arsovski, s., arsovski, z., & rankovic, v. The effectiveness and students’ perception of an adaptive mobile learning system based on personalized content and mobile web. Stanislaw juszczyk, 43.
501
Karadimce, a., & davcev, d. (2014, october). Collaborative cloud service model for delivering multimedia content in mcloud. In collaborative computing: networking, applications and worksharing (collaboratecom), 2014 international conference on (pp. 469-474). Ieee.
502
Hashim, Y. E., Osman, A., & El-Gelany, A. (2014). Mobile Technology and Education: Theoretical Study.
503
Chouarfia, M. Y. A. (2014). SCAE: Software Component Assembly Evaluation.
504
Thapar, S. S., Singh, P., & Rani, S. (2014). Reusability-based quality framework for software components. ACM SIGSOFT Software Engineering Notes, 39(2), 1-5.
505
Sampath, S., Nanjesh, B. R., Sagar, B. B., & Subbaraya, C. K. (2014, February). Performance optimization of PVM based parallel applications using optimal number of slaves. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on (pp. 388-392). IEEE.
506
Abebe, H. (2014). Predicting Infant Immunization Status in Ethiopian (Doctoral dissertation, AAU).
507
Ibrahim, M. H. (2014). Realizing Sender’s Deniability in Public Key Encryption via Random Coins Isolation. European Journal of Scientific Research, 119(2), 177-187.
508
Biedermann, S., Ruppenthal, T., & Katzenbeisser, S. (2014, July). Data-centric phishing detection based on transparent virtualization technologies. In Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on (pp. 215-223). IEEE.
509
Emilin, S. C. (2014). Detecting And Preventing Phishing Websites Dppws.
510
Chawla, M., & Chouhan, S. S. (2014). A Survey of Phishing Attack Techniques. International Journal of Computer Applications, 93(3).
511
Zeydan, h. z., & selamat, m. s. (2014).current state of anti-phishing approaches and revealing competencies. journal of theoretical and applied information technology, 70(3).
512
Philip, C., Paulus, R., & Ashok, A. (2014). Comparative Analysis of Adhoc Routing Protocols in Wi-Fi & Wi Max Networks using QualNet 6.1. International Journal of Current Engineering and Technology, 4(1).
513
Sadek, M. M., Khalifa, A. S., & Mostafa, M. G. (2014). Video steganography: a comprehensive review. Multimedia Tools and Applications, 1-32.
514
Kelash, H. M., Wahab, O. F. A., Elshakankiry, O. A., & El-sayed, H. S. (2014). Utilization of Steganographic Techniques in Video Sequences. International Journal of Computing and Network Technology, Sys, 2, 17-24.
515
Othman, J. A. (2014). Steganographic scheme to avoid statistical Steganalysis. J. Of College Of Education For Women, 25(1).
516
Al-Dmour, H., Al-Ani, A., & Nguyen, H. (2014, August). An efficient steganography method for hiding patient confidential information. In Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE (pp. 222-225). IEEE.
517
Agrawal, A., & Borikar, D. A. (2014). An approach to video steganography using novel substitution technique.
518
Kaur, S., Kaur, A., & Singh, K. (2014). A Survey of Image Steganography. IJRECE, 2(3), 102-105.
519
Priyanka, B. G., & Sathyanarayana, S. V. (2014, November). A steganographic system for embedding image and encrypted text. In Contemporary Computing and Informatics (IC3I), 2014 International Conference on (pp. 1351-1355). IEEE.
520
Praneeta, G., & Pradeep, B. (2014, January). Security Analysis of Digital Stegno Images Using Genetic Algorithm. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 277-283). Springer International Publishing.
521
Juneja, M. (2014). High Capacity and Statistical Attacks Resistant Reversible Image Data Hiding Scheme using LSB Substitution. International Journal of Computer Applications, 92(12).
522
Juneja, M. (2014). High Capacity Information Hiding System for Encrypted Text Message Using Pixel Intensity Based LSB Substitution Technique. International Journal of Computer Science Issues (IJCSI), 11(2), 159.
523
aldeen najim Alzubaidy, D. (2014). Paper of Nagham. pdf.
524
Bhalchandra, B. D., Bhatnagar, V., Tomer, R., Singh, R., Saran, S. S., Asadullah, M., ... & Khan, S. Safety and Concealing Information Utilizing Combinatorial Data Hiding Proficiencies.
525
Zahedinia, M. S., & Ahmadi, H. (2014). Color Image Steganography Method based on Difference between Pixel Values in Tri-direction. Majlesi Journal of Multimedia Processing, 3(3).
526
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication.
527
Nashier, N., & Singhrova, A. An Steganography Implementation Based Upon Improved LSB Technique.
528
Agrawal, A., & Borikar, D. A. A Novel Approach to Video Steganography using Secured Multi-Channel Substitution.
529
Shinde, P., Palmal, A., & Singh, R. Digital Image Steganography-Then, Now & Analysis of its Techniques.
530
Ahmed, Z. H. (2014). Comparison of data hiding using LSB and DCT for image (Doctoral dissertation, Universiti Tun Hussein Onn Malaysia).
531
Mehndiratta, A. Publication Procedure Topics.
532
Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., & Okediran, O. O. Performance Assessment of an Enhanced Crystographic Model for Secure E-Voting.
533
Khosla, S., & Kaur, P. Secure Data Hiding Technique Using Video Steganography and Watermarking-A Review.
534
Mostaghim, M., & Boostani, R. (2014, September). CVC: Chaotic visual cryptography to enhance steganography. In Information Security and Cryptology (ISCISC), 2014 11th International ISC Conference on (pp. 44-48). IEEE.
535
Sahu, M. (2014). Review of Image Steganography Techniques in Cloud Security.
536
Ramalingam, M., & Isa, N. A. M. (2014, October). A steganography approach for sequential data encoding and decoding in video images. In Computer, Control, Informatics and Its Applications (IC3INA), 2014 International Conference on (pp. 120-125). IEEE.
537
Senaratne, H., Gunatilaka, P., Gamage, S., Gunarathna, U., & Vithana, Y. Information Hiding with Steganography.
538
Ali, A. A., Abdellateef, B. A., & Seddik, A. H. (2014). Enhancing the Security of SMMWB Image Steganography Technique by using the Linked List structure (Cover Package Method). International Journal of Computer Applications, 90(7).
539
Molaei Kermani, and., Amir Masoud, honest, & Abrahymnzhad. (2014). Blind steganography based on Reed-Solomon codes and the substitution optimized embedded with improved payload and resistance. Journal of Electrical Engineering, University of Tabriz, 43 (2), 43-59.
540
Dhondge, K., Choi, B. Y., Song, S., & Park, H. (2014, August). Optical Wireless authentication for smart devices using an onboard ambient light sensor. In Computer Communication and Networks (ICCCN), 2014 23rd International Conference on (pp. 1-8). IEEE.
541
Xiong, J., Xiong, J., & Claramunt, C. (2014, November). A spatial entropy-based approach to improve mobile risk-based authentication. In Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis (p. 3). ACM.
542
vongsingthong, s., & boonkrong, s. (2014). a survey on smartphone authentication. walailak journal of science and technology (wjst), 12(1), 1-19.
543
Young stars, & Peng Xinguang. (2014) A lightweight one-time password authentication scheme. Small Computer Systems, 35 (008), 1808-1811.
544
Koneru, A. (2014). Knowledge Extraction from Work Instructions through Text Processing and Analysis.
545
Montero, C. (2014). Cost aware real time big data processing in Cloud Environments (Doctoral dissertation, The University of Melbourne).
546
Parsania, V. S., Jani, N. N., & Bhalodiya, N. H. Applying Naïve bayes, BayesNet, PART, JRip and OneR Algorithms on Hypothyroid Database for Comparative Analysis.
547
Babatunde, I. G. Review and Evaluation of Fingerprint Singular Point Detection Algorithms.
548
Iwasokun, G. B., & Akinyokun, O. C. False Minutiae’Impact on Fingerprint Matching.
549
Babatunde, I. G., Lange, M. J., Charles, A. O., & Olumuyiwa, D. J. (2014, August). Experimental study of thumbprint-based authentication framework for ATM machines. In Science and Information Conference (SAI), 2014 (pp. 505-514). IEEE.
550
Bifari, E. N., & Elrefaei, L. (2014, September). Automated Fingerprint Identification System based on weighted feature points matching algorithm. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 2212-2217). IEEE.
551
Akinyokun Oluwole, C., Alese Boniface, K., & Iwasokun Gabriel, B. (2014). Fingerprint Matching Using Spatial Characteristics. In Proceedings of the World Congress on Engineering (Vol. 1).
552
Iwasokun, G. B., Akinyokun, O. C., & Dehinbo, O. J. (2014). Fingerprint Matching Using Features Mapping. In Proceedings of the World Congress on Engineering and Computer Science (Vol. 1).
553
Iwasokun, G. B., & Ojo, S. O. (2014). Review and Evaluation of Fingerprint Singular Point Detection Algorithms. British Journal of Applied Science & Technology, 4(35), 4918.
554
Babatunde, I. G., Charles, A. O., & Olusegun, O. S. (2014). An Investigation into the Impact of False Minutiae Points on Fingerprint Matching. International Journal of Database Theory and Application, 7(3), 159-178.
555
Iwasokun, G. B., Akinyokun, O. C., & Angaye, C. O. (2014). Spatial Relation Approach to Fingerprint Matching. In Intelligent Systems for Science and Information (pp. 87-110). Springer International Publishing.
556
Yadav, V., & Aggarwaal, P. (2014). A Survey on Security in Cloud Computing.
557
Owusu, E., Zhan, Y., & Mao, Q. R. (2014). A neural-AdaBoost based facial expression recognition system. Expert Systems with Applications, 41(7), 3383-3390.
558
Sun, W., Halevy, A., Benedetto, J. J., Czaja, W., Li, W., Liu, C., ... & Wang, R. (2014). Nonlinear dimensionality reduction via the ENH-LTSA method for hyperspectral image classification. Selected Topics in Applied Earth Observations and Remote Sensing, IEEE Journal of, 7(2), 375-388.
559
Sun, W., Halevy, A., Benedetto, J. J., Czaja, W., Liu, C., Wu, H., ... & Li, W. (2014). UL-Isomap based nonlinear dimensionality reduction for hyperspectral imagery classification. ISPRS Journal of Photogrammetry and Remote Sensing, 89, 25-36.
560
Owusu, E., Zhan, Y. Z., & Mao, Q. R. (2014). An SVM–AdaBoost-based face detection system. Journal of Experimental & Theoretical Artificial Intelligence, 26(4), 477-491.
561
Kishore, B., Rana, V. L., Manikantan, K., & Ramachandran, S. (2014, December). Face recognition using Gabor-Feature-based DFT shifting. In Industrial and Information Systems (ICIIS), 2014 9th International Conference on (pp. 1-8). IEEE.
562
Biswas, A., Ghose, M. K., & Pandit, M. (2014). Comparison of Different Neural Network Architectures for Classification of Feature Transformed Data for Face Recognition. International Journal of Computer Applications, 96(12).
563
Makinde, A. S., Nkansah-Gyekye, Y., & Laizer, L. S. (2014). Enhancing the Accuracy of Biometric Feature Extraction Fusion Using Gabor Filter and Mahalanobis Distance Algorithm. arXiv preprint arXiv:1407.6748.
564
Biswal, M. S. (2014). Feature Extraction of Face Using Various Techniques (Doctoral dissertation, National Institute of Technology Rourkela).
565
Gupta, B. Performance Comparison of Various Face Detection Techniques.
566
Awati, J. S. (2014). Application of wireless sensor networks for agricultural parameter control.
567
Sahu, R. A., & Saraswat, V. (2014). Secure and Efficient Scheme for Delegation of Signing Rights. In Information and Communications Security (pp. 258-273). Springer International Publishing.
568
Demarinis, F., Accettura, A., Garzia, F., & Cusani, R. (2014, October). Automatic security system for recognizing unexpected motions through video surveillance. In Security Technology (ICCST), 2014 International Carnahan Conference on (pp. 1-5). IEEE.
569
Nayak, C., & Pradhan, S. Adaptive Filtering for Linear System Identification by Different Variants of LMS.
570
Eke, H. N., & Odoh, N. J. (2014). The Use of Social Networking Sites among the Undergraduate Students of University of Nigeria, Nsukka. Library Philosophy and Practice, 0_1.
571
Zhang, Y., & Rau, P. L. P. (2014). User Adoption and Loyalty of Location Based Social Network Service in China. In Cross-Cultural Design (pp. 392-402). Springer International Publishing.
572
Eke Miss, H. N., Obiora, C., & Odoh Miss, J. N. (2014). The Use of Social Networking Sites among the Undergraduate Students of University of Nigeria, Nsukka.
573
TIJJANI, H. (2014). adoption of improved pearl millet production practices by farmers in borno state, nigeria (Doctoral dissertation, USMANU DANFODIYO UNIVERSITY, SOKOTO).
574
yatigammana, m., johar, d. m. g. m., & gunawardhana, c. Impact of Innovations Attributes on e-learning Acceptance among Sri Lankan Postgraduate Students.
575
Yatigammana, K., Johar, M. G. M., & Gunawardhana, C. (2014). comparison of e-learning acceptance among postgraduate students in sri lanka and malaysia. Journal of South Asian Studies, 2(2), 165-176.
576
Madahi, A., & Sukati, I. (2014). Examining online and brick and mortar store channels switching behaviour among Malaysian consumers. International Journal of Electronic Marketing and Retailing, 6(2), 128-163.
577
Abdelrehim, S. H. M. O. (2014). The diffusion of edublogs among educators in Egypt.
578
Aligol, M., & Mohammadbeigi, A. (2014). Doctors tend to investigate the private sector to contribute to the family physician. Journal of Qom, 8 (1).
579
Mahajan, N., Bedi, R., & Gupta, S. K. A Survey on Detection of Byzantine and Resource Consumption Attacks.
580
Khan, A., Shrivastava, S., & Richariya, V. (2014, January). Normalized Worm-hole Local Intrusion Detection Algorithm (NWLIDA). In Computer Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-6). IEEE.
581
Bayeva, Z. Detection and Containment the Attack that Leads to a Denial of Service Attack.
582
Masdari, M., & Bakhtiari, F. C. (2014). Alert Management System using K-means Based Genetic for IDS. International Journal of Security and Its Applications, 8(5), 109-118.
583
Kumar, R., Verma, P., & Singh, Y. (2014). Review of MANET Protocols and Introduction of a New Optimized Routing Scheme using Evolutionary Algorithms and Analytical Hierarchy Process. Wireless Communication, 6(4), 161-171.
584
Sodagudi, S., & Rao, D. K. R. (2014). Behavior based Anomaly detection technique to identify Multilayer attacks. International Journal, 2(5).
585
Padma, T., & Pillai, J. S. (2014). Image Watermarking using PQ Sequences.
586
Gholami, S., & Bashirzadeh, R. (2014). A new effective algorithm for on-line robot motion planning. Decision Science Letters, 3(1), 121-130.
587
Padma, T., & Pillai, J. S. (2014). Image Watermarking using PQ Sequences.
588
Belaidi, H., Bentarzi, H., Belaidi, A., & Hentout, A. (2014). Terrain Traversability and Optimal Path Planning in 3D Uneven Environment for an Autonomous Mobile Robot. Arabian Journal for Science and Engineering, 39(11), 8371-8381.
589
Jothi, M. S., & Chandrasekaran, M. Fuzzy Based Optimal Clustering Protocol for Maximizing Lifetime in WSN.
590
Zhaoliu Rong, Shu Mei E, & Zhong Weijun. (2014). Virtual private networks, and intrusion detection systems analyze the optimal allocation of Game Strategies Management Engineering, (4), 187-192.
591
Behdad, M. (2014). Application of Learning Classifier Systems to Fraud Detection Problem (Doctoral dissertation, University of Western Australia).
592
Emilin, S. C. (2014). Detecting And Preventing Phishing Websites Dppws.
593
Varughese, N. M. (2014). collaborative network security management system based on association mining rule. ictact journal on soft computing, 4(4).
594
Singh, G., Kumar, N., & Verma, A. K. (2014). Antalg: An innovative aco based routing algorithm for manets. Journal of Network and Computer Applications, 45, 151-167.
595
Musau, F., Wang, G., & Abdullahi, M. B. (2014). Group formation with neighbor similarity trust in P2P E-commerce. Peer-to-Peer Networking and Applications, 7(4), 295-310.
596
Fouchal, H., Hunel, P., & Ramassamy, C. (2014). Towards efficient deployment of wireless sensor networks. Security and Communication Networks.
597
Mohsin, R., & Woods, J. (2014, September). Performance evaluation of MANET routing protocols in a maritime environment. In Computer Science and Electronic Engineering Conference (CEEC), 2014 6th (pp. 1-5). IEEE.
598
Shegokar, M. S., & Tuteja, M. R. Performance Evaluation of AODV and DSR Routing Protocols for Random Speed Mobility and Intensity Model in MANET Using NS2.
599
Natarajan, E., & Devi, L. (2014). Cross Layer Based Energy Aware Routing and Congestion Control Algorithm in MANET.
600
Ratnaparkhi, V., Patidar, P., & Rawat, M. K. (2014). Implementation of Hybrid Algorithm for Mobility and Routing Issues in MANET. International Journal of Computer Applications, 98(4).
601
Harpal, S. K., & Singh, G. Comparative Performance of MANET Routing Protocols at varying Speed in Different Traffic Patterns.
602
Kaur, A. K. A., & Kaur, A. Improving Node Stability Using Hotspot Algorithm in Mobile Ad-hoc Network.
603
Dhaliwal, B. S., & Malhotra, R. Comparative Appraise and Future Perspectives of Reactive and Proactive Routing Protocols in Manets.
604
Borade, J. L., Mishra, B. K., & Bansode, R. Performance Analysis of LLECLAIR versus AODV in wireless networks.
605
Malathy, E. M., & Muthuswamy, V. (2014, December). Vertical handover performance investigation with discrete event system simulation in next generation wireless network. In Advanced Computing (ICoAC), 2014 Sixth International Conference on (pp. 220-223). IEEE.
606
Arasomwan, A. M., & Adewumi, A. O. (2014). An investigation into the performance of particle swarm optimization with various chaotic maps. Mathematical Problems in Engineering, 2014.
607
Arya, M., Deep, K., & Bansal, J. C. (2014). A nature inspired adaptive inertia weight in particle swarm optimisation. International Journal of Artificial Intelligence and Soft Computing 13, 4(2-3), 228-248.
608
Alrabady, L. A. Y. (2014). An online-integrated condition monitoring and prognostics framework for rotating equipment.
609
Adewumi, A. O., & Arasomwan, A. M. (2014). An improved particle swarm optimiser based on swarm success rate for global optimisation problems. Journal of Experimental & Theoretical Artificial Intelligence, (ahead-of-print), 1-43.
610
Gu, J., & Shi, X. (2014, July). An adaptive PSO based on motivation mechanism and acceleration restraint operator. In Evolutionary Computation (CEC), 2014 IEEE Congress on (pp. 1328-1336). IEEE.
611
Mandil, P., & Mishra, A. MINIMIZATION OF THD IN CASCADE MULTILEVEL INVERTER USING WEIGHT IMPROVED PARTICLE SWARM OPTIMIZATION ALGORITHM.
612
Chen, R. M., & Huang, H. T. (2014, August). Particle Swarm Optimization Enhancement by Applying Global Ratio Based Communication Topology. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on (pp. 443-446). IEEE.
613
Lopez , C. E. M. ( 2014 ) . Search parameters particle swarm optimization solver for constraint satisfaction problems.
614
Babu, K. R., & Sunitha, K. V. N. (2014). An effective hybrid technique for image enhancement through Genetic Algorithm-morphological operations. International Journal of Signal and Imaging Systems Engineering, 7(2), 83-91.
615
Raut, S. D., & Humbe, V. T. (2014). An Approach to Boundary Extraction of Palm Lines and Vein Pattern. International Journal of Image, Graphics and Signal Processing (IJIGSP), 6(12), 47.
616
Babatunde, I. G., Charles, A. O., & Olusegun, O. S. (2014). An Investigation into the Impact of False Minutiae Points on Fingerprint Matching. International Journal of Database Theory and Application, 7(3), 159-178.
617
Babatunde, I. G. Review and Evaluation of Fingerprint Singular Point Detection Algorithms.
618
Karthikeyini, C., Rajamani, V., & Bommanna Raja, K. (2014). Exploring fingerprints using composite minutiae descriptors to determine hereditary relation across multiple generations. International Journal of Biomedical Engineering and Technology, 15(3), 224-242.
619
Chin, R. K. Y., & Lim, J. F. (2014). Fingerprint Recognition Using a Hybrid of Minutiae-and Image-Based Matching Techniques. International Journal of Simulation--Systems, Science & Technology, 15(2).
620
Iwasokun, G. B., & Akinyokun, O. C. False Minutiae’Impact on Fingerprint Matching.
621
Iwasokun, G. B., & Ojo, S. O. (2014). Review and Evaluation of Fingerprint Singular Point Detection Algorithms. British Journal of Applied Science & Technology, 4(35), 4918.
622
Saleh, A. M. A. M. (2014). Enhanced Secure Algorithm for Fingerprint Recognition. arXiv preprint arXiv:1402.4936.
623
Kalia, A., & Sood, S. characterization of reusable software components for better reuse.
624
Al-Khazraji, S. H. A. A. Effect of Creating Dll Libraries in Software Reusable Components.
625
Al-tarawneh, f. h. a framework for cots software evaluation and selection for cots mismatches handling and non-functional requirements.
626
Reddy, J. M., & Prasad, S. V. A. V. Quality Focus of Software Layered Technology using Analytic Hierarchy Process: A Case Study.
627
Kalia, A., & Sood, S. Component Based Software Reusability and Framing Standards for Components to be Reused.
628
Elkamchouchi, H. M., & Hassan, M. (2014). Array pattern synthesis approach using a genetic algorithm. Microwaves, Antennas & Propagation, IET, 8(14), 1236-1240.
629
Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4).
630
Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4).
631
Rocabado, S. (2014). Caso de estudio de comunicaciones seguras sobre redes móviles ad hoc (Doctoral dissertation, Facultad de Informática).
632
Pattnaik, O., & Pattanayak, B. K. (2014). Security in vehicular ad hoc network based on intrusion detection system. American Journal of Applied Sciences, 11(2), 337.
633
Ponsam, J. G., & Srinivasan, R. (2014). Multilayer intrusion detection in MANET. International Journal of Computer Applications, 98(20).
634
Vimal, S. (2014). An energy efficient intrusion detection system in MANET for secure routing and clustering (Doctoral dissertation).
635
Saraireh, S., Al-Sbou, Y., & Alsmadi, O. (2014). Image Encryption Scheme Based on Filter Bank and Lifting. Int'l J. of Communications, Network and System Sciences, 2014.
636
Gowraj, N., Avireddy, S., & Prabhu, S. SDI-ON: Secure Digital Images over the Network.
637
Osho, O., Zubair, Y. O., Ojeniyi, J. A., & Osho, L. O. a simple encryption and decryption system.
638
Singh, V., Dhiman, H., & Khatkar, M. (2014). a comprehensive study of time complexity of various encryption algorithms. international journal of advances in engineering & technology, 7(2), 495.
639
Ashik, M. H. M., & Vydehi, M. S. Secure Symmetric Key Algorithm [SSKA] For Information Exchange Using Modulo.
640
Mushtaque, M. A., & Singh, M. K. Feasibility Evaluation of Symmetric Key Encryption Techniques for Wireless Channel and Disk Storage. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2.
641
Singh, S., Kumar, A., Shaw, D. K., & Ghosh, D. (2014, February). Script separation in machine printed bilingual (Devnagari and Gurumukhi) documents using morphological approach. In Communications (NCC), 2014 Twentieth National Conference on (pp. 1-5). IEEE.
642
Aparna, R. R., & Radha, R. (2014). Script Identification In Trilingual Indian Documents. International Journal of Image Processing (IJIP), 8(4), 178.
643
ISA, N. A. N. B. M. (2014). language use on twitter among malaysian l2 speakers (doctoral dissertation, university of malaya kuala lumpur).
644
Butt, A. J., Butt, N. A., Butt, R. G., & Ikram, M. T. (2014, January). Predicting Mobile Subscriber’s Behaviour from Contextual Information Extraction: SMS Data. In Neural Information Processing (pp. 661-672). Springer International Publishing.
645
Sasitharan, D. (2014). An empirical investigation of smartphone technology acceptance among Universiti Utara Malaysia students (Doctoral dissertation, Universiti Utara Malaysia).
646
Nicol, E., Dunlop, M., Komninos, A., McGee-Lennon, M., Baillie, L., Edwards, A., ... & Mulder, I. (2014, September). Re-imagining commonly used mobile interfaces for older adults. In Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services (pp. 585-588). ACM.
647
Gilad Gressel, H. P., Surendran, K., Thara, S., & Aravind, A. Ensemble Learning Approach for Author Profiling.
648
Arunkumar, R., & Annalakshmi, A. (2014). A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET. International Journal of Computer Applications, 85(8).
649
VinothKumar, K., & Rajaram, A. (2014). An Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks. IJCSNS, 14(12), 66.
650
Cangea, O. (2014). Cryptographic Protocol for Wireless Networks Security. Petroleum-Gas University of Ploiesti Bulletin, Technical Series, 66(2).
651
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for Manets. Middle-East Journal of Scientific Research, 22(1), 91-98.
652
Deka, S., & Khaturia, M. Performance Analysis of DYMO Routing Protocol under Wormhole Attack in MANET.
653
Pandian, A., & Sadiq, M. A. K. (2014). Authorship categorization in email investigations using fisher's linear discriminant method with radial basis function. Journal of Computer Science, 10(6), 1003.
654
Qi, J. P., Zhang, Q., Zhu, Y., & Qi, J. (2014). A Novel Method for Fast Change-Point Detection on Simulated Time Series and Electrocardiogram Data. PloS one, 9(4), e93365.
655
Jamil, N., Ramli, M. I., Abu Bakar, Z., & Seman, N. (2014, January). Prosody-based sentence boundary detection of spontaneous speech. In Intelligent Systems, Modelling and Simulation (ISMS), 2014 5th International Conference on (pp. 311-317). IEEE.
656
Qi, J. P., Zhang, Q., Qi, J., & Zhu, Y. (2014). A Fast Method for Abrupt Change Detection from Large-Scale Electrocardiogram (ECG) Time Series. In Service Science and Knowledge Innovation (pp. 420-429). Springer Berlin Heidelberg.
657
Jin-peng, Q., Qing, Z., Fang, P., & Jie, Q. (2014, July). A fast method for change point detection from large-scale time series based on Haar Wavelet and Binary Search Tree (HWBST). In Control Conference (CCC), 2014 33rd Chinese (pp. 506-511). IEEE.
658
Han, G., Qian, A., Zhang, C., Wang, Y., & Rodrigues, J. J. (2014). Localization algorithms in large-scale underwater acoustic sensor networks: a quantitative comparison. International Journal of Distributed Sensor Networks, 2014.
659
Ramezani, H., Fazel, F., Stojanovic, M., & Leus, G. (2014). Collision Tolerant Packet Scheduling for Underwater Acoustic Localization. arXiv preprint arXiv:1404.3881.
660
Kulhandjian, H., & Melodia, T. (2014, September). A low-cost distributed networked localization and time synchronization framework for underwater acoustic testbeds. In Underwater Communications and Networking (UComms), 2014 (pp. 1-5). IEEE.
661
Rao, P. M., & Raju, G. S. N. (2014). International Journal of Advanced Research in Computer Science and Software Engineering. International Journal, 4(12).
662
Swain, G. (2014). Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science and Technology, 7(9), 1444-1450.
663
Kachare, H., & Deshmukh, M. Metamorphic Cryptography: A Fusion of Cryptography and Steganography. International Journal of Engineering and Technical Research (IJETR), 2.
664
Venkatesh, K., Shah, S. S. M., Narasimhan, D., Krishnan, R. B., & Raajan, N. R. (2014). A Crypto-Stego Based Approach for Secured Key Transfer. International Journal of Applied Engineering Research, 9(19), 5679-5687.
665
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication.
666
Wai, Z., & Than, S. Data Hiding Technique Depended on Pseudorandom Sequences.
667
Leng, H. S. (2014) information hidden research - using perfect square , mixing with minimal distortion and edge detection function modulus of Information Management Thesis Chaoyang University of Technology , 1-64.
668
Aldasouqi, I., & Salameh, W. A. (2014). Using GIS in Designing and Deploying Wireless Network in City Plans.
669
Bikov, D., Bouyuklieva, S., & Stojanova, A. (2014). Wireless network security and cracking security key.
670
Farjamfar, A., Abdullah, M. T., Mahmod, R., & Udzir, N. I. (2014). A review on mobile device's digital forensic process models. Res. J. Applied Sci. Eng. Technol, 8, 358-366.
671
Agbele, K. K. (2014). Context-awareness for adaptive information retrieval systems (Doctoral dissertation, University of the Western Cape).
672
Molaei Kermani , a. , Amir Masoud , mahr , & Abrahymnzhad . (2014 ) . Blind steganography based on Reed-Solomon codes and tables substituted with improved payload optimized embedded and resistance. Journal of Electrical Engineering , University of Tabriz , 43 ( 2 ) , 43-59.
673
Finsterbusch, M., Richter, C., Rocha, E., Muller, J. A., & Hanssgen, K. (2014). A survey of payload-based traffic classification approaches. Communications Surveys & Tutorials, IEEE, 16(2), 1135-1156.
674
Ghaffari, M., & Ghadiri, N. (2014). Ambiguity-Driven Fuzzy C-Means Clustering: How to Detect Uncertain Clustered Records. arXiv preprint arXiv:1409.2821.
675
Suryaputra, A., Samopa, F., & Hindayanto, B. C. (2014). klasterisasi dan analisis trafik internet menggunakan fuzzy c mean dengan ekstraksi fitur data. jurnal informatika, 12(1), 33-39.
676
Paramita, A. S., Samopa, F., & Hindayanto, B. C. (2014). Klasterisasi dan Analisis Trafik Internet Menggunakan Fuzzy C Mean Dengan Ekstraksi Fitur Data.
677
Babu, K. R., & Sunitha, K. V. N. (2014). An effective hybrid technique for image enhancement through Genetic Algorithm-morphological operations. International Journal of Signal and Imaging Systems Engineering, 7(2), 83-91.
678
Barai, A. K. Performance Based Association Rule-Mining Technique Using Genetic Algorithm. algorithms, 1, 2.
679
Asha, T., Natarajan, S., & Murthy, K. N. B. (2014). optimization of association rules for tuberculosis using genetic algorithm. international journal of computing, 12(2), 151-159.
680
Abubacker, N. F., Azman, A., Doraisamy, S., Murad, M. A. A., Elmanna, M. E. M., & Saravanan, R. (2014). Correlation-Based Feature Selection for Association Rule Mining in Semantic Annotation of Mammographic Medical Images. In Information Retrieval Technology (pp. 482-493). Springer International Publishing.
681
Zhao, D. (2014). International Journal of" Computing" Research Institute of Intelligent Computer Systems Ternopil National Economic University. Computing, 13(2).
682
Soundararajan, S. (2014). Multipath congestion control schemes for mobile ad hoc networks.
683
Joardar, S., Giri, D., & Bhattacherjee, V. (2014). Probabilistic Approach-Based Congestion-Aware Swarm-Inspired Load-Balancing Multipath Data Routing in MANETs. In Intelligent Computing, Networking, and Informatics (pp. 409-421). Springer India.
684
Knappstein-Hamelink, S. (2014). Network Discovery in a Recursive Internet Network Architecture (Doctoral dissertation, TU Delft, Delft University of Technology).
685
Singh, G. (2014). Design and Development of ACO Routing Protocol for MANETs (Doctoral dissertation, THAPAR UNIVERSITY, PATIALA).
686
Archana, S., & Saravanan, N. P. (2014, April). Biologically inspired QoS aware routing protocol to optimize lifetime in Sensor Networks. In Recent Trends in Information Technology (ICRTIT), 2014 International Conference on (pp. 1-6). IEEE.
687
Singh, G., Kumar, N., & Verma, A. K. (2014). ANTALG: An Innovative ACO based Routing Algorithm for MANETs. Journal of Network and Computer Applications, 45, 151-167.
688
Shial, R. K., Reddy, K. H. K., & Gouda, B. S. (2014, January). Finding a Trusted and Shortest Path Mechanism of Routing Protocol for Mobile Ad Hoc Network. In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol I (pp. 311-320). Springer International Publishing.
689
Tan, S., Sok, P., & Kim, K. (2014). Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET. International Journal of Networked and Distributed Computing, 2(2), 100-107.
690
Gupta, A., & Gupta, A. K. (2014). A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks. Global Journal of Computer Science and Technology, 14(1-E), 23.
691
Hatzivasilis, G., Papaefstathiou, I., & Manifavas, C. (2014, November). ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks. In Computer Systems and Applications (AICCSA), 2014 IEEE/ACS 11th International Conference on (pp. 56-63). IEEE.
692
Pradeep, P. V., & Harika, C. (2014). Detecting Adversary Location in Mobile Sensor Networks. International Journal of Research, 1(11), 1011-1022.
693
Sharma, R., & Singla, B. An Introduction to MANETS.
694
Sharma, R., & Singla, B. Comparison of AOMDV With and Without Black Hole Attack.
695
BAKILER, H. IMPROVEMENT OF PERFORMANCE AND CAPACITIES OF WIRELESS AD HOC NETWORKS.
696
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for MANETs. Journal of Convergence Information Technology, 9(6), 210.
697
Enshaei, M., Hanapi, Z. M., & Othman, M. (2014). A review: Mobile Ad Hoc Networks challenges, attacks, security, vulnerability and routing protocols. International Journal on Communications Antenna and Propagation (IRECAP), 4(5), 168-179.
698
Hassan, A., Ahsan, S., Alshomrani, S., & Alshamrani, A. (2014). Packet Travel Time based Mechanism for Detection and Mitigation against Wormhole Attack in AODV for MANETs. Life Science Journal, 11(10s).
699
Hassan, A., & Radenkovic, M. (2014, August). Simulation of security attacks and preventions on AODV protocol in ns-3. In Innovative Computing Technology (INTECH), 2014 Fourth International Conference on (pp. 158-163). IEEE.
700
Barkouzos, T. (2014). Security in Ad Hoc networks.
701
Enshaei, M., Hanapi, Z. M., & Othman, M. (2014). Vulnerability and Routing Protocols.
702
Aggarwal, A., Gandhi, S., Chaubey, N., Tada, N., & Trivedi, S. (2014). NDTAODV: Neighbor Defense Technique for Ad Hoc On-Demand Distance Vector (AODV) to mitigate flood attack in MANETS. arXiv preprint arXiv:1405.6216.
703
Aligol, M., & Mohammadbeigi, A. (2014). Studying the tendency of the private sector to participate in family medicine doctors . Journal of Qom University of Medical Sciences , 8 ( 1 ).
704
Abuadlla, Y., Kvascev, G., Gajin, S., & Jovanovic, Z. (2014). Flow-based anomaly intrusion detection system using two neural network stages. Computer Science and Information Systems, 11(2), 601-622.
705
Choi, Y. B., Sershon, C., Briggs, J., & Clukey, C. Survey of Layered Defense, Defense in Depth and Testing of Network Security.
706
ONUwA, O. B. (2014). Improving Network Attack Alarm System: A Proposed Hybrid Intrusion Detection System Model.
707
Hameed, S. M., & Rashid, O. F. Intrusion Detection Approach Based on DNA Signature.
708
Mgabile, T. (2014). Network intrusion detection system using neural networks approach in networked biometrics system (Doctoral dissertation).
709
Chan, G. Y., Lee, C. S., & Heng, S. H. (2014). Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules. Applied Soft Computing, 24, 142-157.
710
Kachurka, P., & Golovko, V. (2014). fusion of recirculation neural networks for real-time network intrusion detection and recognition. international Journal of Computing, 11(4), 383-390.
711
Sethuramalingam, S., & Naganathan, E. R. A Fuzzy Model for Network Intrusion Detection.
712
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for MANETs. Journal of Convergence Information Technology, 9(6), 210.
713
Sekulski, R., & Woda, M. (2014). Adaptive method of users authentication and authorisation. In Proceedings of the 2nd Asia-Pacific Conference on Computer-Aided System Engineering, APCASE (pp. 10-12).
714
van Eekelen, W., van den Elst, J., & Khan, V. J. (2014). Dynamic layering graphical elements for graphical password schemes. Creating the Difference, 65.
715
Shrivastava, A., & Rizvi, M. A. (2014). Network Security Analysis Based on Authentication Techniques.
716
Vasile, M. A., Pop, F., Tutueanu, R. I., Cristea, V., & Kolodziej, J. (2014). Resource-aware hybrid scheduling algorithm in heterogeneous distributed computing. Future Generation Computer Systems.
717
Singh, S., & Kalra, M. (2014, November). Scheduling of Independent Tasks in Cloud Computing Using Modified Genetic Algorithm. In Computational Intelligence and Communication Networks (CICN), 2014 International Conference on (pp. 565-569). IEEE.
718
Sharma, A., Singh, N., Hans, A., & Kumar, K. (2014, November). Review of task scheduling algorithms using genetic approach. In Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of (pp. 169-172). IEEE.
719
Kara, N., Soualhia, M., Belqasmi, F., Azar, C., & Glitho, R. (2014). Genetic-based algorithms for resource management in virtualized IVR applications. Journal of Cloud Computing, 3(1), 1-18.
720
YUSUF, A. B. (2014). application of genetic algorithm in modeling university admission decision support system (doctoral dissertation).
721
Patel, P. S. (2014). Multi-Objective Job Scheduler using Genetic Algorithm in Grid Computing. International Journal of Computer Applications, 92(14).
722
Kang, Y., Zhang, Y., Lin, Y., & Lu, H. (2014). An Improved Ant Colony System for Task Scheduling Problem in Heterogeneous Distributed System. In Computer Engineering and Networking (pp. 83-90). Springer International Publishing.
723
Pan Yang, Qiu Jianlin, Yang Na, Biancai Feng, & Lu Pengcheng. (2014). Multiprocessor task scheduling algorithm based on tabu search. Computer Engineering and Design, 35 (12), 4186-4190.
724
Kadhim, A. I., Cheah, Y. N., & Ahamed, N. H. (2014, December). Text Document Preprocessing and Dimension Reduction Techniques for Text Document Clustering. In Artificial Intelligence with Applications in Engineering and Technology (ICAIET), 2014 4th International Conference on (pp. 69-73). IEEE.
725
Goel, S., Kumar, P., & Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator.
726
Angaitkar, A. V., Shekokar, N., & Maurya, M. The Countering the XDoS Attack for Securing the Web Services.
727
Wu Xindong, Li Yadong, & Hu Donghui. (2014). Evidence of the social network. Journal of Software, 25 (12).
728
Rahman, A. F. A., Mohamad, M. Z., Ahmad, R., & Malaysia, C. (2014). Preventive and Detective Mechanism for Forensic Readiness Secure Network Architecture for WBAN.
729
Rahim, N., Wahab, W. A., Idris, Y. I., & Kiah, L. M. Digital Forensics: An Overview of the Current Trends.
730
Liu, Y., Li, C., & Liu, W. (2014). Integrated solution for timely delivery of customer change requests: A case study of using devops approach. International Journal of U-and E-Service Science and Technology, 7(2), 41-50.
731
Kamalzaman, S. N. A., Mohamad, S. M. S., & Sulaiman, S. (2014). Managing Modification Requests in Web Applications: A Systematic Literature Review. International Journal of Software Engineering and Technology, 1(1).
732
Mellado, D., Mouratidis, H., & Fernández-Medina, E. (2014). Secure Tropos framework for software product lines requirements engineering. Computer Standards & Interfaces, 36(4), 711-722.
733
Keerthi, T. (2014). Distilling Mobile Privacy Requirements from Qualitative Data (Doctoral dissertation, The Open University).
734
Tamrakar, S., & Aloney, M. R. (2013). Role of Artificial Neural Networks in Digital Image Processing: A review. Journal of Environmental Science, 2(3), 908-913.
735
Sardar, M., & Majumder, K. (2013). A Comparative Study on Different Trust Based Routing Schemes in MANET. International Journal of Wireless & Mobile Networks, 5(5), 145.
736
Abel, K. (2013).benefits of shifting freight delivery to night time, considering routing and environmental effects for addis ababa city (Doctoral dissertation, aau).
737
Fasola, J., & Mataric, M. (2013). A socially assistive robot exercise coach for the elderly. Journal of Human-Robot Interaction, 2(2), 3-32.
738
Kalaivani, R., & Thangaraj, P. (2013). An effective technique to identify a river’s stage through satellite images by means of RBFNN. The Imaging Science Journal, 61(3), 279-291.
739
Sun, D., Deng, H., Wang, F., Ji, K., Dai, W., Liang, B., & Wei, S. (2013, November). The Feature Related Techniques in Content-Based Image Retrieval and Their Application in Solar Image Data. In Intelligent Networks and Intelligent Systems (ICINIS), 2013 6th International Conference on (pp. 336-339). IEEE.
740
Khandelwal, V., & Goyal, D. (2013). BlackHole Attack and Detection Method for AODV Routing Protocol in MANETs. IJARCET, 2(4), 1555-9.
741
Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of Impact of Wormhole Attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652.
742
Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of Impact of Wormhole Attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652.
743
Karthikeyan, P., Baskar, S., & Alphones, A. (2013). Improved genetic algorithm using different genetic operator combinations (GOCs) for multicast routing in ad hoc networks. Soft Computing, 17(9), 1563-1572.
744
Saehana, S., Iskandar, F., & Abdullah, M. (2013). Optimization of electrospinning parameter by employing genetic algorithm in order to produce desired nanofiber diameter. World Academy of Science, Engineering and Technology, International Journal of Chemical, Molecular, Nuclear, Materials and Metallurgical Engineering, 7(1), 78-83.
745
Singh, M., Sharma, S., & Kaur, A. (2013). Performance Analysis of Decision Trees. International Journal of Computer Applications, 71(19), 10-14.
746
Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques.
747
Li Nan , & Zhang Xuefu . ( 2013 ) found that knowledge-based Application System related data . Library and Information Service , ( 6 ) , 127-133.
748
Rong, C., Quan, Z., & Chakravorty, A. (2013, December). On Access Control Schemes for Hadoop Data Storage. In Cloud Computing and Big Data (CloudCom-Asia), 2013 International Conference on (pp. 641-645). IEEE.
749
Pandian, A., & Sadiq, A. K. (2013). Authorship Attribution in Tamil Language Email For Forensic Analysis. International Review on Computers and Software (IRECOS), 8(12), 3002-3008.
750
Murtaza, M., Shah, J. H., Azeem, A., Nisar, W., & Masood, M. (2013). Structured Language Requirement Elicitation Using Case Base Reasoning. Research Journal of Applied Sciences, Engineering and Technology, 6, 23.
751
Aziz, A. S., Azar, A. T., Salama, M., Hassanien, A. E., & Hanafy, S. E. O. (2013, September). Genetic algorithm with different feature selection techniques for anomaly detectors generation. In Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on (pp. 769-774). IEEE.
752
Alanazi, H. O., Abdullah, A., & Al Jumah, M. (2013). A critical review for an accurate and dynamic prediction for the outcomes of traumatic brain injury based on Glasgow Outcome Scale. Journal of Medical Sciences, 13(4), 244.
753
Priedniece, K., Nikitenko, A., Liekna, A., & Kulikovskis, G. (2013). Use of Learning Methods to Improve Kinematic Models. Applied Computer Systems, 14(1), 73-79.
754
Günüç, S. (2013). Internet Bagimliligini Yordayan Bazi Degiskenlerin Cart ve Chaid Analizleri ile Incelenmesi. Turk Psikoloji Dergisi, 28(71).
755
Günüç, S. (2013). Internet Bagimliligini Yordayan Bazi Degiskenlerin Cart ve Chaid Analizleri ile Incelenmesi. Türk Psikoloji Dergisi, 28(71), 88.
756
Madhura, G. K., & Shivamurthy, R. C. twitter sentiment analysis for product reviews to gather information using mach ine learning.
757
Anand, R., Khanna, R., Student, N. C., & Israna, P. (2013). International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net. CYBERNETICS: SYSTEMS, 43(4).
758
Zhang, Q. (2013). Aspect-Oriented Product Family Modeling.
759
Mguni, K., & Ayalew, Y. (2013). An Assessment of Maintainability of an Aspect-Oriented System. ISRN Software Engineering, 2013.
760
Ramos de Oliveira, R., Sanchez, V., Vinicius, R., Estrella, J. C., Pontin de Mattos Fortes, R., & Brusamolin, V. (2013, September). Comparative evaluation of the maintainability of RESTful and SOAP-WSDL web services. In Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA), 2013 IEEE 7th International Symposium on the (pp. 40-49
761
Tiwari, G., & Sharma, A. Maintainability Prediction-An Artificial Neural Network Based Approach.
762
Ahmed, S., & Nirkhi, S. M. (2013). Fuzzy Forensic Analysis System for DDoS Attack in MANET Response Analysis. simulation, 639(156), 343.
763
Sulaiman, S., Shamsuddin, S. M., & Abraham, A. (2013). A Survey of Web Caching Architectures or Deployment Schemes. International Journal of Innovative Computing, 3(1).
764
Sirour, H. A. N., Hamad, Y. A. M., & Eisa, A. (2013, August). An agent-based proxy cache cleanup model using fuzzy logic. In Computing, Electrical and Electronics Engineering (ICCEEE), 2013 International Conference on (pp. 486-491). IEEE.
765
ShanmugaSundaram, G., & Aswini, S. Optimizing the Performance in Web Browsers through Data Compression.
766
Alguliev, R. M., Aliguliyev, R. M., & Isazade, N. R. (2013). Mr&Mr-Sum: Maximum Relevance And Minimum Redundancy Document Summarization Model. International Journal of Information Technology & Decision Making, 12(03), 361-393.
767
Black, J. (2013). On the derivation of value from geospatial linked data (Doctoral dissertation, University of Southampton).
768
Tan, M., & Morales-Arroyo, M. (2013). Understanding distributional disruptions in the Interactive Digital Media eco-system. International Journal of Electronic Business, 11(1), 42-62.
769
Wong, R. K. (2013). Feasibility and a case study on content optimization services on cloud. Information Systems Frontiers, 15(4), 525-532.
770
Al-Azawi, R., Ayesh, A., Kenny, I., & Al-Masruri, K. A. (2013). Towards an AOSE: Game development methodology. In Distributed Computing and Artificial Intelligence (pp. 493-501). Springer International Publishing.
771
Pauline, M., Aruna, P., & Shadaksharappa, B. (2013). Layered model to Estimate Effort, Performance and cost of the Software projects. International Journal of Computer Applications, 63(13), 17-23.
772
Rai, D., & Tyagi, K. (2013, July). Estimating the regression test case selection probability using fuzzy rules. In Recent Trends in Information Technology (ICRTIT), 2013 International Conference on (pp. 603-611). IEEE.
773
Elgamel, M. S., Korani, E. A., & El Helow, K. R. Developing a Software Certification for Quality Assurance.
774
Dhule, C. A., & Nagrare, T. H. (2013). Design Of Virtual Sense Technology For System Interface. IJRCCT, 2(12), 1454-1459.
775
Eun, H., Lee, H., & Oh, H. (2013). Conditional privacy preserving security protocol for NFC applications. Consumer Electronics, IEEE Transactions on, 59(1), 153-160.
776
Lin, Y., Hou, M., & Xu, Q. (2013, December). Strongly Password-Based Three-Party Authenticated Key Exchange Protocol. In Computational Intelligence and Security (CIS), 2013 9th International Conference on (pp. 555-558). IEEE.
777
Banu, S. S., & Dhanasekaran, R. (2013). EMRCS: Efficient Multipath Routing based Cryptography Scheme in Wireless Sensor Networks. Wireless Communication, 5(1), 24-31.
778
Singh, P., & Chadha, R. S. (2013). A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology (IJEIT), 2(9), 165-175.
779
Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques.
780
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42.
781
Sahu, M., Pradhan, S. R., & Das, M. (2013). Unicode and Colours Mapping for Cryptography and Steganography using Discrete Wavelet Transform. International Journal of Computer Applications, 70(5), 36-41.
782
Tayel, M., Hafez, A., & Shawky, H. (2013, December). A new hybrid fuzzy-decomposed full capacity Stego-system. In High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 2013 10th International Conference on (pp. 16-20). IEEE.
783
ShivaKumar, K. B., Jayaramu, H. S., & Srinidhi, G. A. (2013, September). A novel data hiding technique. In Research & Technology in the Coming Decades (CRT 2013), National Conference on Challenges in (pp. 1-5). IET.
784
Yajurvedi, A. H., & Kulkarni, S. (2013, January). An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 203-212). Springer India.
785
Saejung, S., Boondee, A., Preechasuk, J., & Chantrapornchai, C. (2013, September). On the comparison of digital image steganography algorithm based on DCT and wavelet. In Computer Science and Engineering Conference (ICSEC), 2013 International (pp. 328-333). IEEE.
786
Fayyaz, N., Imranuddin, R., Anwar, S. U., & Rukh, L. (2013). Steganography Based Authentication to Prevent IP Spoofing. Life Science Journal, 10(12s).
787
Nagaty, K. A. (2013). Secret Sharing using Image Hashing. International Journal of Computer Applications, 73(20), 14-22.
788
Sagheer, A. M., Abdulhameed, A. A., & AbdulJabbar, M. A. (2013, December). SMS Security for Smartphone. In Developments in eSystems Engineering (DeSE), 2013 Sixth International Conference on (pp. 281-285). IEEE.
789
Begum, M. B., & Venkataramani, Y. (2013). A new compression scheme for secure transmission. International Journal of Automation and Computing, 10(6), 578-586.
790
Patil, M., & Sahu, V. (2013). A Survey of Compression and Encryption Techniques for SMS.
791
Ahmed, Z. H. (2013). An exact algorithm for the clustered travelling salesman problem. Opsearch, 50(2), 215-228.
792
Ahmed, Z. H. (2013). A hybrid genetic algorithm for the bottleneck traveling salesman problem. ACM Transactions on Embedded Computing Systems (TECS), 12(1), 9.
793
Ahmed, Z. H. (2013). A new reformulation and an exact algorithm for the quadratic assignment problem. Indian Journal of Science and Technology, 6(4), 4368-4377.
794
Kale, K. V., Deshmukh, P. D., Chavan, S. V., Kazi, M. M., & Rode, Y. S. (2013, October). Zernike moment feature extraction for handwritten Devanagari compound character recognition. In Science and Information Conference (SAI), 2013 (pp. 459-466). IEEE.
795
Dineshkumar, R., & Suganthi, J. (2013). A research survey on sanskrit offline handwritten character recognition. International Journal of Scientific and Research Publications (IJSRP), 3, 13-16.
796
Kazi, M. M., & Rode, Y. S. (2013). Handwritten and Printed Devanagari Compound using Multiclass SVM Classifier with Orthogonal moment Feature.
797
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013, March). Handwritten devnagari consonants recognition using mlpnn with five fold cross validation. In Circuits, Power and Computing Technologies (ICCPCT), 2013 International Conference on (pp. 1222-1226). IEEE.
798
Garg, N. K., Kaur, L., & Jindal, M. (2013). Recognition of Offline Handwritten Hindi Text Using SVM. International Journal of Image Processing (IJIP), 7(4), 395.
799
Thaker, H. R., & Kumbharana, C. K. (2013). Study of Different Off-line Handwritten Character Recognition Algorithms for Various Indian Scripts. International Journal of Computer Applications, 65(16).
800
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013, August). Design and analysis of LRTB feature based classifier applied to handwritten Devnagari characters: A neural network approach. In Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on (pp. 96-101). IEEE.
801
Goyal, M., & Garg, N. K. (2013). Techniques for Recognition of Handwritten Devanagari Numeral. International Journal of Advanced Research in Computer Science, 4(9).
802
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013). Classification of Devnagari Handwritten Characters using Single Hidden Layer Neural Network with Mixed Activation Function.
803
Choudhury, A. (2013). Recognition of Handwritten Bangla Numerals using Template Matching (Doctoral dissertation, jadavpur university kolkata).
804
Arora, S. Studies on some Soft Computing Techniques: A Case Study for Constrained Handwritten Devnagari Characters and Numerals.
805
Shinde, S., & Mane, M. V. LBG Vector Quantization for Recognition of Handwritten Marathi Barakhadi.
806
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. Offline Recognition of Devanagari Handwritten Consonants Using Projection features and mlpnn.
807
Ikram, A., Anjum, A., Hill, R., Antonopoulos, N., Liu, L., & Sotiriadis, S. (2013). Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience.
808
Skracic, K., Pale, P., & Jeren, B. (2013, May). Knowledge based authentication requirements. In Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention on (pp. 1116-1120). IEEE.
809
Kumar, S. B. on-chip address and test pattern generation for image watermarking sram.
810
Uma, M., & Padmavathi, G. (2013). A Survey on Various Cyber Attacks and their Classification. IJ Network Security, 15(5), 390-396.
811
Tanwar, S., & Prema, K. V. (2013). Threats & Security Issues in Ad hoc network: A Survey Report. International Journal of Soft Computing and Engineering, 2(6).
812
Kumar, B. A., Kavuri, K., & Batchanaboyina, M. (2013). A Novel Approach for Preventing Hackers in Data Communication. International Journal of Advanced Studies in Computers, Science and Engineering, 2(2), 1.
813
Grochocki, D. (2013). Deployment considerations for intrusion detection systems in advanced metering infrastructure.
814
Khubalkar, A. S., & Ragha, L. R. (2013, July). Security enabled DSR for establishing symmetric key and security in MANETS. In Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on (pp. 1-5). IEEE.
815
Mandala, S., Abdullah, A. H., Ismail, A. S., Haron, H., Ngadi, M. A., & Coulibaly, Y. (2013, November). A review of blackhole attack in mobile adhoc network. In Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), 2013 3rd International Conference on (pp. 339-344). IEEE.
816
Gupta, N. K., & Garg, A. (2013). Trust and Shortest Path Selection based Routing Protocol for MANET. International Journal of Computer Applications, 76(12).
817
Saxena, N., Kumar, S., & Saxena, V. (2013). Performance Analysis of AODV Routing Protocol under the Different Attacks Through The Use Of OPNET Simulator. International Journal of Innovative Research and Development, 2(12).
818
Shrivastava, S., & Jain, S. (2013). A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network. International Journal of Computer Science & Engineering Technology (IJCSET), 4(3).
819
Singhal, P., & Kumar, R. (2013). Analyzing Misbehavior of Selfish Nodes in Mobile Adhoc Network. International Journal of Computer Applications (0975–8887) Volume.
820
Ahmed, M. N., Abdullah, A. H., & El-Sayed, A. (2013). A survey of MANET survivability routing techniques.
821
Singh, J. P., & Gupta, A. K. (2013). Protocol Stack based Security Vulnerabilities in MANETs. International Journal of Computer Applications (0975–8887), 69(21).
822
Singh, D. (2013). Intrusion Detection System based on Fuzzy C Means Clustering and Probabilistic Neural Network.
823
Singh, A., Khanna, O. S., Singh, S. P., & Singh, J. (2013). Multipath Algorithm For Prevention Of Wormhole Attack In Manet.
824
Shrivastava, A., & Ahirwal, R. R. (2013). A SVM and K-means Clustering based Fast and Efficient Intrusion Detection System. International Journal of Computer Applications, 72(6), 25-29.
825
Callegari, C., Giordano, S., Mannella, S., & Pagano, M. (2013). Design and Implementation of a Testbed for the Security Assessment of MANETs. In Cyberspace Safety and Security (pp. 228-242). Springer International Publishing.
826
Nirmala, G., Thudupathi, E., & Nadu, T. (2013). Risk-Aware Response Mechanism with Extended DS theory. Risk, 2(1), 6-15.
827
Gupta, N. K., & Pandey, K. (2013, August). Trust based Ad-hoc on Demand Routing protocol for MANET. In Contemporary Computing (IC3), 2013 Sixth International Conference on (pp. 225-231). IEEE.
828
ON, S. O. B. H. A. (2013). A STUDY OF DIFFERENT ATTACKS IN MANET AND DISCUSSION ABOUT SOLUTIONS OF BLACK HOLE ATTACK ON AODV PROTOCOL.
829
Chen, P. Y., & Lin, F. Y. S. (2013). Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques. Journal of Applied Mathematics, 2013.
830
Dhiman, D., & Nayyar, A. (2013). Complete Scenario of Routing Protocols, Security Leaks and Attacks in MANETs. International Journal, 3(10).
831
Shukla, R., & Bhandari, R. (2013). A Novel Minimized Computational Time Based Encryption and Authentication Using ECDSA. International Journal of Modern Education and Computer Science (IJMECS), 5(9), 19.
832
Yadav, N. A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks.
833
Elamathi, N. a study of routing attacks in wireless mobile adhoc networks.
834
Barcena-Humanes, J. L., Mata-Moya, D., Jarabo-Amores, M. P., del Rey-Maestre, N., & Martin de Nicolas-Presa, J. (2013, June). Analysis of NNs Detectors for Targets with Unknown Correlation in Gaussian Interference. In Computational Intelligence, Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on (pp. 48-53). IEEE.
835
Zamani, A., Sorbi, M. R., & Safavi, A. A. (2013). Application of neural network and ANFIS model for earthquake occurrence in Iran. Earth Science Informatics, 6(2), 71-85.
836
Kodali, R. K., Patel, K. H., & Sarma, N. N. (2013). Implementation of Energy Efficient Scalar Point Multiplication Techniques for ECC. International Journal on Recent Trends in Engineering & Technology, 9(1), 14.
837
Kodali, R. K., Patel, K. H., & Sarma, N. (2013, February). Energy efficient elliptic curve point multiplication for WSN applications. In Communications (NCC), 2013 National Conference on (pp. 1-5). IEEE.
838
Zele, A. P., & Wadhe, A. P. Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography.
839
Kulkarni, V. (2013). Speaker identification using orthogonal transforms and vector quantization.
840
Kekre, H. B., & Kulkarni, V. (2013, January). Closed set and open set Speaker Identification using amplitude distribution of different Transforms. In Advances in Technology and Engineering (ICATE), 2013 International Conference on (pp. 1-8). IEEE.
841
Siddiqui, S. T., Hamatta, H. S., & Bokhari, M. U. (2013). Multilevel Security Spiral (MSS) Model: NOVEL Approach. International Journal of Computer Applications, 65(20).
842
Pirnau, M. (2013, June). The analysis of the. NET architecture security system. In Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on (pp. 1-6). IEEE.
843
Athawale, A. (2013). Information Hiding in image and audio files.
844
Xu, L., Yeh, Y. R., Lee, Y. J., & Li, J. (2013). A Hierarchical Framework Using Approximated Local Outlier Factor for Efficient Anomaly Detection. Procedia Computer Science, 19, 1174-1181.
845
Sladic, G., Vidakovic, M., & Konjovic, Z. (2013). Network Monitoring Using Intelligent Mobile Agents. In Intelligent Systems: Models and Applications (pp. 301-318). Springer Berlin Heidelberg.
846
Chaoyu, Y. A. N. G., Yerong, H. E., & Minli, S. O. N. G. (2013). Wireless Sensor Network Topology Control Based on Agent. Sensors & Transducers (1726-5479), 160(12).
847
Kotenko, I., & Chechulin, A. (2013, June). A cyber attack modeling and impact assessment framework. In Cyber Conflict (CyCon), 2013 5th International Conference on (pp. 1-24). IEEE.
848
Mazumder, J. A., & Hemachandran, K. (2013). A high capacity and secured color image steganographic technique using discrete wavelet transformation. International Journal of Computer Science and Information Technologies, 4(4), 583-589.
849
Mann, V. K., & Dhaliwal, H. S. (2013). 32* 32 Colour Image Steganography. International Journal of Engineering Trends and Technology (IJETT) Vol, 4.
850
Mazumder, J. A., & Hemachandran, K. (2013). Study of Image steganography using LSB, DFT and DWT. International Journal of Computers & Technology, 11(5), 2618-2627.
851
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42.
852
Atawneh, S., & Sumari, P. (2013). Hybrid and Blind Steganographic Method for Digital Images Based on DWT and Chaotic Map. Journal of Communications, 8(11).
853
Zhou, Y., & Ng, W. W. (2013, July). A study of influence between digital watermarking and steganography. In Wavelet Analysis and Pattern Recognition (ICWAPR), 2013 International Conference on (pp. 49-55). IEEE.
854
Lin, Q., Wang, R., Ye, N., & Wang, Z. (2013). Energy efficient distributed steganography for secure communication in wireless multimedia sensor networks. Journal of Electronics (China), 30(1), 9-16.
855
Kanzariya, N., Nimavat, A., & Patel, H. (2013). Security of Digital Images using Steganography Techniques based on LSB, DCT and Huffman Encoding.
856
Yajurvedi, A. H., & Kulkarni, S. (2013, January). An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 203-212). Springer India.
857
Mondal, A., Sahana, S., & Mahata, S. K. (2013, April). A Pictorial Block Steganography based Secure Algorithm for Data Transfer. In IJCA Special Issue on International Conference on Computing, Communication and Sensor Network (No. 4, pp. 12-15). Foundation of Computer Science (FCS).
858
Dagar, S. (2013). RGB Based Dual Key Image Steganography.
859
Sahana, S., Sen, J., & Mondal, C. Secure Adaptive N-cryption (SAN).
860
Shahana, T. A Secure DCT Image Steganography based on Public-Key Cryptography.
861
Kamble, S. V., & Warvante, B. G. A Review on Novel Image Steganography Techniques.
862
Mann, V. K., Dhaliwal, H. S., & Dhaliwal, H. S. Nav view search.
863
Maan, V. K., & Dhaliwal, H. S. 32× 32 Vector Quantization Based Colour Image Steganography.
864
Chaturvedi, P., & Bairwa, R. K. Image Steganography Method for Hiding Secret Message in Colored Images by Using IWT.
865
Wang, D., Chen, D., & Guo, R. (2013). DDoS mitigation in content distribution networks. International Journal of Wireless and Mobile Computing, 6(5), 508-514.
866
Cartier, G., Cartier, J. F., & Fernandez, J. M. (2013). Next-generation dos at the higher layers: A study of smtp flooding. In Network and System Security (pp. 149-163). Springer Berlin Heidelberg.
867
Bou-Harb, E., Pourzandi, M., Debbabi, M., & Assi, C. (2013). A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. Security and Communication Networks, 6(12), 1478-1489.
868
Bedi, D. S. (2013). Information security in hospitality SMMEs in the Cape Metropole area: policies and measures in the online environment (Doctoral dissertation, Cape Peninsula University of Technology).
869
Aye, N., Khin, H. S., Win, T. T., KoKo, T., Than, M. Z., Hattori, F., & Kuwabara, K. (2013). Multi-domain public key infrastructure for information security with use of a multi-agent system. In Intelligent Information and Database Systems (pp. 365-374). Springer Berlin Heidelberg.
870
Peng, B., & Li, L. (2013). QoS Multicast Routing Algorithm Based on Genetic Algorithm and Ant Colony Optimization. International Information Institute (Tokyo). Information, 16(10), 7717.
871
Chen, H., & Zhou, P. (2013, July). An ant algorithm for solving the four-coloring map problem. In Natural Computation (ICNC), 2013 Ninth International Conference on (pp. 491-495). IEEE.
872
Nakhumwa, J. N. (2013). Adoption of E-commerce Payment Systems by Commercial Banks in Kenya (Doctoral dissertation, University of Nairobi).
873
Kerrigan, M. (2013). A capability maturity model for digital investigations. Digital Investigation, 10(1), 19-33.
874
Saleem, S., Popov, O., & Appiah-Kubi, O. K. (2013). Evaluating and comparing tools for mobile device forensics using quantitative analysis. In Digital Forensics and Cyber Crime (pp. 264-282). Springer Berlin Heidelberg.
875
Fenu, G., & Solinas, F. (2013). computer forensics investigation an approach to evidence in cyperspace. In The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) (pp. 77-88). The Society of Digital Information and Wireless Communication.
876
Neil, A. M., Elmogy, M., & RIAD, A. (2013). A Proposed Framework for Crime Investigation Based On Windows Registry Analysis. Journal of Engineering and Applied Science, Faculty of Engineering, Cairo University, 60(1).
877
Fenu, G., & Solinas, F. (2013). Computer forensics between the italian legislation and pragmatic questions. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2(1), 9-24.
878
Vlachopoulos, K., Magkos, E., & Chrissikopoulos, V. (2013). A model for hybrid evidence investigation. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, 150.
879
Bulbul, H. I., Yavuzcan, H. G., & Ozel, M. (2013). Digital forensics: An Analytical Crime Scene Procedure Model (ACSPM). Forensic science international, 233(1), 244-256.
880
Hewling, M. O. (2013). Digital forensics: an integrated approach for the investigation of cyber/computer related crimes.
881
Krishnan, M., Karthikeyan, T., Chinnusamy, T. R., & Murugesan, A. (2013). Dynamic Scheduling of Flexible Manufacturing System Using Scatter Search Algorithm. International Journal of Emerging Technology and Advanced Engineering, 3(10), 329-341.
882
Ismail, M. A. (2013, April). Multi-core processor based parallel implementation for finding distribution vectors in Markov processes. In Electronics, Communications and Photonics Conference (SIECPC), 2013 Saudi International (pp. 1-5). IEEE.
883
Shahi, G., & Singh, C. (2013). To Secure and Compress the Message on Local Area Network. International Journal of Computer Applications, 69(17), 43-47.
884
Dutta, S., Kumar, C., & Chakraborty, S. (2013). A symmetric key algorithm for cryptography using music. International Journal of Engineering and Technology, 5(3), 3109-3115.
885
Rote, G. D., & Patil, A. M. Steganography with Cryptography Technique For Data Hiding.
886
Das, D., Lanjewar, U. A., & Sharma, S. J. The Art of Cryptology: From Ancient Number System to Strange Number System.
887
Nithyaa, A. N., Premkumar, R., Kanchana, D., & Krishnan, N. A. (2013). Automated Detection and Classification of Blood Diseases. In Recent Advancements in System Modelling Applications (pp. 393-404). Springer India.
888
Suradkar, P. T. (2013). Detection of malarial parasite in blood using image processing. International Journal of Engineering and Innovative Technology (IJEIT), 2(10).
889
Waghmare, V., & Akhter, S. Image Analysis Based System for Automatic Detection of Malarial Parasite in Blood Images.
890
Opoku-Ansah, J., Anderson, B., Eghan, J. M., Boampong, J. N., Adueming, P. O. W., Amuah, C. L. Y., & Akyea, A. G. (2013). Automated Protocol for Counting Malaria Parasites (P. falciparum) from Digital Microscopic Image Based on L* a* b* Colour Model and K-Means Clustering.
891
Elmir, A., Elmir, B., & Bounabat, B. (2013, November). Multi-facet quality assessment of process driven services in collaborative networks. In ISKO-Maghreb, 2013 3rd International Symposium (pp. 1-7). IEEE.
892
Könst, W. J. (2013). Usability of Networked Information.
893
Elmir, A., Elmir, B., & Bounabat, B. (2013). Towards an Assessment-oriented Model for External Information System Quality Characterization. arXiv preprint arXiv:1310.8111.
894
Mahajan, D., & Sachdeva, M. (2013, December). Distinguishing DDoS Attack from Flash Event Using Real-World Datasets with Entropy as an Evaluation Metric. In Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on (pp. 90-94). IEEE.
895
Kaur, S., & Bansal, R. (2013). enhanced technique for secured and reliable watermarking using mfhwt. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(5), pp-1674.
896
Mishra, S., Mahapatra, A., & Mishra, P. (2013). A survey on Digital watermarking techniques. International Journal of Computer Science and Information Technologies, 4(3), 451-456.
897
Shrirao, D. W., & Honole, S. A Survey on Improving Robustness of Image Watermarking By Using Gradient.
898
Hasan, H. R., Sulong, G. B., & Selamat, A. A Novel Blind Color Image Watermarking Technique in Hybrid Domain Using LSB Approach and Discrete Slantlet Transform.
899
Nilizadeh, A. F., & Nilchi, A. R. N. (2013). Steganography on RGB Images Based on a “Matrix Pattern” using Random Blocks. International Journal of Modern Education and Computer Science (IJMECS), 5(4), 8.
900
Mann, V. K., & Dhaliwal, H. S. (2013). 32* 32 Colour Image Steganography. International Journal of Engineering Trends and Technology (IJETT) Vol, 4.
901
Maan, V. K., & Dhaliwal, H. S. 32× 32 Vector Quantization Based Colour Image Steganography.
902
Mohebbi, K., Ibrahim, S., & Idris, N. B. (2013). Prediction of relevance between requests and web services using ANN and LR models. In Intelligent Information and Database Systems (pp. 40-49). Springer Berlin Heidelberg.
903
Shibata, S. I., Sato, F., Kimura, H., & Oyabu, T. A Fluctuation Characteristic of Plant Bioelectric Potential for Evaluating Abnormal Growth in Physiological Disorders.
904
Das, S., Zaman, J. U., & Ghosh, R. (2013). Generation of AES S-boxes with Various Modulus and Additive Constant Polynomials and Testing their Randomization. Procedia Technology, 10, 957-962.
905
Riman, C., & Hallal, H. H. (2013, January). DES Based Educational Encryption System. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
906
Yadav, S., & Lakhani, K. (2013). A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET. International Journal of Distributed and Parallel Systems, 4(2), 17.
907
Sivagurunathan, S., & Prathapchandran, K. (2013). Survey of Cluster-Based Cryptographic Schemes to Secure MANET. In Proceedings of the International Conference on Applied Mathematics and Theoretical Computer Science (p. 243).
908
Oguike, O. E. (2013). Recursive Shortest Route Algorithm Using Abstract Data Type, Graph. African Journal of Computing & ICT, 6(2).
909
Shaikh, E. A., & Dhale, A. AGV Path Planning and Obstacle Avoidance Using Dijkstra’s Algorithm.
910
Ismail, M. N., Aborujilah, A., Musa, S., & Shahzad, A. (2013, January). Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. In Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication (p. 36). ACM.
911
Chawla, I., Kaur, D., & Luthra, P. DDoS Attacks in Cloud and Mitigation Techniques.
912
Shah, N., Chaudhary, L., Rajmane, A., Patil, N., & Khatke, K. (2013). Implementation Of C-Trend For Commercial Application.
913
Sardar, M., & Majumder, K. Asurvey on trust based secure routing in manet.
914
Ganesh, M. S., & Thanushkodi, K. (2013).Fashcep: Fuzzy and Analogy Based Hybrid Software Cost Estimation Process. International Review on Computers and Software (IRECOS), 8(7), 1497-1505.
915
Pauline, M., Aruna, P., & Shadaksharappa, B. Comparison of available Methods to Estimate Effort, Performance and Cost with the Proposed Method.
916
Aljahdali, S., & Sheta, A. (2013).Evolving software effort estimation models using multigene symbolic regression genetic programming. Int. J. Adv. Res. Artif. Intell, 2, 52-57.
917
Haghshenas, m., & jeddi, k. Y. (2013). Using mobile devices to improve learning technologies. Ijitr, 1(6), 519-523.
918
Gómez ardila, s. E. (2013). Learning design implementation in context-aware and adaptive mobile learning.
919
Sun, g. (2013). Teamwork as a service: design of a cloud-based system for enhancing teamwork performance in mobile learning.
920
Mehigan, t. J. (2013). Automatic detection of learner-style for adaptive elearning.
921
Ahmad, A. (2013).A model of distributed rights allocation in online social interaction: a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology at Massey University, Albany, Auckland, New Zealand (Doctoral dissertation).
922
Zheng, Y., Huang, Z., & He, T. (2013). Classification based on both attribute value weight and tuple weight under the cloud computing. Mathematical Problems in Engineering, 2013.
923
Vern, R., & Dubey, S. K. (2013). A Survey on Evaluation of the Quality of Software System by Using Fuzzy Logic Approach. Global Journal of Computer Science and Technology, 13(1).
924
Tegegne, W., Belachew, M., & Kifle, M. (2013). Quantification of Software Requirements Specification and Software Quality: Quantitative Approach. HiLCoE Journal of Computer Science and Technology, 144.
925
Hmood, A. (2013). A Unified Metamodel for Assessing and Predicting Software Evolvability Quality (Doctoral dissertation, Concordia University).
926
Tomar, A., & Thakare, V. M. (2013). A Customized Model on Software Quality Assurance & Reuse. International Journal Of Computer Science And Applications, 6(2).
927
Ibrahim, N. H., Mustapha, A., Rosli, R., & Helmee, N. H. (2013). A hybrid model of hierarchical clustering and decision tree for rule-based classification of diabetic patients. International Journal of Engineering and Technology (IJET), 5(5), 3986-91.
928
Thakare, S., & Wadhe, A. P. (2013). A literature Review on Desktop Phishing Based on Visual Appearance Analysis. International Journal of Research in Computer Engineering & Electronics, 2(2).
929
Mitev, I., & Maimarev, R. International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net.
930
Gayathri, C., & Kalpana, V. (2013). Study on Image Steganography Techniques. International Journal of Engineering and Technology (IJET) Vol, 5.
931
Al-Bahadili, H. (2013). A Secure Block Permutation Image Steganography Algorithm. Submitted to the International Journal on Cryptography and Information Security (IJCIS) on 30th July.
932
Kelash, H. M., Abdel Wahab, O. F., Elshakankiry, O., & El-sayed, H. S. (2013, October). Hiding data in video sequences using steganography algorithms. In ICT Convergence (ICTC), 2013 International Conference on (pp. 353-358). IEEE.
933
Chugh, G. (2013). Image Steganography Techniques: A Review Article. acta technica corviniesis-Bulletin of engineering Tome VI July-September, 97-104.
934
Sharda, S., & Budhiraja, S. (2013). Performance Analysis of Image Steganography based on DWT and Arnold Transform. International Journal of Computer Applications, 69(21).
935
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42.
936
Chee, A. (2013). Steganographic techniques on social media: investigation guidelines (Doctoral dissertation, Auckland University of Technology).
937
Sohag, S. A., Islam, D. M. K., & Islam, M. B. (2013). A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key. American Journal of Engineering Research (AJER) Volume-02, Issue-09.
938
Shah, H., Shinde, P., & Kukreja, J. (2013). Retouching Detection and Steganalysis. International Journal of Engineering Innovations and Research, 2(6), 487.
939
Ali, A. A., & Saad, A. H. S. (2013). New Image Steganography Method by Matching Secret Message with pixels of Cover Image (SMM). International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), 3 (2), 1-10.
940
Saejung, S., Boondee, A., Preechasuk, J., & Chantrapornchai, C. (2013, September). On the comparison of digital image steganography algorithm based on DCT and wavelet. In Computer Science and Engineering Conference (ICSEC), 2013 International (pp. 328-333). IEEE.
941
Patil, H. H., & Hingway, S. P. Improved Way of Image Stegnography for JPEG2000 Compression Standard by Using EBCOT.
942
Poongavanam, V., & Shamala, l. m. an enhanced difference pair mapping steganography method to improve embedding capacity.
943
FADHIL, J. A. (2013). A New Method for Improving the Capacity of Data Hiding in an Image Steganography.
944
Rad, J. M. (2013). Intensity Adaptive LSB Method Applying a Revised Matching. International Journal of Computer Applications, 70(27).
945
Bedwal, T., & Kumar, M. (2013). An Enhanced and Secure Image Steganographic Technique Using RGB-Box Mapping.
946
Arora, A., Neeru, M. N., & Taqdir, M. image steganography techniques: an overview.
947
Jassim, F. A. (2013). A Novel Robust Method to Add Watermarks to Bitmap Images by Fading Technique. arXiv preprint arXiv:1307.1166.
948
Lal, G. J., Veena, V. K., & Soman, K. P. (2013). A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition. In Security in Computing and Communications (pp. 52-62). Springer Berlin Heidelberg.
949
Shihab, A. M., Mohammed, R. K., & Abed, W. M. (2013). evaluating the performance of the secure block permutation image steganography algorithm. international journal of network security & its applications, 5(5), 167.
950
Nagaty, K. A. (2013). Secret Sharing using Image Hashing. International Journal of Computer Applications, 73(20), 14-22.
951
Patil, A. U., Hingway, S. P., & Hingway, S. P. Nav view search.
952
Barmawi, A. M. (2013, November). Strengthening Dynamic Cell Spreading (DCS) image steganography. In Information and Network Security (ICINS 2013), 2013 International Conference on (pp. 1-6). IET.
953
Yunus, Y. A., Ab Rahman, S., & Ibrahim, J. (2013). Steganography: A Review of Information Security Research and Development in Muslim World. American Journal of Engineering Research (AJER), 2(11), 122-128.
954
AKTAS, H., & KALKAN, M. An Application of the Crystography.
955
Kovtun, VY, Hnatiuk, S., & Kinzeryavyy, A. (2013). Systematics modern methods of computer steganography. Safety information, 19 (3), 209-217.
956
Rodrigues, P., Belguinha, A., Gomes, C., Cardoso, P., Vilas, T., Mestre, R., & Rodrigues, J. M. F. (2013). Open source technologies involved in constructing a web-based football information system. In Advances in Information Systems and Technologies (pp. 715-723). Springer Berlin Heidelberg.
957
Syamala, P. J., Vimalai, R., & Vimala, R. Nav view search.
958
Kuseler, T., Lami, I. A., & Al-Assam, H. (2013, May). Location-assured, multifactor authentication on smartphones via LTE communication. In SPIE Defense, Security, and Sensing (pp. 87550B-87550B). International Society for Optics and Photonics.
959
Al-Assam, H., Lami, I. A., & Kuseler, T. (2013). Integrating Cancellable Biometrics with Geographical Location for Effective Unattended Authentication of Users of Mobile Devices. Journal of Communications, 8(11).
960
Namayanja, J. M., & Janeja, V. P. (2013, June). Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks. In Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on (pp. 191-196). IEEE.
961
Mandal, S., Saha, G., & Pal, R. K. (2013). An Approach towards Automated Disease Diagnosis & Drug Design Using Hybrid Rough-Decision Tree from Microarray Dataset. J Comput Sci Syst Biol, 6, 337-343.
962
Yinkfu Chuye, K. (2013). Design and Implementation of Machine Learning and Rule-Based System for Verifying Automation System Designs.
963
Gabriel, I., Charles, A. O., & Officer, A. C. (2013). Fingerprint Matching using Neighbourhood Distinctiveness.
964
Babatunde, I. G., & Charles, A. O. (2013). A Fingerprint-based Authentication Framework for ATM Machines. J Comput Eng Inf Technol 2: 3. doi: http://dx. doi. org/10.4172/2324, 9307, 2.
965
Babatunde, I. G., Charles, A. O., & Officer, A. C. (2013, October). Fingerprint matching by neighbourhood characteristics. In Science and Information Conference (SAI), 2013 (pp. 434-442). IEEE.
966
Angaye, C. O., Akinyokun, O. C., & Iwasokun, g. b. experimental study of minutiae based algorithm for fingerprint matching.
967
Han, S. W., Jeoune, D. S., & Yoon, Y. W. (2013). New Minutiae Detection Algorithm from Fingerprint Image using the Improved Tracing on Ridge Curve. International Journal of Security and Its Applications, 7(4), 343-352.
968
Babatunde, I. G., Charles, A. O., & Olatunbosun, O. (2013). Uniformity Level Approach to Fingerprint Ridge Frequency Estimation. International Journal of Computer Applications, 62(22).
969
Jain, N., Sharma, S. K., & Pal, B. L. (2013). Development of a Multimodal Biometric Identification and Verification System using Two Fingerprints. International Journal of Computer Applications, 74(12).
970
Sahu, M., & Shukla, N. Rotation Invariant Approach of SURF for Unimodal Biometric System.
971
Peng xi, peng xiao-qi, zhong yunfei, tang ying, & left the dragon. (2013). extraction of minutiae identity detection method.computer applications and software, 30 (6), 132-136.
972
Dogra, N., & Kaur, H. (2013). Cloud Computing Security: Issues and Concerns. International Journal of Emerging Technology and Advanced Engineering, 3(3).
973
Beham, M. P., & Roomi, S. M. M. (2013). A review of face recognition methods. International Journal of Pattern Recognition and Artificial Intelligence, 27(04), 1356005.
974
Shah, S., Khan, S. A., & Riaz, N. (2013). Analytical Study of Face Recognition Techniques.
975
Thomas, L. L., Gopakumar, C., & Thomas, A. A. Face Recognition based on Gabor Wavelet and Backpropagation Neural Network.
976
Sahraoui, S., & Bouam, S. (2013). Secure routing optimization in hierarchical cluster-based wireless sensor networks. International Journal of Communication Networks and Information Security (IJCNIS), 5(3).
977
Yuhong Zhen, Wu Yonghao, & Zhou Fengli. (2013). Based on vehicle terminal system design µC / OS-? Computer Applications and Software, 30 (2), 324-327.
978
Left flat, Yunfang, Wangsan Fu, & Wang ya. (2013). A new proxy signature scheme without certificate directional Computer Applications and Software, 30 (2), 315-316.
979
Chen, B. C., & Yeh, H. T. (2013). Secure proxy signature schemes from the Weil pairing. The Journal of Supercomputing, 65(2), 496-506.
980
Zambrano, J. G., Guzmán-Ramírez, E., & Pogrebnyak, O. (2013). Search Algorithm for Image Recognition Based on Learning Algorithm for Multivariate Data Analysis. INTECH Open Access Publisher.
981
Hoelz, B. W., & Ralha, C. G. (2013, March). A framework for semantic annotation of digital evidence. In Proceedings of the 28th Annual ACM Symposium on Applied Computing (pp. 1966-1971). ACM.
982
Tanner, A., & Duncan, S. On Integrating Mobile Applications into the Digital Forensic Investigative Process.
983
Ezeah, G. H., Asogwa, C. E., & Edogor, I. O. (2013). Social media use among students of universities in South-East Nigeria. Journal of Humanities and Social Sciences, 16, 23-32.
984
Shittu, A. T., Madarsha, K. B., AbduRahman, N. S. N., & Ahmad, T. B. T. (2013). Determinants of social networking software acceptance: A multi-theoretical approach. The Malaysian Online Journal of Educational Technology, 1(1), 27-43.
985
koçak, n. g., kaya, s., & EROL, E. Social Media from the Perspective of Diffusion of Innovation Approach.
986
Mahmud, Y., Rahim, N. Z. A., & Miskon, S. (2013, October). Developing a conceptual framework of Social Network Site (SNS) appropriation in family context. In Science and Information Conference (SAI), 2013 (pp. 288-293). IEEE.
987
Yaghmaei, & F. Users tend to use this system to evaluate the hospital information system based on innovation diffusion model Razi hospital. Journal of Health Administration.
988
Patel, A., & Verma, M. K. Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET: Reliability Value based Approach. International Journal of Computer Applications (0975-8887) Volume.
989
Patel, A., & Verma, M. K. (2013). Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET. International Journal of Computer Applications, 82(1).
990
Shrivastava, S. Normalized Worm-Hole Local Intrusion Detection Algorithm (NWLIDA).
991
Gupta, A., & Malviya, M. A Novel Recommendation Trust Proxy (RTP) Based Pre-emptive Malicious Node Detection Mechanism for AODV in MANET.
992
Seo, D., Lee, H., & Perrig, A. (2013). APFS: adaptive probabilistic filter scheduling against distributed denial-of-service attacks. Computers & Security, 39, 366-385.
993
Chellani, G., & Kalla, A. (2013). A Review: Study of Handover Performance in Mobile IP. arXiv preprint arXiv:1312.2108.
994
Kumar, R., Verma, P., & Singh, Y. (2013). Mobile Ad Hoc Networks and It’s Routing Protocols. World Academy of Science, Engineering and Technology International Journal of Computer, Information, Systems and Control Engineering, 7(8).
995
Roopak, M., & Reddy, B. (2013). Blackhole Attack Implementation in AODV Routing Protocol. International Journal of Scientific & Engineering Research, 4(5), 402-406.
996
Mobadersany, P., Khanmohammadi, S., & Ghaemi, S. (2013, May). An efficient fuzzy method for path planning a robot in complex environments. In Electrical Engineering (ICEE), 2013 21st Iranian Conference on (pp. 1-6). IEEE.
997
Jafarzadeh, H., Gholami, S., & Bashirzadeh, R. (2013). Decision Science Letters.
998
Garbervetsky, D., & Kim, S. (2013). Report from 2nd international workshop on developing tools as plug-ins (TOPI 2012). ACM SIGSOFT Software Engineering Notes, 38(1), 49-51.
999
Singh, Y., Khatkar, A., Rani, P., Deepika, D., & Barak, D. D. (2013, April). Wormhole Attack Avoidance Technique in Mobile Adhoc Networks. In Advanced Computing and Communication Technologies (ACCT), 2013 Third International Conference on (pp. 283-287). IEEE.
1000
Fritzsche, M., & Gilani, W. (2013). U.S. Patent No. 8,438,533. Washington, DC: U.S. Patent and Trademark Office.
1001
Elkabbany, G. F., & Elnemr, H. A. (2013). An Efficient Parallel Based Diabetic Retinopathy Grading Algorithm. International Journal of Computer Science and Information Security, 11(9), 12.
1002
Younes, O., & Thomas, N. (2013). Modelling and performance analysis of multi-hop ad hoc networks. Simulation Modelling Practice and Theory, 38, 69-97.
1003
Krishnakumar, L., & Varughese, N. M. (2013, December). High speed classification of vulnerabilities in cloud computing using collaborative network security management. In Advanced Computing and Communication Systems (ICACCS), 2013 International Conference on (pp. 1-6). IEEE.
1004
Kaur, R. (2013). Energy efficient routing protocols in mobile ad hoc network based on AODV protocol. Int. J. Appl. Innov. Eng. Manag.(IJAIEM), 2(1), 323-324.
1005
Rajeshkanna, R., & Saradha, A. (2013). Energy Efficient Enhanced AODV Routing Protocol for maximize the lifetime of Mobile Ad hoc Networks. International Journal of Computer Technology and Applications, 4(5), 856.
1006
Gupta, R., & Aggarwal, H. (2013). Network Density based Analysis of MANET Routing Protocols. International Journal of Computer Applications, 77(10).
1007
Gupta, R. (2013). Ad-hoc routing protocol “review paper”. Journal of Global Research in Computer Science, 4(5), 26-29.
1008
Bernard, T., Fouchal, H., Linck, S., & Perrin, E. (2013, June). Impact of routing protocols on packet retransmission over wireless networks. In Communications (ICC), 2013 IEEE International Conference on (pp. 2979-2983). IEEE.
1009
Rajeshkanna, R., Senthilkumar, S. P., & Kumuthini, C. (2013). Energy Efficient Routing Protocols in Mobile Ad hoc Network Based on Enhanced AODV Protocol.
1010
Bhushan, S., Saroliya, A., & Singh, V. (2013). Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols. International Journal of Advanced Research in Computer and Communication Engineering, 2(6).
1011
Sharma, V., Singh, H., & Kant, S. (2013, September). AODV based energy efficient IEEE 802.16 G VANET network. In Communication and Computing (ARTCom 2013), Fifth International Conference on Advances in Recent Technologies in (pp. 35-43). IET.
1012
Arya, P., Vijay, S., Gupta, V., & Pandey, A. (2013). Effect of File Mobility Pattern on AODV, DSDV and ZRP Routing Protocols in MANET. International Journal of Computer Applications, 80(2).
1013
Yibyeonggwan , and jeongeunhui . (2013) . GSK (Group Secret Key) based SAODV (Secure AODV) routing protocol to detect packet injection attacks. Security Engineering Research Institute Journal of Security Engineering, 10 (6), 681-694.
1014
Agarwal, M. (2013). Text steganographic approaches: a comparison. arXiv preprint arXiv:1302.2718.
1015
Awad, W. S., & Zolait, A. H. (2013). E-Mail as an Official Communication Tool in Bahrain: Individual and Public Organization Perspectives. International Journal of E-Services and Mobile Applications (IJESMA), 5(1), 51-76.
1016
da Rocha, M. C., & Saraiva, J. T. (2013). A discrete evolutionary PSO based approach to the multiyear transmission expansion planning problem considering demand uncertainties. International Journal of Electrical Power & Energy Systems, 45(1), 427-442.
1017
Latha, K., Rajinikanth, V., & Surekha, P. M. (2013). PSO-based PID controller design for a class of stable and unstable systems. ISRN Artificial Intelligence, 2013.
1018
Arasomwan, M. A., & Adewumi, A. O. (2013, June). An adaptive velocity particle swarm optimization for high-dimensional function optimization. In Evolutionary Computation (CEC), 2013 IEEE Congress on (pp. 2352-2359). IEEE.
1019
Arasomwan, M. A., & Adewumi, A. O. (2013). On the performance of linear decreasing inertia weight particle swarm optimization for global optimization. The Scientific World Journal, 2013.
1020
Arasomwan, M. A., & Adewumi, A. O. (2013, April). On adaptive chaotic inertia weights in particle swarm optimization. In Swarm Intelligence (SIS), 2013 IEEE Symposium on (pp. 72-79). IEEE.
1021
Jadon, S. S., Sharma, H., Bansal, J. C., & Tiwari, R. (2013, January). Self adaptive acceleration factor in particle swarm optimization. In Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012) (pp. 325-340). Springer India.
1022
Yavari, S., Zoej, V., Mohammad, J., Mohammadzadeh, A., & Mokhtarzade, M. (2013). Particle swarm optimization of RFM for georeferencing of satellite images. Geoscience and Remote Sensing Letters, IEEE, 10(1), 135-139.
1023
Pessin, G., Osório, F. S., Souza, J. R., Ueyama, J., Costa, F. G., Wolf, D. F., ... & Vargas, P. A. (2013). Investigation on the evolution of an indoor robotic localization system based on wireless networks. Applied Artificial Intelligence, 27(8), 743-758.
1024
Wang, L. (2013). An improved cooperative particle swarm optimizer. Telecommunication Systems, 53(1), 147-154.
1025
Chen, R. M., & Wu, D. S. (2013). Solving Scheduling Problem Using Particle Swarm Optimization with Novel Curve Based Inertia Weight and Grouped Communication Topology. International Journal of Digital Content Technology and its Applications, 7(7), 94.
1026
Ramphuengnit, P., & Polvichai, J. An Effective Hybrid-DEPSO applied with Dynamic Sigmoid Weights.
1027
Costeira da Rocha, M., & Tome Saraiva, J. (2013, June). Transmission expansion planning—A multiyear PSO based approach considering load uncertainties. In PowerTech (POWERTECH), 2013 IEEE Grenoble (pp. 1-6). IEEE.
1028
Singh, N., & Singh, S. B. (2013, September). A New Modified Approach of Mean Particle Swarm Optimization Algorithm. In Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on (pp. 296-300). IEEE.
1029
Chen, R. M., & Hsu, C. C. (2013). Guiding Search Using an Asymmetric Decline Control Function for Solving Flowshop Problems. Journal of Convergence Information Technology, 8(6).
1030
Bahaa-Eldin, A. M. (2013). A medium resolution fingerprint matching system. Ain Shams Engineering Journal, 4(3), 393-408.
1031
Lim, J. F., & Chin, R. K. Y. (2013, December). Enhancing Fingerprint Recognition Using Minutiae-Based and Image-Based Matching Techniques. In Artificial Intelligence, Modelling and Simulation (AIMS), 2013 1st International Conference on (pp. 261-266). IEEE.
1032
Chockaian, K., Vayanaperumal, R., & Kanagaraj, B. R. (2013). New approach for identifying hereditary relation using primary fingerprint patterns. Image Processing, IET, 7(5), 423-431.
1033
Babu, K. R., & Sunitha, K. V. N. (2013). Enhancing Hazy Images with the Aid of Particle Swarm Optimization (PSO) and Morphological Operation. International Review on Computers and Software (IRECOS), 8(1), 21-28.
1034
Babu, K. R., & Sunitha, K. V. N. (2013). Image De-noising and Enhancement for Salt and Pepper Noise using Genetic Algorithm-Morphological Operations. International Journal on Signal and Image Processing, 4(1), 36.
1035
Koteska, B., & Velinov, G. (2013). Component-Based Development: A Unified Model of Reusability Metrics. In ICT Innovations 2012 (pp. 335-344). Springer Berlin Heidelberg.
1036
Valliappan, N., Lozano, A., & Heath, R. W. (2013). Antenna subset modulation for secure millimeter-wave wireless communication. Communications, IEEE Transactions on, 61(8), 3231-3245.
1037
Goswami, B., & Mandal, D. (2013). A genetic algorithm for the level control of nulls and side lobes in linear antenna arrays. Journal of King Saud University-Computer and Information Sciences, 25(2), 117-126.
1038
Banerjee, S., & DWIVEDI, V. V. (2013). Review of Adaptive Linear Antenna Array Pattern Optimization. International Journal of Electronics.
1039
Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24.
1040
Mandala, S., Abdullah, A. H., Ismail, A. S., Haron, H., Ngadi, M. A., & Coulibaly, Y. (2013, November). A review of blackhole attack in mobile adhoc network. In Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), 2013 3rd International Conference on (pp. 339-344). IEEE.
1041
Daniel, J. V., Joshna, S., & Manjula, P. (2013). A Survey of Various Intrusion Detection Techniques in Wireless Sensor Networks. International Journal of Computer Science and Mobile Computing, 2(9).
1042
Singh, D., & Bedi, S. S. (2013). A State of an Art Survey of Intrusion Detection System in Mobile Ad-hoc Network. International Journal of Computer Applications, 82(5).
1043
Butun, I. (2013). Prevention and Detection of Intrusions in Wireless Sensor Networks.
1044
Subha, P. S., & Moses, J. C. A Survey of Various Risk Mitigating Techniques in MANET Environment.
1045
Jacobs, M., Chang, L., & Pulkkinen, A. (2013, January). Automatic Segmentation and Classification of Multiple Coronal Mass Ejections from Coronagraph Images. In Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV) (p. 1). The Steering Committee of The World Congress in Computer Science, Compute
1046
Lee, g. s. color image segmentation using a morphological gradient-based active contour model.
1047
Gupta, R. K., & Singh, P. (2013). A new way to design and implementation of hybrid crypto system for security of the information in public network. International Journal of Emerging Technology and Advanced Engineering, 3(8), 108-115.
1048
Msvs, B. R., Vardhan, V., & Reddy, P. A noval security model for indic scripts-a case study on Telugu. Int. J. Comput. Sci. Secur.(IJCSS), 3(4), 303.
1049
Sinha, S. K., Shrivastava, M., & Pandey, K. K. (2013). A New Way of Design and Implementation of Hybrid Encryption to Protect Confidential Information from Malicious Attack in Network. system, 6, 7.
1050
Das, D., Lanjewar, U. A., & Sharma, S. J. Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS.
1051
Jain, S. A New Approach of Dynamic Encryption using Steganography.
1052
Ceccucci, W., Peslak, A., Kruck, S. E., & Patricia, S. (2013). DOES GENDER PLAY A ROLE IN TEXT MESSAGING?. Issues in Information Systems, 14(2).
1053
Lewis-Mohabir, B. N. (2013). English Language Butchered: A Study of the Correlational Relationship Between Text Messaging Frequency and the Instance of Jargon in Formal Writing.
1054
Fasola, J. P. (2013). socially assistive and service robotics for older adults: from motivating exercise to following spatial language instructions.
1055
Lazim, h. b. m., & sasitharan, d. what factor persuade malaysians consumer to purchase smartphone?.
1056
Kaur, V., Chattopadhyay, D. P., & Kaur, S. (2013). Study on Extraction of Bamboo Fibres from Raw Bamboo Fibres Bundles Using Different Retting Techniques. Textiles and Light Industrial Science and Technology.
1057
Faruk, I. H. (2013). A Novel Approach of Secure Routing Protocol for Mobile Ad Hoc Network (Doctoral dissertation).
1058
Joshi, M. K., & Lalmandoria, H. A Review On Wireless Adhoc Network Security.
1059
Azad, M., Pal, R., Nautiyal, J., Panday, M., & Kumar, K. Review of Emerging Threats, Vulnerabilities and Techniques of Security on Mobile Ad hoc Networks.
1060
Kazemitabar Amirkolaei, M. (2013). Enhancing Bio-inspired Intrusion Response in Ad-hoc Networks (Doctoral dissertation, Edinburgh Napier Unversity).
1061
Valluvan, K. R. (2013). A Comparative Study of Secure Intrusion-Detection Systems for Discovering Malicious Nodes on MANETs.
1062
Labbai, t. p. m., & rajamani, v. (2013). prevention of worm hole and black hole attacks in secure vbor for mobile ad hoc networks. journal of theoretical and applied information technology, 55(2).
1063
Kalaivani, R., & Thangaraj, P. (2013). An effective technique to identify a river’s stage through satellite images by means of RBFNN. The Imaging Science Journal, 61(3), 279-291.
1064
Medialdea, J. L. G., Manamparan, M. E. C., Sorita, M. G. M., Ponce, E. L., & Beltran Jr, A. A. A Novel Thermal Gas Analyzer Using Adaptive Neuro-Fuzzy Inference System (ANFIS).
1065
Salam, M. S. B. H., Mohamad, D., & Salleh, S. H. S. Connected digit speech segmentation: a malay speech case using statistical approach with insertion reduction using neural network.
1066
Diamant, R., & Lampe, L. (2013). Underwater localization with time-synchronization and propagation speed uncertainties. Mobile Computing, IEEE Transactions on, 12(7), 1257-1269.
1067
Kheirabadi, M. T., & Mohamad, M. M. (2013). Greedy routing in underwater acoustic sensor networks: a survey. International Journal of Distributed Sensor Networks, 2013.
1068
Han, G., Qian, A., Li, X., Jiang, J., & Shu, L. (2013, August). Performance evaluation of localization algorithms in large-scale underwater sensor networks. In Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on (pp. 493-498). IEEE.
1069
Li Zuopeng, Caishao Bin, Zhang Jing, high Zhenguo, & Zhao Jing. (2012). Summary of underwater acoustic sensor network node localization technology. Small Computer Systems, 33 (3), 442-447.
1070
Roee, D. (2013). Spatial reuse scheduling and localization for underwater acoustic communication networks.
1071
Tunaa, G., Gungorb, V. C., Dasc, R., & Gulezd, K. A Survey on Potential Applications of Underwater Acoustic Sensor Networks: Deployment Techniques, Localization Algorithms, and Research Challenges.
1072
Dabbour, M., Alsmadi, I., & Alsukhni, E. (2013). Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT. International Journal of Security and its Applications IJAST, 7(1).
1073
Devaraju, S., & Ramakrishnan, S. (2013). Performance comparison of intrusion detection system using various techniques–A review. ICTACT Journal on Communication Technology, 4(3), 802-812.
1074
Manivannan, S. S., & Sathiyamoorthy, E. An Efficient and Accurate Intrusion Detection System to detect the Network Attack Groups using the Layer wise Individual Feature Set.
1075
Nugroho, H. T., & Wicaksono, B. A. (2013). Utilizing Instant Messaging for Real-Time Notification and Information Retrieval of Snort Intrusion Detection System. ISICO 2013.
1076
Arunachalam, V. P., & Ravichandran, T. A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback. International Journal of Computer Science and Security (IJCSS), 3(4), 272.
1077
Barreto, rdmm right, cyberspace and networks: consumer protection challenges in social commerce.
1078
Nithya, M., & Varadarajan, V. (2013). An Security Architecture for Campus Virtual Organization Using Role Based Access Control. Life Science Journal, 10(7s).
1079
Swain, G., & Lenka, S. K. (2013). Steganography using two sided, three sided, and four sided side match methods. CSI transactions on ICT, 1(2), 127-133.
1080
Swain, G. (2013). Steganography in Digital Images Using Maximum Difference of Neighboring Pixel Values. International Journal of Security & Its Applications, 7(6).
1081
Tayel, M., Shawky, H., & Hafez, A. E. S. (2013, January). A hybrid chaos-fuzzy-threshold steganography algorithm for hiding secure data. In Advanced Communication Technology (ICACT), 2013 15th International Conference on (pp. 156-161). IEEE.
1082
Thanekar, S., & Pawar, S. S. (2013, December). OCTA (STAR) PVD: A different approach of image steganopgraphy. In Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on (pp. 1-5). IEEE.
1083
Solanki, R., Chuahan, M., & Desai, m. survey of image steganography techniques.
1084
Kaur, R., & Kaur, B. A Study and Review of Techniques of Spatial Steganography.
1085
Elangovan, B., Rajesh, K., & Venkateswari, P. (2013). An Efficient Method for High Secured Image Steganography Using Image Segments. International Journal of Applied Engineering Research, 8(12).
1086
Sedeeq, I. T. (2013). Steganography in Colored Images. International Journal of Computer Science and Information Security, 11(4), 87.
1087
Gracy, S. A., & Jayakumar, C. (2013). Identifying and Locating Multiple Spoofing Attackers Using Cluster Analysis. In International Conference on Engineering and Technology (p. 123).
1088
Kovtun, VY , Hnatyuk, S. , & Kinzeryavyy , A. (2013) . Systematics modern methods of computer steganography . Safety information , 19 ( 3), 209-217.
1089
Kumari, P., Kumar, C., & Preeyanshi, J. B. (2013). Data Security Using Image Steganography And Weighing Its Techniques. International Journal of Scientific & Technology Research, 2(11).
1090
Al-Bahadili, H. (2013). A Secure Block Permutation Image Teganography Algorithm. Submitted to the International Journal on Cryptography and Information Security (IJCIS) on 30th July.
1091
Asole, S., & Mundada, M. (2013). A Survey on Securing Databases From Unauthorized Users. Int. J. Sci. Technol. Res, 2(4), 2-4.
1092
Abbasy, M. B., & Ordonez, L. M. L. (2013, March). Single-Sink Mobility Performance Analysis on a Wireless Senosr Networks. In Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on (pp. 407-412). IEEE.
1093
Li, B., Springer, J., Bebis, G., & Gunes, M. H. (2013). A survey of network flow applications. Journal of Network and Computer Applications, 36(2), 567-581.
1094
Chadokar, S. K., Singh, D., & Singh, A. (2013, July). Optimizing network traffic by generating association rules using hybrid apriori-genetic algorithm. In Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on (pp. 1-5). IEEE.
1095
Dhanore, G., & Chaturvedi, S. K. (2013). An Optimization of Association Rule Mining using K-Map and Genetic Algorithm for Large Database. International Journal of Computer Applications, 84(17), 26-31.
1096
Taleb, A. M., Yahya, A. A., & Taleb, N. M. Parallel Genetic Algorithm Model to Extract Association Rules.
1097
Krishnamoorthy, k. pagerank algorithm and genetic algorithm in web mining.
1098
Shankar, S., & Purusothaman, T. (2013). A new utility-emphasized analysis for stock trading rules. Intelligent Data Analysis, 17(2), 271-294.
1099
Dahiya, P., & Jyotsna, M. Swam Based ACO Routing Protocol in MANET.
1100
Sutariya, D., & Kamboj, P. (2013). A Survey of QOS Multicast Routing Protocol for MANET.
1101
Nivetha, S. K., Asokan, R., & Senthilkumaran, N. (2013, July). A swarm-based hybrid routing protocol to support multiple Quality of Service (QoS) metrics in mobile ad hoc networks. In Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on (pp. 1-8). IEEE.
1102
Pourahmad, S., Safarpour, A. R., Bananzadeh, A., Rahimikazerooni, S., & Zabangirfard, Z. (2013). A Pilot study on Prediction of Pouchitis in Ulcerative Colitis Patients by Decision Tree Method Versus Logistic Regression Analysis. Annals of Colorectal Research, 1(2), 67-70.
1103
Gebremeskel, K. (2013). Application of Data Mining Techniques to Predict Customers’ churn at Commercial Bank of Ethiopia (Doctoral dissertation, AAU).
1104
Jahantigh, F. F., Nazarnejad, R., & Jahantigh, M. F. Investigating the Risk Factors for Low Birth Weight Using Data Mining: A Case Study of Imam Ali Hospital, Zahedan, Iran.
1105
Blandón, M. G., Howard, G. M., & Torres, R. (2013). Estudio de Medición de la Actividad de Botnets en la República de Panamá.
1106
LA, A. D. B. E.mario isaac gongora bland on.
1107
Lekova, A., & Adda, M. (2013). Reliable OLSR in MANETs for detecting and isolating user selfish nodes. Complex Control Systems, 11, 1-9.
1108
SAI PRAGATHI, Y. V. S., & Setty, S. P. (2013). HYBRID ANONYMOUS LOCATION-AIDED ROUTING PROTOCOL FOR PRIVACY PRESERVING AND AUTHENTICATION IN MANET. Journal of Theoretical & Applied Information Technology, 55(2).
1109
Bhuvaneshwari, K., & Devaraj, A. F. S. (2013). Examination of Impact of Flooding attack on MANET and to accentuate on Performance Degradation. International Journal of Advanced Networking and Applications, 4(4), 1695.
1110
Seethalakshmi, S., & Manikandan, K. C. (2013). Comparison of Different Methods to identify wormhole attacks in MANETS. International Journal of Advanced Networking and Applications, 4(5), 1760.
1111
Sinnreich, A., Graham, N., & Trammell, A. MONDO NET.
1112
Callegari, C., Giordano, S., Mannella, S., & Pagano, M. (2013). Design and Implementation of a Testbed for the Security Assessment of MANETs. In Cyberspace Safety and Security (pp. 228-242). Springer International Publishing.
1113
Sanaei, M. G., Ghani, I., Hakemi, A., & Jeong, S. R. (2013). ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW. Science International, 25(4).
1114
Sudhakar Sengan, D. S. (2013). A Trust and Co-Operative Nodes with Affects of Malicious Attacks and Measure the Performance Degradation on Geographic Aided Routing in Mobile Ad Hoc Network. Life Science Journal, 10(4s).
1115
Arunachalam, V. P., & Ravichandran, T. A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback. International Journal of Computer Science and Security (IJCSS), 3(4), 272.
1116
Arora, K., & Jindal, S. ANALYTICAL REVIEW OF AODV IN WORM HOLE ATTACK.
1117
Abdul Jawad, P. P., & Chacko, B. ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS.
1118
Ghani, I., Hakemi, A., Jeong, S. R., & Sanaei, M. G. P. (2013). ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW. Science International, 25(4).
1119
Gandhi, R., & Joeg, P. LERP: A Secure Location Based Efficient Routing Protocol.
1120
Panda, P., Gadnayak, K. K., & Panda, N. (2013). MANET Attacks and their Countermeasures: A Survey.
1121
Benghabrit, A., Ouhbi, B., Behja, H., & Frikh, B. (2013, June). Text clustering using statistical and semantic data. In Computer and Information Technology (WCCIT), 2013 World Congress on (pp. 1-6). IEEE.
1122
Suja, K. R., & Raglend, I. J. (2013). Adaptive genetic algorithm/neuro-fuzzy logic controller based unified power quality conditioner controller for compensating power quality problems. Australian Journal of Electrical and Electronics Engineering, 10(3), 351-361.
1123
Chan, G. Y., Lee, C. S., & Heng, S. H. (2013). Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks. Journal of Network and Computer Applications, 36(2), 829-842.
1124
Chandrashekhar, A. M., & Raghuveer, K. (2013). Fortification of hybrid intrusion detection system using variants of neural networks and support vector machines. International Journal of Network Security & Its Applications, 5(1), 71-90.
1125
Husagic-Selman, A., Koker, R., & Selman, S. (2013, October). Intrusion detection using neural network committee machine. In Information, Communication and Automation Technologies (ICAT), 2013 XXIV International Symposium on (pp. 1-6). IEEE.
1126
Parate, S., Nirkhi, S. M., & Dharaskar, R. V. (2013, December). Application of Network Forensics for Detection of Web Attack using Neural Network. In IJCA Proceedings on National Conference on Innovative Paradigms in Engineering & Technology 2013 (No. 2, pp. 28-31). Foundation of Computer Science (FCS).
1127
Chana, G. Y., Leea, C. S., & Hengb, S. H. (2013). peanfis-farm framework in defending against web service attacks.
1128
Hameed, S. M., Saad, S., & AlAni, M. F. (2013). An Extended Modified Fuzzy Possibilistic C-Means Clustering Algorithm for Intrusion Detection. Lecture Notes on Software Engineering, 1(3), 273-278.
1129
Selman, A. H. (2013). Intrusion Detection System using Fuzzy Logic.
1130
Li Nan , Zhang Xuefu & study found that knowledge-based application system related data.
1131
LABBAI, T. P. M., & RAJAMANI, V. (2013). PREVENTION OF WORM HOLE AND BLACK HOLE ATTACKS IN SECURE VBOR FOR MOBILE AD HOC NETWORKS. Journal of Theoretical and Applied Information Technology, 55(2).
1132
Skracic, K., Pale, P., & Jeren, B. (2013, January). Knowledge based authentication requirements. In MIPRO 2012 International Convention Opatija.
1133
van Eekelen, W. A., van den Elst, J., & Khan, V. J. (2013, April). Picassopass: a password scheme using a dynamically layered combination of graphical elements. In CHI'13 Extended Abstracts on Human Factors in Computing Systems (pp. 1857-1862). ACM.
1134
Khan, F. N., & Govil, K. (2013). Distributed Task Allocation Scheme for Performance Improvement in Mobile Computing Network. International Journal of Trends in Computer Science, 2(3), 809-817.
1135
Kamal, S., & Singh, B. H. (2013). Scheduling Of Parallel Constrained Task Graphs On Multiprocessor Systems. American International Journal of Research in Science, Technology, Engineering and Mathematics, 153-158.
1136
Kaur, A., & Kaur, P. (2013). Implementation of Mapping Heuristic Genetic Algorithm. International Journal of Advanced Research in Computer and Communication Engineering, 3224-3229.
1137
Tutueanu, R. I., Pop, F., Vasile, M. A., & Cristea, V. (2013). Scheduling Algorithm Based on Agreement Protocol for Cloud Systems. In Algorithms and Architectures for Parallel Processing (pp. 94-101). Springer International Publishing.
1138
Kaur, P., & Kaur, A. Implementation of Dynamic Level Scheduling Algorithm using Genetic Operators. International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume, 2.
1139
Awadall, M., Ahmad, A., & Al-Busaidi, S. (2013). Min–min GA Based Task Scheduling In Multiprocessor Systems. International Journal of Soft Computing and Engineering (IJSCE). ISSN, 2231-2307.
1140
Vasile, M. A., Pop, F., Tutueanu, R. I., & Cristea, V. (2013). HySARC2: Hybrid Scheduling Algorithm Based on Resource Clustering in Cloud Environments. In Algorithms and Architectures for Parallel Processing (pp. 416-425). Springer International Publishing.
1141
Geetha, T., Mahalakshmi, K., Ummusalma, I., & Kumaran, K. M. (2013). An Observational Analysis of Genetic Operators. International Journal of Computer Applications, 63(18), 24-34.
1142
Kaur, A., & Singh, B. (2013). Enhancement of Power Aware Job Scheduling with Minimum Completion Time Algorithm. International Journal of Engineering Science and Technology, 5(7), 1465.
1143
Na'mneh, A., & Darabkh, K. (2013, November). A new genetic-based algorithm for scheduling static tasks in homogeneous parallel systems. In Robotics, Biomimetics, and Intelligent Computational Systems (ROBIONETICS), 2013 IEEE International Conference on (pp. 46-50). IEEE.
1144
Sivasankar, S., Jeyapaul, R., & Kunhahamed, P. K. (2013). Performance study of tool materials and optimisation of pulse duration on EDM of zirconium di boride. International Journal of Machining and Machinability of Materials, 14(2), 123-141.
1145