Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
Chen-Chi Shing (Radford University - United States of America)
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018
Published by CSC Journals, Kuala Lumpur Malaysia.

CITATION REPORT FOR IJCSS

The Citation Report will be finalized by June 2016. Below calculations are based on in-process citations that are extracted through Google Scholar.


Total Citations = 2080
Self Citations = 5
Total Publications = 299


Citation Impact
(Total Citations - Self Citations) / Total Publications

Citation Impact
(2080 - 5) / 299 = 6.940

 
SR
M-CODE
CITATION
1
Jabbar, M. A., Deekshatulu, B. L., & Chandra, P. (2016). A Novel Algorithm for Utility-Frequent Itemset Mining in Market Basket Analysis. In Innovations in Bio-Inspired Computing and Applications (pp. 337-345). Springer International Publishing.
2
Renza , D., Ballesteros , D. M., & Rincon, R. (2016 ) . Concealment method for steganography image pixel grayscale on color images . Engineering and Science , 12 ( 23) , 145-162.
3
Stephanie, F. L., & Sharma, R. S. (2016). Health on a Cloud: Modeling Digital Flows in an E-health Ecosystem. Journal of Advances in Management Sciences & Information Systems, 2, 1-20.
4
Pillai, J. S., & Padma, T. (2016). The Analysis of PQ Sequences Generated from Continued Fractions for Use as Pseudorandom Sequences in Cryptographic Applications. In Artificial Intelligence and Evolutionary Computations in Engineering Systems (pp. 633-644). Springer India.
5
Singh, K. (2016). Image Steganography Scheme Using Parent Child Relationship in Wavelet Domain. British Journal of Applied Science & Technology, 14(4), 1.
6
Barve, S., Desai, S., & Sardinha, R. (2016).Query-Based Extractive Text Summarization for Sanskrit. In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 (pp. 559-568). Springer India.
7
Shanmuganathan, S. (2016). A Hybrid Artificial Neural Network (ANN) Approach to Spatial and Non-spatial Attribute Data Mining: A Case Study Experience. In Artificial Neural Network Modelling (pp. 443-472). Springer International Publishing.
8
Dhveya, R., & Amudha, T. (2016). Role of Bio-Inspired Optimization in Disaster Operations Management Research. In Innovations in Bio-Inspired Computing and Applications (pp. 565-575). Springer International Publishing.
9
Iwasokun, G. B., & Akinyokun, O. C. Singular-minutiae points relationship-based approach to fingerprint matching.
10
Jamont, J. P. (2016). Démarche, modèles et outils multi-agents pour l'ingénierie des collectifs cyber-physiques (Doctoral dissertation, Université Grenoble Alpes).
11
Adewumi, A. O., & Arasomwan, M. A. (2016). On the performance of particle swarm optimisation with (out) some control parameters for global optimisation. International Journal of Bio-Inspired Computation, 8(1), 14-32.
12
Gkartzonikas , A . , & Theoharatos , D . ( 2016 ) . Discovery Framework Information : particle swarm optimization and optimum stop theory.
13
Viola, A. V., Ese, O. D., & Charles, S. O. A Proposed Hybrid Component Complexity Metrics For Component Based Software Development.
14
Rathore, M. M., Ahmad, A., & Paul, A. (2016). Real time intrusion detection system for ultra-high-speed big data environments. The Journal of Supercomputing, 1-22.
15
Ruuhwan, R., Riadi, I., & Prayudi, Y. (2016). Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone. Jurnal Edukasi dan Penelitian Informatika (JEPIN), 2(1).
16
Al-Fayoumi, A., & Hassan, M. (2016). Interactive Visual Search System Based onMachine Learning Algorithm. International Arab Journal of Information Technology (IAJIT), 13.
17
Tarek, M., Ouda, O., & Hamza, T. (2016). Robust cancellable biometrics scheme based on neural networks. IET Biometrics.
18
Al-Dmour, H., & Al-Ani, A. (2016). Quality optimized medical image information hiding algorithm that employs edge detection and data coding. Computer Methods and Programs in Biomedicine, 127, 24-43.
19
Jahantigh , F Firuzi , due to race , R. , Jahantigh , & M. Firuzi . (2016 ) . Identify , evaluate and rank the risk factors Weight & # 1705 ... Journal of Mazandaran University of Medical Sciences (JMUMS), 25 (133).
20
Rashid, F., Miri, A., & Woungang, I. (2016). Secure image deduplication through image compression. Journal of Information Security and Applications.
21
Md Yunus, N. A., Othman, M., Mohd Hanapi, Z., & Lun, K. Y. (2016). Reliability Review of Interconnection Networks. IETE Technical Review, 1-11.
22
Khanna, N. (2016). Mitigation of Collaborative Blackhole Attack using TRACEROUTE Mechanism with Enhancement in AODV Routing Protocol.
23
Jung, S., & Kumar, R. (2016). Security of Routing Protocols in MANETs: A Survey. Global Sci-Tech, 8(1), 22-36.
24
Pop, F., Tutueanu, R. I., Barbieru, C., Vasile, M. A., & Kolodziej, J. (2016). Adaptive Resource Allocation in Cloud Computing Based on Agreement Protocols. In Intelligent Agents in Data-intensive Computing (pp. 193-213). Springer International Publishing.
25
Anju, P. S., Kuriakose, B., & Paul, V. A Survey On Steganographic Methods Used in Information Hiding.
26
Mubeen, S., Srinath, N. K., & Subramanya, K. N. (2016). Double Securing from Hackers in B2B E-commerce.
27
Opoku-Ansah, J., Eghan, M. J., Anderson, B., Boampong, J. N., & Buah-Bassuah, P. K. (2016). Laser-Induced Autofluorescence Technique for Plasmodium falciparum Parasite Density Estimation. Applied Physics Research, 8(2), 43.
28
Ramesh, M. R., & Reddy, C. S. (2016). a survey on security requirement elicitation methods: classification, merits and demerits. International Journal of Applied Engineering Research, 11(1), 64-70.
29
Bistouni, F., & Jahanshahi, M. (2015). Pars network: a multistage interconnection network with fault-tolerance capability. Journal of Parallel and Distributed Computing, 75, 168-183.
30
Li, D., & Wang, Y. (2015). The Image Retrieval Based on the Hybrid Algorithm of the Primary Color and Color Layout Descriptor.
31
Anchor , & Abdul race. ( 2015). Identify phishing in online banking site using the optimization algorithm inclined plates . Journal of electronic and cyber defense , 3 ( ??1 ).
32
Uzunov, A. V., Falkner, K., & Fernandez, E. B. (2015). A comprehensive pattern-oriented approach to engineering security methodologies. Information and Software Technology, 57, 217-247.
33
Veshkurtsev ,JM model management and monitoring of network elements Telecommunication network using theory of fuzzy sets.
34
Nayebi, F., Abran, A., & Desharnais, J. M. (2015). Automated selection of a software effort estimation model based on accuracy and uncertainty. Artificial Intelligence Research, 4(2), p45.
35
Tripathy, A., Agrawal, A., & Rath, S. K. (2015). Classi?cation of Sentimental Reviews Using Machine Learning Techniques. Procedia Computer Science, 57, 821-829.
36
Bhatia, S., & Attri, V. K. Estimation of Software Development Effort with Machine Learning Approaches: A Review.
37
Tripathya, A., Agrawalb, A., & Rathc, S. K. Classification of Sentimental Reviews Using Machine Learning Techniques.
38
Chen, N. (2015). Research on Detection of Business Constraints based on AOP. International Journal of u-and e-Service, Science and Technology, 8(2), 243-250.
39
An, B., Qu, T., & Qi, H. (2015). Chinese MOOC Search Engine. In Intelligent Computation in Big Data Era (pp. 453-458). Springer Berlin Heidelberg.
40
Kapur, R. K., & Khatri, S. K. (2015, March). Analysis of attacks on routing protocols in MANETs. In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in (pp. 791-798). IEEE.
41
Al-Saeedan, W., & Menai, M. E. B. (2015). Swarm intelligence for natural language processing. International Journal of Artificial Intelligence and Soft Computing, 5(2), 117-150.
42
Alguliyev, R. M., Aliguliyev, R. M., & Isazade, N. R. (2015). an unsupervised approach to generating generic summaries of documents. Applied Soft Computing.
43
Mohamed, K., Pauzi, M. N. M., Ali, F. H. H. M., & Ariffin, S. (2015, August). Linearity Test Framework for S-Box in Block Cipher. In IT Convergence and Security (ICITCS), 2015 5th International Conference on (pp. 1-5). IEEE.
44
McIntosh, H. (2015). Vevo and the Business of Online Music Video Distribution. Popular Music and Society, (ahead-of-print), 1-14.
45
Fatima, M., Ahmad, S. F., & Hasan, M. (2015). Fuzzy Based Software Cost Estimation Methods: A Comparative Study. International Journal for Innovative Research in Science and Technology, 1(7), 287-290.
46
Iraji, M. S. (2015). Fuzzy Agent Oriented Software Effort Estimate with COCOMO.
47
Mohammadpoor, M., & Mehdizadeh, A. An Efficient ECC-based Authentication and Key Agreement Protocol.
48
Verma, K., Shukla, D., & Gangele, S. (2015). Approximating the Probability of Traffic Sharing by Numerical Analysis Techniques between Two Operators in a Computer Network. Open Journal of Computer Science and Information Technology, 3(1), 026-039.
49
Persson, J., & Lundbladh, M. (2015). Våga vara dig själv: Att fo¨rsta° och skapa en illusion av ljus med digitala medier.
50
Olaniyi, O. M., Arulogun, O. T., Omidiora, O. E., & Okediran, O. O. (2015). Implementing generic security requirements in e–voting using modified stegano–cryptographic approach. International Journal of Information and Computer Security, 7(1), 64-90.
51
Omotosho, A., Adegbola, O., Mikail, O. O., & Emuoyibofarhe, J. (2015). A Secure Electronic Prescription System Using Steganography with Encryption Key Implementation. arXiv preprint arXiv:1502.01264.
52
Sathisha, N., Babu, K. S., Raja, K. B., & Venugopal, K. R. (2015). Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT. International Journal of Image Processing (IJIP), 9(2), 41.
53
Patil, P. (2015). encryption for secure sms transmission. Compusoft, 4(6), 1876.
54
Jasuja, B., & Pandya, A. (2015). Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding. International Journal of Computer Applications, 116(21).
55
Kumar, V., & Purusotham, S. (2015). A Lexi-Search Approach of Variant Vehicle Routing Problem. International Journal of Advanced Research in Computer Science, 6(1).
56
Babu, K. S. international journal of engineering sciences & research technology a data guided lexi-serach approach for time dependent travelling salemsman problem.
57
Kundaikar, T. C., & Laxminarayana, J. A. (2015). Efficient Recognition of Devanagari Handwritten Text. In Computational Intelligence in Data Mining-Volume 2 (pp. 81-88). Springer India.
58
Kulkarni, P. P., Patil, S., & Dhanokar, G. (2015). Marathi And Sanskrit Word Identification By Using Genetic Algorithm.
59
Singh, P., Verma, A., & Chaudhari, N. S. (2015). On the Performance Improvement of Devanagari Handwritten Character Recognition. Applied Computational Intelligence and Soft Computing, 2015.
60
Jayakumar, A., Babu, G. S., Raman, R., & Nedungadi, P. (2015, October). Integrating Writing Direction and Handwriting Letter Recognition in Touch-Enabled Devices. In Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015 (Vol. 2, p. 393). Springer.
61
Joshi, D., & Pansare, S. (2015, February). Combination of Multiple Image Features along with KNN Classifier for Classification of Marathi Barakhadi. In Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on (pp. 607-610). IEEE.
62
Dhaka, V. P., & Sharma, M. K. An efficient segmentation technique for Devanagari offline handwritten scripts using the Feedforward Neural Network. Neural Computing and Applications, 1-13.
63
Kabir, K. L., Shafin, M. K., Anannya, T. T., Debnath, D., Kabir, M. R., Islam, M. A., & Sarwar, H. Projection-Based Features: A Superior Domain for Handwritten Bangla Basic Characters Recognition.
64
Ajmire, P. E., Dharaskar, R. V., & Thakare, V. M. Feature Extraction and recognition of Modifiers in Handwritten Marathi (Devanagari) Text.
65
Shing, L., Astacio, J., Figueroa, A., & Shing, C. C. (2015, August). Vulnerabilities of radio frequencies. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on (pp. 2682-2686). IEEE.
66
Kannan, D., & Gobi, M. (2015). An extensive research on robust digital image watermarking techniques: a review. International Journal of Signal and Imaging Systems Engineering, 8(1-2), 89-104.
67
Roy, A. J., & Student, F. Y. U. Emotional Text to Speech Synthesis in Indian Language.
68
Anil, M. C., & Shirbahadurkar, S. D. Expressive Speech Synthesis using Prosodic Modification for Marathi Language.
69
Shrivastava, S., Agrawal, C., & Jain, A. (2015). An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET. arXiv preprint arXiv:1502.04801.
70
Maheswari, R., MCA, M. S. R., & PHIL, M. (2015, March). A Review on Types of Jamming Attack In Mobile Ad-Hoc Network. In Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications.
71
Pandhare, S. S., & Jawandiya, P. M. (2015, March). Security Goals and Attacks in Mobile Ad Hoc Networks: An exclusive survey. In National Conference “CONVERGENCE (Vol. 2015, p. 28).
72
Filipek, J., & Hudec, L. (2015, January). Distributed firewall in Mobile Ad Hoc Networks. In Applied Machine Intelligence and Informatics (SAMI), 2015 IEEE 13th International Symposium on (pp. 233-238). IEEE.
73
Mohammed, A., Sofiane, B. H., & kamel Mohamed, F. (2015). A Cross Layer for Detection and Ignoring Black Hole Attack in MANET.
74
Mittal, V. (2015). Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach. Prevention, 4(5).
75
Paliwal, G., Mudgal, A. P., & Taterh, S. (2015, January). A Study on Various Attacks of TCP/IP and Security Challenges in MANET Layer Architecture. In Proceedings of Fourth International Conference on Soft Computing for Problem Solving (pp. 191-203). Springer India.
76
Dorri, A., Kamel, S. R., & Kheirkhah, E. (2015). Security challenges in mobile ad hoc networks: a survey. arXiv preprint arXiv:1503.03233.
77
Singh, J., Singh, A., & Shree, M. R. (2015). An Assessment of Frequently Adopted Security Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective. Journal of Wireless Network and Microsystems, 4(1-2).
78
Suja, K. R., & Raglend, J. (2015). Cuckoo search (CS)-NFC-based UPQC for compensating voltage sag of nonlinear load. Journal of Experimental & Theoretical Artificial Intelligence, (ahead-of-print), 1-18.
79
Priest, B. W., Vuksani, E., Wagner, N., Tello, B., Carter, K. M., & Streilein, W. W. (2015, April). Agent-based simulation in support of moving target cyber defense technology development and evaluation. In Proceedings of the 18th Symposium on Communications & Networking (pp. 16-23). Society for Computer Simulation International.
80
Wagner, N., Lippmann, R., Winterrose, M., Riordan, J., Yu, T., & Streilein, W. W. (2015, April).Agent-based simulation for assessing network security risk due to unauthorized hardware. In Proceedings of the Symposium on Agent-Directed Simulation (pp. 18-26). Society for Computer Simulation International.
81
Singh, Y., & Chugh, U. Clustering, Information Fusion and Event Detection in Wireless Sensor Networks: A Review.
82
Houngbo, P. J., & Hounsou, J. T. (2015). Measuring Information Security: Understanding And Selecting Appropriate Metrics. International Journal of Computer Science and Security (IJCSS), 9(2), 108.
83
Rani, C., & Goel, S. CSAAES: An Expert System for Cyber Security Attack Awareness.
84
Rasheed, Z. A. S. (2015). ’Steganography Technique for Binary Text Image. International Journal of Science and Research (IJSR) ISSN (Online), 2319-7064.
85
Rubab, S., & Javed, Y. (2015). Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption. International Journal of Computer Network and Information Security (IJCNIS), 7(2), 15.
86
Sahu, P., & Chourasia, B. (2015). State of the Art in Modern Steganography-A review. International Journal of Advanced Electronics and Communication Systems, 4(1).
87
Houngbo, P. J., & Hounsou, J. T. (2015). Measuring Information Security: Understanding And Selecting Appropriate Metrics. International Journal of Computer Science and Security (IJCSS), 9(2), 108.
88
Sen, P., Ahmed, R. A., & Islam, M. R. (2015). A Study on E-Commerce Security Issues and Solutions.
89
Aigbe, P., & Onibere, A. (2015). An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System. International Journal of Computer Applications, 122(18).
90
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handling in the cloud. Computers & Security, 49, 45-69.
91
Amann, P., & James, J. I. (2015). Designing robustness and resilience in digital investigation laboratories. Digital Investigation, 12, S111-S120.
92
Agarwal, R., & Kothari, S. (2015). Review of Digital Forensic Investigation Frameworks. In Information Science and Applications (pp. 561-571). Springer Berlin Heidelberg.
93
Jafari, F., & Satti, R. S. (2015). Comparative Analysis of Digital Forensic Models. Journal of Advances in Computer Networks, 3(1).
94
Satti, R. S., & Jafari, F. (2015). Domain Specific Cyber Forensic Investigation Process Model. Journal of Advances in Computer Networks, 3(1).
95
Jiang, J. G., Yang, B., Lin, S., Zhang, M. X., & Liu, K. Y. (2015, April). A Practical Approach for Digital Forensic Triage. In Applied Mechanics and Materials (Vol. 742, pp. 437-444).
96
Prayudi, Y., & Sn, A. (2015). Digital Chain of Custody: State of the Art. International Journal of Computer Applications, 114(5), 1-9.
97
Satti, R. S., & Jafari, F. (2015). Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes.
98
Saleem, S. (2015). Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics.
99
Mushtaque, K., Ahsan, K., & Umer, A. (2015). DIGITAL FORENSIC INVESTIGATION MODELS: AN EVOLUTION STUDY. JISTEM-Journal of Information Systems and Technology Management, 12(2), 233-243.
100
Mushtaque, K., Ahsan, K., & Umer, A. (2015).Digital Forensic investigation models:an evolution study. JISTEM-Journal of Information Systems and Technology Management, 12(2), 233-243.
101
Kurniati, F. T., Santoso, A. J., & Suyoto, S. (2015).printer forensik untuk identifikasi dokumen cetak. semnasteknomedia online, 3(1), 5-10.
102
Prayudi, Y., & Ashari, A. A Study on Secure Communication for Digital Forensics Environment.
103
KHAWASE, M. D. S.,deshmukh, m., kuche, s., & mahalle, a. international journal of pure and applied research in engineering and technology.
104
Swamy, V., Sampath, S., Nanjesh, B. R., & Sagar, B. B. (2015). Development of Common Parallel Programming Platform for MPI and PVM. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 95-103). Springer India.
105
Yadav, M. R., & Gill, N. S. (2015). Improvement in Performance of RSA Algorithm Using SLSB.
106
Bhanot, R., & Hans, R. (2015). A Review and Comparative Analysis of Various Encryption Algorithms. International Journal of Security & Its Applications, 9(4).
107
Farajallah, M. (2015). Chaos-based crypto and joint crypto-compression systems for images and videos (Doctoral dissertation, UNIVERSITE DE NANTES).
108
Ayokunle, T. B., Ogah, U. S., & Binitie, A. P. (2015). Encryption and Decryption of Messages Using Advanced Encryption Standard and System of Nonlinear Equations. International Journal of Pure and Applied Sciences and Technology, 27(1), 1.
109
Kulkarni, s. international journal of pure and applied research in engineering and technology.
110
Razzak, I. (2015). Malarial Parasite Classification using Recurrent Neural Network. International Journal of Image Processing (IJIP), 9(2), 69.
111
DAS, D., Mukherjee, R., & Chakraborty, C. (2015). Computational microscopic imaging for malaria parasite detection: a systematic review. Journal of microscopy.
112
Razzak, M. I. (2015). Automatic Detection and Classification of Malarial Parasite. International Journal of Biometrics and Bioinformatics (IJBB), 9(1), 1.
113
Savkare, S. S., & Narote, S. P. (2015, January). Automated system for malaria parasite identification. In Communication, Information & Computing Technology (ICCICT), 2015 International Conference on (pp. 1-4). IEEE.
114
Chayadevi, M. L., & Raju, G. T. (2015). Automated Colour Segmentation of Malaria Parasite with Fuzzy and Fractal Methods. In Computational Intelligence in Data Mining-Volume 3 (pp. 53-63). Springer India.
115
Hutagalung, B. T., & Syahputra, A. watermarking citra digital dengan information dispersal algorithm (ida) dan algoritma huffman.
116
Alabaichi, A. M. (2015). A Dynamic 3D S-Box based on Cylindrical Coordinate System for Blowfish Algorithm. Indian Journal of Science and Technology, 8(30).
117
Alabaichi, A., & Salih, A. I. (2015, October). Enhance security of advance encryption standard algorithm based on key-dependent S-box. In Digital Information Processing and Communications (ICDIPC), 2015 Fifth International Conference on (pp. 44-53). IEEE.
118
Pourahmad, S., Azad, M., & Paydar, S. (2015). Diagnosis of Malignancy in Thyroid Tumors by Multi-Layer Perceptron Neural Networks With Different Batch Learning Algorithms. Global Journal of Health Science, 7(6), p46.
119
Jasim, O. K., Abbas, S., Horbaty, E. S. M., & Salem, A. B. M. (2015). Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm. arXiv preprint arXiv:1503.04796.
120
Kazlauskas, K., Vaicekauskas, G., & Smaliukas, R. (2015). An Algorithm for Key-Dependent S-Box Generation in Block Cipher System. INFORMATICA, 26(1), 51-65.
121
Shing, L. P., Shing, L. H., Shing, M. L., & Shing, C. C. (2015). modeling data integrity under stochastic linear constraints. International Journal of Electronic Commerce Studies, 6(2), 233-242.
122
Kariuki, P. (2015). generic process model for android smartphones live memory forensics (Doctoral dissertation).
123
Jeon, S., Fujita, H., & Toshiyoshi, H. (2015). A MEMS-based interactive laser scanning display with a collocated laser range finder. IEICE Electronics Express, 12(10), 20150072-20150072.
124
Fister, I., Ljubic, K., Suganthan, P. N., & Perc, M. (2015). Computational intelligence in sports: Challenges and opportunities within a new research domain. Applied Mathematics and Computation, 262, 178-186.
125
Korhonen, H. (2015). Improving Transparency in Demand-Supply Chain With Visual Business Intelligence Tools.
126
Alhirz, H., & Sajeev, A. S. M. (2015). Do cultural dimensions differentiate ERP acceptance? A study in the context of Saudi Arabia. Information Technology & People, 28(1), 163-194.
127
Almishal, A., & Alsaud, M. A. (2015). Implementing ERP Systems in Government: Case Study of Saudi Organization. Lecture Notes on Software Engineering, 3(2), 120.
128
Hammad, J. (2015). A Comparative Study between Various Sorting Algorithms. IJCSNS, 15(3), 11.
129
Bjeljac, P., Zecevic, I., & Perisic, B. (2015, May). Integrating Learning Management System and Faculty Information System-service oriented approach. In Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2015 38th International Convention on (pp. 773-777). IEEE.
130
Kavila, S. D., & Radhika, Y. (2015).Extractive Text Summarization Using Modified Weighing and Sentence Symmetric Feature Methods.
131
Loto, m., & durán, e. B. (2015). Diseño de una aplicación móvil personalizada de apoyo al aprendizaje de redes de computadoras. In x congreso sobre tecnología en educación & educación en tecnología (te & et)(corrientes, 2015).
132
Koondhar, m. Y., rind, m. M., chandio, f. H., & shah, a. (2015). Pervasive learning environment with emerging technologies and learning transformation. In international multi-topic conference.
133
Mohy, N. N., Mokhtar, H. M., & El-Sharkawi, M. E. (2015, July).Delegation enabled provenance-based access control model. In Science and Information Conference (SAI), 2015 (pp. 1374-1379). IEEE.
134
Dewi, D. (2015).Identifikasi goresan dasar mandarin dengan metode multilayer perceptron.CSRID Journal, 7(1), 12-23.
135
Yadav, M., & Dhankhar, A. (2015). A-Review on Image Steganography. International Journal for Innovative Research in Science and Technology, 2(2), 243-248.
136
Yahlali, M., & Chouarfia, A. (2015). Towards a software component assembly evaluation. Software, IET, 9(1), 1-6.
137
Aigbe, P., & Onibere, A. (2015).An Immediate Real Time Detection and Prevention of Double-Spending in Electronic Cash Payment System. International Journal of Computer Applications, 122(18).
138
Alhazmi, O. H. Evaluating Disaster Recovery Plans Using Computer Aided Disaster Recovery Tools.
139
Das, S., & Ghosh, R. (2015). Study of randomness in AES ciphertexts produced by various types of dynamic S-boxes. International Journal of Information and Communication Technology, 7(6), 537-561.
140
Kaur, P. J., Kaul, V., Bharadi, V. A., & Narayankhedkar, S. K. Article: Development of Security Enhancement Techniques for 3G/4G Networks}. In IJAIS Proceedings on International Conference and Workshop on Communication, Computing and Virtualization} (pp. 41-46).
141
Kalaiselvi, K., & Mangalam, H. (2015). Power efficient and high performance VLSI architecture for AES algorithm. Journal of Electrical Systems and Information Technology.
142
Vaicekauskas, G. BLOKINIŲ ŠIFRŲ ANALIZĖ IR KOKYBĖS PAGERINIMAS.
143
Ahamed, S. K., Naidu, M. M., & Reddy, C. S. R. (2015). MOST INFLUENTIAL OBSERVATIONS-SUPER EFFICIENCY. International Journal on Computer Science and Engineering, 7(9), 82.
144
Ibrahim, M. H. AATCT: Anonymously Authenticated Transmission on the Cloud with Traceability. International Journal of Advanced Computer Science & Applications, 1(6), 251-259.
145
Pan Lan Lan Yuchi school Biao , Huan Lei , institutions, & statistics . (2015 ) . A rapid assessment authoritative DNS DDoS attacks impact on the way services Computer Application Research , 32 ( 11 ) , 3456-3459
146
Nagarajan, P., & Perumal, G. (2015). Detection of Denial of Service Attack in Cloud using Fuzzy Time Series Analysis and EM Algorithm. International Journal of Advancements in Computing Technology, 7(5), 25.
147
KARIMIZADEH, M. M., RAFEAZADEH, E., AMIRI, P., & KHOLGHNIK, D. (2015). Enhancing and Optimization Sorting Algorithms: An Empirical Study. Cumhuriyet Science Journal, 36(6), 254-266.
148
Faujdar, N., & Ghrera, S. P. (2015, April). Analysis and Testing of Sorting Algorithms on a Standard Dataset. In Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on (pp. 962-967). IEEE.
149
Biedermann, S. (2015). Transparent Security Services for an Infrastructure-as-a-Service Cloud.
150
Redundancy, m. (2015). selection of robust feature subsets for phish webpage prediction using maximum relevance and minimum redundancy criterion. journal of theoretical and applied information technology, 81(2).
151
Yaramasa, T., & Kishore, G. K. (2015, January). Enhanced Privacy and Surveillance for Online Social Networks. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 189-196). Springer International Publishing.
152
Khalane, V. P., & Bhadade, U. S. A Review on Encryption Techniques in Signal Processing.
153
Khan, M., Jamil, A., Haleem, F., Zahoor, J., Muhammad, S., & Sung Wook, B. (2015). A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. KSII Transactions on Internet and Information Systems (TIIS), 9(5), 1938-1962.
154
Muhammad, K., Ahmad, J., Sajjad, M., & Zubair, M. (2015). Secure Image Steganography using Cryptography and Image Transposition. arXiv preprint arXiv:1510.04413.
155
Muhammad, K., Sajjad, M., Mehmood, I., Rho, S., & Baik, S. W. (2015). A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools and Applications, 1-27.
156
Al-Dmour, H., & Al-Ani, A. (2015, November). A Medical Image Steganography Method Based on Integer Wavelet Transform and Overlapping Edge Detection. In Neural Information Processing (pp. 436-444). Springer International Publishing.
157
Olaniyi, O. M., Arulogun, O. T., Omidiora, O. E., & Okediran, O. O. (2015). Implementing generic security requirements in e–voting using modified stegano–cryptographic approach. International Journal of Information and Computer Security, 7(1), 64-90.
158
Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., & Okediran, O. O. (2015). Enhanced Stegano-Cryptographic Model for Secure Electronic Voting. Journal of Information Engineering and Applications, 5(4), 1-15.
159
Badhan, S., & Juneja, M. (2015). A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks. In Intelligent Computing, Communication and Devices (pp. 183-190). Springer India.
160
Mehndiratta, A. (2015). Data Hiding System Using Cryptography & Steganography: A Comprehensive Modern Investigation.
161
Wahab, O. F. A., Badawy, M. B., Elshakankiry, O. A., & El-sayed, H. S. (2015). Utilizations of Reversible Lossless Data Hiding Techniques in Video Sequences. Int. J. Com. Net. Teach, 3(1).
162
Din, R., Yusof, S. A. M., Amphawan, A., Hussain, H. S., Yaacob, H., Jamaludin, N., & Samsudin, A. (2015). Performance Analysis on Text Steganalysis Method Using A Computational Intelligence Approach. Proceeding of the Electrical Engineering Computer Science and Informatics, 2(1).
163
Azizifard, A., Qermezkon, M., & Farshidi, R. Information Steganography within 3D Images Using Residue Number System.
164
Deepa, S., & Umarani, R. (2015). A Prototype for Secure Information using Video Steganography. image, 4(8).
165
Liu, L., Chang, C. C., & Wang, A. (2015). Reversible data hiding scheme based on histogram shifting of n-bit planes. Multimedia Tools and Applications, 1-16.
166
Ahmad, M., Jung, L. T., & Bhuiyan, M. A. A. (2015). On Fuzzy Semantic Similarity Measure for DNA Coding. Computers in Biology and Medicine.
167
Anvary, M. D., Feshki, M. G., & Ahrabi, A. A. A. (2015). Efficient Security Alert Management System. International Journal of Computer Science and Security (IJCSS), 9(4), 218.
168
Feshki, M. G., Sojoodi, O., & Anvary, M. D. (2015). Managing Intrusion Detection Alerts Using Support Vector Machines. International Journal of Computer Science and Security (IJCSS), 9(5), 266.
169
Rai, P. K., & Singh, P. (2015). Studies and Analysis of Popular Database Models.
170
Khadka, I. The accuracy of location services and the potential impact on the admissibility of GPS Based evidence in court cases.
171
Chuchuen, C., & Chanvarasuth, P. (2015). Relationship between Phishing Techniques and User Personality Model of Bangkok Internet Users.
172
Jain, A., & Buksh, B. Advance Trends in Network Security with Honeypot and its Comparative Study with other Techniques.
173
Babatunde, I. G. (2015). Fingerprint Matching Using Minutiae-Singular Points Network. International Journal of Signal Processing, Image Processing and Pattern Recognition, 8(2), 375-388.
174
Narayanan, R. C. Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Recognition Biometric System.
175
Patel, A. (2015). Risk based prioritization of Asthma Burden Using Artificial Neuro Fuzzy Inference System.
176
Chowdhury, C. R., & Saha, B. (2015). Efficient Fingerprint Matching Based Upon Minutiae Extraction. International Journal of Advanced Computer Research, 5(21), 347.
177
Ahmad, F., Darbari, M., & Asthana, R. (2015). Different Approaches of Soft Computing Techniques (Inference System) which are used in Clinical Decision Support System for Risk based Prioritization. Asian Journal of Computer and Information Systems, 3(1).
178
Iwasokun, G. B., Udoh, S. S., & Akinyokun, O. K. (2015). Multi-Modal Biometrics: Applications, Strategies and Operations. Global Journal of Computer Science and Technology, 15(2).
179
Owusu, E., Gavua, E. K., & Zhan, Y. Z. (2015). Facial Expression Recognition–A Comprehensive Review. The Fourth Edition of the International Journal of Technology and Management Research, 1(4), 29-46.
180
Tamimi, A. A., AL-Allaf, O. N., & Alia, M. A. (2015). Real-Time Group Face-Detection for an Intelligent Class-Attendance System.
181
Anissa, B., Naouar, B., Arsalane, Z., & Jamal, K. (2015, March). Face recognition:Compar ative study between linear and non linear dimensionality reduction methods. In Electrical and Information Technologies (ICEIT), 2015 International Conference on (pp. 224-228). IEEE.
182
Vijayalakshmi, V., Sharmila, R., & Shalini, R. (2015, March). Hierarchical key management scheme using Hyper Elliptic Curve Cryptography in Wireless Sensor Networks. In Signal Processing, Communication and Networking (ICSCN), 2015 3rd International Conference on (pp. 1-5). IEEE.
183
Tomar, G. S., Kevre, P., & Shrivastava, L. Energy model based Performance Analysis of cluster based wireless sensor network.
184
Ye, F., Qian, Y., & Hu, R. Q. (2015). HIBaSS: hierarchical identity-based signature scheme for AMI downlink transmission. Security and Communication Networks.
185
Aboud, S., & Al-fayoumi, M. (2012). proxy signature scheme for warrant partial delegation. In The International Conference on Computing, Networking and Digital Technologies (ICCNDT2012) (pp. 107-113). The Society of Digital Information and Wireless Communication.
186
Jain, M., & Tripathi, K. C. Auto Associative Neural Networks for Nonlinear Principal Components Analysis of Sea Surface Temperature Anomalies in Indian Ocean.
187
Fayed, S., Youssef, S. M., El-Helw, A., Patwary, M., & Moniri, M. (2015). Adaptive compressive sensing for target tracking within wireless visual sensor networks-based surveillance applications. Multimedia Tools and Applications, 1-25.
188
Kishore, N. (2015). Parllel hashing algorithms for security and Forensic Applicatons.
189
Fasola, O. S. (2015). Perceptions and acceptance of librarians towards using Facebook and Twitter to promote library services in Oyo State, Nigeria. The Electronic Library, 33(5), 870-882.
190
Claybaugh, C. C., Haried, P., & Yu, W. B. (2015). Diffusion of a Professional Social Network: Business School Graduates in Focus. International Journal of Human Capital and Information Technology Professionals (IJHCITP), 6(4), 80-96.
191
Caldwell, J. M. (2015). Going where students are: comparing faculty and student uses and perceptions of social networking in higher education.
192
Borena, B., Belanger, F., & Egigu, D. (2015, January). Information Privacy Protection Practices in Africa: A Review Through the Lens of Critical Social Theory. In System Sciences (HICSS), 2015 48th Hawaii International Conference on (pp. 3490-3497). IEEE.
193
Larsen, E. S. H., & Seim, G. G. (2015). Entering a Developing Country with a Solar Cooker: Strategies for Start-ups.
194
Jhaveri, R. H., & Patel, N. M. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks, 1-18.
195
Mahajan, N., Bedi, R., & Gupta, S. K. Defending Against Byzantine and Resource Consumption Attacks by Malicious Nodes in MANETs.
196
Mittal, V. (2015). Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach. Prevention, 4(5).
197
Yadav, N. A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks.
198
Sharma, M., & Singla, R. Impact of Jamming Attack in Performance of Mobile Ad hoc Networks.
199
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1.
200
Caselli, M., Zambon, E., & Kargl, F. (2015, April). Sequence-aware Intrusion Detection in Industrial Control Systems. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (pp. 13-24). ACM.
201
Feshki, M. G., Sojoodi, O., & Anvary, M. D. (2015). Managing Intrusion Detection Alerts Using Support Vector Machines. International Journal of Computer Science and Security (IJCSS), 9(5), 266.
202
Anvary, M. D., Feshki, M. G., & Ahrabi, A. A. A. (2015). Efficient Security Alert Management System. International Journal of Computer Science and Security (IJCSS), 9(4), 218.
203
Gunduz, S., Arslan, B., & Demirci, M. (2015, December).A Review of Machine Learning Solutions to Denial-of-Services Attacks in Wireless Sensor Networks. In 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA) (pp. 150-155). IEEE.
204
Chaudhry, M. T., & Sher, M. Secure Group Based Biometric Authentication Approach for Mobile Ad hoc Networks.
205
Padma, T., Pillai, J. S., & Ambili, P. S. Continued Fraction Based Sequences for Content Based Image Authentication.
206
Pillai, J. S., & Padma, T. ParQuoSCI: Pseudorandom Partial Quotient Sequences for Content based Image Authentication.
207
Tazir, M. L., Azouaoui, O., Hazerchi, M., & Brahimi, M. (2015, July). Mobile robot path planning for complex dynamic environments. In Advanced Robotics (ICAR), 2015 International Conference on (pp. 200-206). IEEE.
208
Mobadersany, P., Khanmohammadi, S., & Ghaemi, S. A fuzzy multi-stage path-planning method for a robot in a dynamic environment with unknown moving obstacles. Robotica, 1-17.
209
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1.
210
Anchor, Nafisa, & Abdul race. (2015). Identify phishing websites in internet banking using optimization algorithm inclined pages. Electronic and cyber defense Journal, 3 (1).
211
Idris, M. I. A., Elsid, A. G., & Alhady, M. N. (2015). Enhancement the Ad-hoc On-demand Distance Vector of Network.
212
Elizabeth Jim, L., & Gregory, M. A. (2015, November). State analysis of Mobile Ad Hoc Network nodes. In Telecommunication Networks and Applications Conference (ITNAC), 2015 International (pp. 314-319). IEEE.
213
Yibyeonggwan , and jeongeunhui . (2015) . Efficient wormhole attack detection and removal techniques designed for the safe route on VANET. Security Engineering Research Institute Journal of Security Engineering, 12 (4), 415-426.
214
Bhatta, J., & Pandey, L. P. (2015, December). Performance analysis of various optimization techniques for elliptic curve cryptosystems on resource-constrained devices. In 2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA) (pp. 1-7). IEEE.
215
Zellagui, M., Benabid, R., Boudour, M., & Chaghi, A. (2015). Mixed Integer Optimization of IDMT Overcurrent Relays in the Presence of Wind Energy Farms Using PSO Algorithm. Periodica Polytechnica-Electrical Engineering and Computer Science, 59(1), 7-19.
216
Khurana, M., & Massey, K. (2015). Swarm algorithm with adaptive mutation for airfoil aerodynamic design. Swarm and Evolutionary Computation, 20, 1-13.
217
Neshat, M., & Sepidname, G. (2015). A new hybrid optimization method inspired from swarm intelligence: Fuzzy adaptive swallow swarm optimization algorithm (FASSO). Egyptian Informatics Journal, 16(3), 339-350.
218
Adewumi, A. O., & Arasomwan, M. A. (2015). Improved Particle Swarm Optimizer with Dynamically Adjusted Search Space and Velocity Limits for Global Optimization. International Journal on Artificial Intelligence Tools.
219
Chenshou Wen. (2015) based on the centroid and adaptive inertia weight index improved particle swarm optimization. Computer Engineering and Applications, 51 (5).
220
Chenshou Wen . ( 2015 ) . Based on the centroid and adaptive inertia weight index improved particle swarm algorithm . Journal of Computer Applications , 35 ( 3 ) , 675-679.
221
Kessentini, S., & Barchiesi, D. Particle Swarm Optimization with Adaptive Inertia Weight.Chen, R. M., & Huang, S. C. (2015, August). Particle swarm optimization for scheduling problems by curve controlling based global communication topology. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on (pp. 1716-1720). IEEE.
222
Yang, C. T. (2015). Based on plant location and to adapt to deviate from the value of the governor enhanced particle swarm optimization method . Kung University Thesis Institute of Information Management , 1-60 .
223
Iwasokun, G. B., Udoh, S. S., & Akinyokun, O. K. (2015). Multi-Modal Biometrics: Applications, Strategies and Operations. Global Journal of Computer Science and Technology, 15(2).
224
Mijac, M., & Stapic, Z. (2015, January). Reusability Metrics of Software Components: Survey. In Central European Conference on Information and Intelligent Systems (p. 221). Faculty of Organization and Informatics Varazdin.
225
Mijac, M., & Stapic, Z. (2015, January). Reusability Metrics of Software Components: Survey. In 26th Central European Conference on Information and Intelligent Systems (CECIIS 2015).
226
Mandala, S., Ngadi, M. A., Sharif, J. M., Zahid, M. S. M., & Mohamed, F. (2015). Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks. International Journal of Embedded Systems, 7(3-4), 296-305.
227
Hussain, M. A. (2015). Energy Efficient Intrusion Detection Scheme with Clustering for Wireless Sensor Networks. TELKOMNIKA Indonesian Journal of Electrical Engineering, 15(1), 128-141.
228
masoud Javidi, M., & Aliahmadipour, L. (2015). Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs. Computer Engineering and Applications, 4(1).
229
Samaras, N. S., Kokkinos, K., Chaikalis, C., & Vlachos, V. (2015). On intrusion detection in opportunistic networks. International Journal of Innovation and Regional Development, 6(3), 222-242.
230
Meenatchi, I., & Palanivel, K. An Enhanced Cross layer intrusion detection and adaptive response mechanism for MANETs.
231
EL MOURABIT, Y. O. U. S. E. F., toumanari, a., bouirden, a., & el moussaid, n. a. d. i. a. (2015). a comparative evaluation of intrusion detection techniques in wireless sensor network. journal of theoretical & applied information technology, 76(1).
232
Jacobs, M., Chang, L. C., Pulkkinen, A., & Romano, M. (2015). Automatic analysis of double coronal mass ejections from coronagraph images. Space Weather, 13(11), 761-777.
233
RAVI, M., & basavaprasad, b. a comparative study on segmentation methods for medical imaging.
234
Alimi, I. A., & Aboderin, O. (2015). Enhanced encryption algorithm based on a modified confusion and diffusion scheme. American Journal of Mobile Systems, Applications and Services, 1(1), 20-29.
235
Saqib, Z., Shahid, M. A., & Ashraf, M. U. Encryption and Decryption Using Automata Theory.
236
Gandhi, R. A., & Gosai, A. M. (2015). A Study on Current Scenario of Audio Encryption. International Journal of Computer Applications, 116(7), 13-17.
237
Amounas, f. international journal of engineering sciences & research technology a multi-level approach of elliptic curve cryptosystem for enhanced security of amazigh alphabet using cellular automata.
238
Prasad, M. R. (2015). Improving RGB Data Security with Advance Cryptography Algorithm.
239
Gosai, D. A. M. (2015). International Journal of Computer Applications.
240
Kalidasan, S., & Pandian, P. Available Online through Research Article www. ijptonline. com.
241
Wong, C. H. H. (2015). A study of mobile learning for Guangzhou’s University students.
242
Srivastava, S., & Misra, M. (2015). Tracking technology trajectory through regression modelling: a retrospective techno-analysis. Technology Analysis & Strategic Management, 27(4), 420-436.
243
Sumathi, A., & Sundaram, B. V. (2015). An ANN Approach in Ensuring CIA Triangle using an Energy based Secured Protocol E-AODV for Enhancing the Performance in MANETS. Indian Journal of Science and Technology, 8(34).
244
Das, J., & Das, P. (2015). An Overview of Wireless Ad hoc Networks. International Journal of Advanced Research in Computer Science, 6(1).
245
Naheed, M., Mahmood, H., & Murtza, I. (2015, October). Secure multipath routing using link compromise metric in mobile ad hoc networks. In Electrical Engineering (RAEE), 2015 Symposium on Recent Advances in (pp. 1-5). IEEE.
246
Chauhan, A., Rani, P., & Student, M. T. A Detail Review of Routing Attacks in Mobile Ad Hoc Networks.
247
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1.
248
Jin-peng, Q., Jie, Q., Fang, P., & Tao, G. (2015, July). Multi-channel detection for abrupt change based on the Ternary Search Tree and Kolmogorov statistic method. In Control Conference (CCC), 2015 34th Chinese (pp. 4968-4973). IEEE.
249
Akila, A., & Chandra, E. (2015). Word based tamil speech recognition using temporal feature based segmentation. ictact Journal on Image & Video Processing, 5(4).
250
Ramli, I. (2015). Regular paper Sentence boundary detection without speech recognition: A case of an under-resourced language. J. Electrical Systems, 11(3), 308-318.
251
Das, A. P., & Thampi, S. M. (2015, August). Secure communication in mobile underwater wireless sensor networks. In Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on (pp. 2164-2173). IEEE.
252
Ramezani, H., Fazel, F., Stojanovic, M., & Leus, G. (2015). Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization.
253
Carneiro, J. H. C. C. (2015). localização de emissores acústicos em ambientes submarinos com redes de sensores móveis (doctoral dissertation, universidade federal do rio de janeiro).
254
Dell'Erba, R. (2015). Determination of Spatial Configuration of an Underwater Swarm with Minimum Data. Int J Adv Robot Syst, 12, 97.
255
Houngbo, P. J. (2015). Network Security: Experiment of Network Health Analysis At An ISP. International Journal of Computer Science and Security (IJCSS), 9(1), 1.
256
Emam, M. M., Aly, A. A., & Omara, F. A. A Modified Image Steganography Method based on LSB.
257
Thanekar, S. A. (2015). Eight Pixel Pairs Value Differencing Image Steganography. IJETT, 2(1).
258
Sakthivel, S. M., & Ravi Sankar, A. (2015, February). A VLSI architecture for watermarking of grayscale images using weighted median prediction. In Electronics and Communication Systems (ICECS), 2015 2nd International Conference on (pp. 1128-1131). IEEE.
259
Amsaveni, A., & Vanathi, P. T. (2015). A comprehensive study on image steganography and steganalysis techniques. International Journal of Information and Communication Technology, 7(4-5), 406-424.
260
Deshmukh, M. A. P., & Suralkar, S. R. (2015). Literature Survey-Digital Watermarking on Camera Captured Color Images.
261
Manjula, G. R., & Danti, A. (2015). A novel hash based least significant bit (2-3-3) image steganography in spatial domain. arXiv preprint arXiv:1503.03674.
262
Swain, G., & Lenka, S. K. (2015). A novel steganography technique by mapping words with LSB array. International Journal of Signal and Imaging Systems Engineering, 8(1-2), 115-122.
263
Al-Hada, M., Naser, A. M., & Al-Thamary, M. Hide Image in Image Based on LSB Replacement and Arnold Transform.
264
Tajuddin, T. B., & Manaf, A. A. Forensic Investigation and Analysis on Digital Evidence Discovery through Physical Acquisition on Smartphone.
265
Martin, K. K. (2015). An Investigation of Digital Forensic Models Applicable in the Public Sector (A case of Kenya National Audit Office) (Doctoral dissertation).
266
Lin, T. S., Lin, I. L., & Leu, F. Y. (2015, July). Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015 9th International Conference on (pp. 420-425). IEEE.
267
Rauter, S., Fister, I., & Fister Jr, I. (2015). How to Deal with Sports Activity Datasets for Data Mining and Analysis: Some Tips and Future Challenges. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 7(2), 27-37.
268
Antonio, T., & Paramita, A. S. (2015). Feature Selection Technique Impact for Internet Traffic Classification Using Naïve Bayesian. Jurnal Teknologi, 72(5).
269
Paramita, A. S. (2014). Feature Selection Technique Using Principal Component Analysis For Improving Fuzzy C-Mean Internet Traffic Classification. Australian Basic and Applied Sciences (AJBAS): 2014 International on Engineering Conference on Sciences and Technology Innovation–ISSN: 1997-8178–American-Eurasian Network for Scientific Information (AENSI).
270
Paramita, A. S. (2016). Principal Feature Selection Impact for Internet Traffic Classification Using Naïve Bayes. In Proceedings of Second International Conference on Electrical Systems, Technology and Information 2015 (ICESTI 2015) (pp. 475-480). Springer Singapore.
271
Mayilvaganan, M., & Geethamani, G. S. A Preliminary Survey on Genetic Algorithm Techniques.
272
Persis, D. J., & Robert, T. P. (2015). Ant Based Multi-objective Routing Optimization in Mobile AD-HOC Network. Indian Journal of Science and Technology, 8(9), 875-888.
273
Joardar, S., Bhattacherjee, V., & Giri, D. (2015). SiCaL: a swarm inspired congestion aware probabilistically load balance routing in MANETs. International Journal of Information and Communication Technology, 7(6), 585-606.
274
Sensarma, D. (2015). AQTR: The Ant Based Qos Aware Improved Temporally Ordered Routing Algorithm for Manets. Available at SSRN 2556278.
275
Karthikeyan, P., & Baskar, S. (2015). Genetic algorithm with ensemble of immigrant strategies for multicast routing in Ad hoc networks. Soft Computing, 19(2), 489-498.
276
Cao, M. S., Pan, L. X., Gao, Y. F., Novák, D., Ding, Z. C., Lehký, D., & Li, X. L. Neural network ensemble-based parameter sensitivity analysis in civil engineering systems. Neural Computing and Applications, 1-8.
277
Ravi, V., Koparkar, S., Raju, N. P., & Sridher, S. (2015). Improving retail banking loans recovery via data mining techniques: a case study from Indian market. International Journal of Electronic Customer Relationship Management, 9(2-3), 189-201.
278
Teshnizi, S. H., & Ayatollahi, S. M. T. (2015). A Comparison of Logistic Regression Model and Artificial Neural Networks in Predicting of Student’s Academic Failure. Acta Informatica Medica, 23(5), 296.
279
Senthilkumar, D., & Paulraj, S. Prediction of Low Birth Weight Infants and Its Risk Factors Using Data Mining Techniques.
280
Jain, N., Sharma, A., & Sharma, A. Nav view search.
281
Yunus, N. A. M., & Othman, M. (2015). Reliability Evaluation for Shuffle Exchange Interconnection Network. Procedia Computer Science, 59, 162-170.
282
Gangele, S., & Dongre, A. (2015). Area Estimation for Web Browsing Performance of Users by Applying Numerical Method. International Journal of Computer Applications, 120(9), 6-11.
283
Patidar, B., & Shivhare, R. R. (2015). Detection of Wormhole Attack using Round Trip Time and Node Workload. International Journal of Computer Applications, 112(11).
284
Ramana, V. V., & Reddy, A. R. M. (2015). Secure routing in MANETs: a bio–inspired approach with honey bees. International Journal of Wireless and Mobile Computing, 8(1), 82-89.
285
Lakshmi, A. A., & Valluvan, K. R. (2015). Support vector machine and fuzzy-based intrusion detection and prevention for attacks in MANETs. International Journal of Mobile Network Design and Innovation, 6(2), 63-72.
286
Schoofs, M. HIV VULNERABILITY FOUND via STOCK MARKET ANALYSIS.
287
Singh, N., & Shrivastava, L. (2015). Impact of Antenna model with the variation of speed for Reactive and Hybrid routing protocols in Mobile Ad-Hoc Networks.
288
Rajkumar, B., & Narsimha, G. (2015). Trust-based light weight authentication routing protocol for MANET. International Journal of Mobile Network Design and Innovation, 6(1), 31-39.
289
Sardana, A., Saini, A., Bedwal, T., & Tayal, R. (2015, March). Black hole attack's effect mobile ad-hoc networks (MANET). In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in (pp. 966-970). IEEE.
290
Xiong, X., Feng, J., & Jiang, L. (2015, October). Automatic digital modulation classification for ORS satellite relay communication. In Wireless Communications & Signal Processing (WCSP), 2015 International Conference on (pp. 1-5). IEEE.
291
Hussain, J., Lalmuanawma, S., & Chhakchhuak, L. (2015). A Novel Network Intrusion Detection System Using Two-Stage Hybrid Classification Technique. IJCCER, 3(2), 16-27.
292
Mansouri, m., golsefid, m. t., & nematbakhsh, n. (2015). a hybrid intrusion detection system based on multilayer artificial neural network and intelligent feature selection. cumhuriyet science journal, 36(3), 2686-2692.
293
JAWANJAL, S. D. INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY.
294
Chaczko, Z., Jacak, W., & Luba, T. (2015). Computational Intelligence and Efficiency in Engineering Systems (Vol. 595). G. Borowik (Ed.). Springer.
295
Dhankar, M. (2015). Network Security-Authentication Methods and Firewall. IITM Journal of Management and IT, 6(1), 73-79.
296
Sekulski, R., & Woda, M. (2015). Authorial, Adaptive Method of Users’ Authentication and Authorization. In Computational Intelligence and Efficiency in Engineering Systems (pp. 171-184). Springer International Publishing.
297
Sekulski, R., & Woda, M. (2015). A Novel Approach to Users Authentication and Authorization. Studia Informatica, 36(2), 5-22.
298
Aujla, S., & Ummat, A. Task scheduling in Cloud Using Hybrid Cuckoo Algorithm. International Journal of Computer Networks and Applications (IJCNA), 2(3), 144-150.
299
Mao, Y., Zhong, H., & Li, X. (2015, August). Hierarchical model-based associate tasks scheduling with the deadline constraints in the cloud. In Information and Automation, 2015 IEEE International Conference on (pp. 268-273). IEEE.
300
Neves, D., Lourenco, N., & Horta, N. (2015, September). Scheduling evaluation tasks for increased efficiency of parallel analog IC synthesis. In Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design (SMACD), 2015 International Conference on (pp. 1-4). IEEE.
301
Pop, F., Dobre, C., Cristea, V., Bessis, N., Xhafa, F., & Barolli, L. (2015). Reputation-guided evolutionary scheduling algorithm for independent tasks in inter-clouds environments. International Journal of Web and Grid Services, 11(1), 4-20.
302
Kalra, M., & Singh, S. (2015). A review of metaheuristic scheduling techniques in cloud computing. Egyptian Informatics Journal, 16(3), 275-295.
303
Hashimi, H., Hafez, A., & Mathkour, H. (2015). Selection criteria for text mining approaches. Computers in Human Behavior, 51, 729-733.
304
El-Said, A. M., ELDESOKY, A., & Arafat, H. A. (2015). An Efficient Approach to Construct Object Model of Static Textual Structure with Dynamic Behavior Based on Q-learning. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 31(4), 1267-1289.
305
Priest, B., Vuksani, E., Wagner, N., Tello, B., Carter, K. M., & Streilein, W. W. Agent-Based Decision Support for Moving Target Technology Deployment.
306
Kaur, R., & Prabha, E. C. a novel technique of image steganography.
307
Ujianto, e., harjoko, a., wardoyo, r., & moesriami, a. (2015). cascaded image steganography to increase robustness againts attack of the stego image. journal of theoretical & applied information technology, 79(3).
308
Saputra, D. E., Supangkat, S. H., & Sutikno, S. (2015, November). Review and classification of electronic cash research. In 2015 International Conference on Information Technology Systems and Innovation (ICITSI) (pp. 1-5). IEEE.
309
ESTEDLAL, M. M. (2015). Introduction and Evaluation of Computer Security Incident Response Team (CSIRT) in Organizations. Cumhuriyet Science Journal, 36(6), 246-253.
310
Je, Y. M., You, Y. Y., & Na, K. S. Information Security Evaluation Using Multi-Attribute Threat Index. Wireless Personal Communications, 1-13.
311
AL-Nasrawi, D. A., Almukhtar, A. F., & AL-Baldawi, W. S. (2015). From Arabic Alphabets to Two Dimension Shapes in Kufic Calligraphy Style Using Grid Board Catalog. Communications in Applied Sciences, 3(2).
312
Montasari, R., Peltola, P., & Evans, D. (2015). Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations. In Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security (pp. 83-95). Springer International Publishing.
313
History Xin Ling, & Zheng Shuli . ( 2015 ) . Research and development of network forensics of network security technology and applications, ( 2 ) , 110-111.
314
Wen Min . ( 2015 ) . Design and implementation of information exchange security suite system. Network Security Technology and Application, ( 2 ) , 114-116.
315
Gaber, A. M., Mazen, S., & Hassanei, E. E. (2015). Framework for Integrating Software Project Tasks and Change Requests. International Journal of Computer Applications, 125(12).
316
Al-Azawi, R. K. (2015). Agent Oriented Software Engineering (AOSE) Approach to Game Development Methodology.
317
Faculty of Computer Science And Information Technology - Universiti Putra Malaysia (UPM)
318
Bistouni, F., & Jahanshahi, M. (2014). Improved extra group network: a new fault-tolerant multistage interconnection network. The Journal of Supercomputing, 69(1), 161-199.
319
Vimina, E. R., & Jacob, K. P. (2014). An Evaluation of Image Matching Algorithms for Region Based Image Retrieval. International Journal of Advancements in Computing Technology, 6(6), 75.
320
Sardar, M., Banerjee, S., Majhi, K., & Majumder, K. (2014). Trust Based Network Layer Attacks Prevention in MANET. In Emerging Trends in Computing and Communication (pp. 193-204). Springer India.
321
Sardar, M., & Majumder, K. (2014). A New Trust Based Secure Routing Scheme in MANET. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 321-328). Springer International Publishing.
322
Hassan, W. A., & Rahman, T. A. (2014). Coexistence model for compatibility between IMT-advanced and other wireless communication services. Wireless Personal Communications, 79(3), 2025-2039.
323
Curilem, M., Vergara, J., San Martin, C., Fuentealba, G., Cardona, C., Huenupan, F., Chacón, M., Khan, M. S., Hussein, W. & Yoma, N. B. (2014). Pattern recognition applied to seismic signals of the Llaima volcano (Chile): An analysis of the events' features. Journal of Volcanology and Geothermal Research, 282, 134-147.
324
Curilem, M., Huenupan, F., San Martin, C., Fuentealba, G., Cardona, C., Franco, L., Acuña, G., Chacón, M., (2014). Feature Analysis for the Classification of Volcanic Seismic Events Using Support Vector Machines. In Nature-Inspired Computation and Machine Learning (pp. 160-171). Springer International Publishing.
325
Chaubey, A., Chelladurai, H., Lamba, S. S., (2014). Condition monitoring of rotating shaft using virtual instrumentation" 5th International & 26th All India Manufacturing Technology, Design and Research Conference (AIMTDR 2014), pp. 557-(1-6). IIT Guwahati, Assam, India.
326
Adly, F., Yoo, P. D., Muhaidat, S., & Al-Hammadi, Y. (2014, May). Machine-Learning-Based Identification of Defect Patterns in Semiconductor Wafer Maps: An Overview and Proposal. In Parallel & Distributed Processing Symposium Workshops (IPDPSW), 2014 IEEE International (pp. 420-429). IEEE.
327
Hussien, N. S., Sulaiman, S., & Shamsuddin, S. M. (2014). A Review of Intelligent Methods for Pre-fetching in Cloud Computing Environment. In Recent Advances on Soft Computing and Data Mining (pp. 647-656). Springer International Publishing.
328
Selvakumar, L., Vivekanandan, K., & Amilan, S. (2014). New Linkage Learning Technique in Genetic Algorithm for Stock Selection Problem. International Journal of Advanced Research in Computer Science, 5(3).
329
Gautam, G., & Yadav, D. (2014, August). Sentiment analysis of twitter data using machine learning approaches and semantic analysis. In Contemporary Computing (IC3), 2014 Seventh International Conference on (pp. 437-442). IEEE.
330
Suresh Joseph, K. (2014). Genetic algorithm based hybrid imputation model for software effort estimation.
331
Khan, R. A. (2014). Machine Learning: Techniques and Application. Artificial Intelligent Systems and Machine Learning, 6(5), 169-175.
332
Spamers, A. J., & Grobler, H. Real-time Face Detection and Tracking from a Non-static Video Camera.
333
Chung, S. H., Robertson, S., Minnaar, A., Cook, M., & Sun, L. (2014, January). Developing a Knowledge Management System Using an Ontological Approach in Global Organization. In ICISO (pp. 340-347).
334
Yuan, Y., Chen, D., Li, Y., Yu, D., Yan, L., & Zhu, Z. (2014). The improved Shark Search Approach for Crawling Large-scale Web Data. International Journal of Multimedia & Ubiquitous Engineering, 9(8).
335
Khanbary, L. M. O., & Vidyarthi, D. P. (2014). Agent-based energy constrained channel allocation in mobile computing using GA. International Journal of Wireless and Mobile Computing, 7(4), 388-399.
336
Gaber, S. M. A., & Sumari, P. (2014). Predictive and content-aware load balancing algorithm for peer-service area based IPTV networks. Multimedia tools and applications, 70(3), 1987-2010.
337
Banafar, H., & Sharma, S. Secure Cloud Environment Using Hidden Markov Model and Rule Based Generation.
338
Sarhan, A., Elmogy, A. M., & Ali, S. M. (2014, December). New Web cache replacement approaches based on internal requests factor. In Computer Engineering & Systems (ICCES), 2014 9th International Conference on (pp. 383-389). IEEE.
339
Venketesh, P. (2014). New approaches in web prefetching to improve content access by end users.
340
Aswini, S., & Sundaram, G. S. (2014). Web cache memory compression for optimizing performance in web browsers.
341
Bhatnagar, U., & Gahlout, A. A Modern Way of Framework Design for the Client Side Web Caching and Prefetching Technique.
342
ShanmugaSundaram, G., & Aswini, S. Web cache memory compression for optimizing the performance in web browsers.
343
Konate, K., & Abdourahime, G. A. Y. E. (2014). Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks. Compusoft, 3(12), 1425.
344
Praveena, M., Thiribhurabhavan, R. M., Bhavadharini, R. M., & Karthik, D. S. (2014). An Enhanced Adaptive Security Protocol For Replica Attacks In Mobile Adhoc Networks. International Journal of software and hardware Research in Engg, 2(5), 79-83.
345
Kadu, A. A., & S Nagdive, A. (2014). “Real-Time 3D Game Using Sixth Sense and Haptic Technology”: A Review. IJRCCT, 3(1), 042-047.
346
Dhule, C., & Nagrare, T. (2014, April). Computer Vision Based Human-Computer Interaction Using Color Detection Techniques. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on (pp. 934-938). IEEE.
347
Bhatia, S. M., & Sharma, A. K. (2014). Fuzzy Quality Function Deployment and Software Engineering-A Literature Review. Software Engineering and Technology, 6(6), 159-168.
348
?icleanu, O. A. (2014). Nonlinear analysis on elliptic curves subspaces with cryptographic applications. Annals of the University of Craiova-Mathematics and Computer Science Series, 41(2), 292-299.
349
Imran, K., Mahfooz, S., Rauf, A., & Khusro, S. (2014). Enhanced Authentication Scheme for Proxy Mobile IPv6. Life Science Journal, 11(3s).
350
Shukla, D., & Verma, K. (2014). Bounded Area Estimation Using Simpson 3/8 Rule in Traffic Sharing Scenario in Computer Network.
351
Gangele, S., Verma, K., & Shukla, D. (2014). Bounded Area Estimation of Internet Traffic Share Curve. International Journal of Computer Science and Business Informatics (IJCSBI), 10(1), 54-67.
352
Tu, M. H. (2014). A method in a meaningful candidate styles mining image library of styles frequently . Sun Yat-sen Institute of Information Engineering Thesis , 1-102.
353
?icleanu, O. A. (2014). Nonlinear analysis on elliptic curves subspaces with cryptographic applications. Annals of the University of Craiova-Mathematics and Computer Science Series, 41(2), 292-299.
354
Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., & Won, D. (2014). Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors, 14(6), 10081-10106.
355
Babrahem, A. S., Alharbi, E. T., Alshiky, A. M., Alqurashi, S. S., & Kar, J. (2014). Study of the Security Enhancements in Various E-Mail Systems. Journal of Information Security, 6(01), 1.
356
Zhu, H., Hao, X., & Sun, Y. Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant.
357
Babrahem, A. S., Alharbi, E. T., Alshiky, A. M., Alqurashi, S. S., & Kar, J. Scientific Research Publishing.
358
Varsaki, E. E., Fotopoulos, V., & Skodras, A. N. (2014). A discrete Gould transform data hiding scheme. Mathematical Methods in the Applied Sciences, 37(2), 283-288.
359
Othman, J. A. (2014). Steganographic scheme to avoid statistical Steganalysis. J. Of College Of Education For Women, 25(1).
360
Bagade, A. M. (2014). A High Quality Steganographic Method Using Morphing. Journal of information processing systems, 10(2), 256-270.
361
Azaminezhad, M. S., & Bidgoli, A. M. (2014). A new high capacity steganography based on bit-inverting method in DWT domain. Journal of Advanced Computer Science & Technology, 3(2), 169-178.
362
Mandal, P. C. (2014). A study of Steganography Techniques using Discrete Wavelet Transform. Journal of Global Research in Computer Science, 5(5), 7-14.
363
aldeen najim Alzubaidy, D. (2014). Paper of Nagham. pdf.
364
Usha, B. A., Srinath, N. K., Nanjangud, N. C. A., Deshpande, A. M., & Rebello, A. (2014). A Survey on Secure and High Capacity Image Steganography Techniques. International Journal of Advanced Research in Computer and Communication Engineering, 2(3).
365
Abdullah, K. A., Al-Jawad, N., & Abdulla, A. A. (2014, May). Effect of using different cover image quality to obtain robust selective embedding in steganography. In SPIE Photonics Europe (pp. 913808-913808). International Society for Optics and Photonics.
366
Desmukh, P. R., & Rahangdale, B. (2014). Hash Based Least Significant Bit Technique For Video Steganography. International Journal of Engineering Research and Applications (IJERA), 4(1).
367
Kumar, S., Gupta, A., Chandwani, A., Yadav, G., & Swarnkar, R. (2014, September). RGB image watermarking on video frames using DWT. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 675-680). IEEE.
368
Alam, I., Khusro, S., Rauf, A., & Zaman, Q. (2014). Conducting surveys and data collection: From traditional to mobile and SMS-based surveys. Pakistan Journal of Statistics and Operation Research, 10(2), 169-187.
369
Kale, N. A., Natikar, S. B., & Karande, S. M. (2014). Secured Mobile Messaging for Android application.
370
Aprilianto, M., & Abdurohman, M. (2014, April). Improvement Text Compression Performance Using Combination of Burrows Wheeler Transform, Move to Front, and Huffman Coding Methods. In Journal of Physics: Conference Series (Vol. 495, No. 1, p. 012042). IOP Publishing.
371
Shaker, S. H., Jeiad, H. A., & Hassan, F. A. Propose a Model for Securing SMS.
372
Deshmukh, S. P., & Naware, A. M. Mobile Money: M-payment System for India.
373
LaRusic, J., & Punnen, A. P. (2014). The asymmetric bottleneck traveling salesman problem: Algorithms, complexity and empirical analysis. Computers & Operations Research, 43, 20-35.
374
Ahmed, Z. H. (2014). A data-guided lexisearch algorithm for the quadratic assignment problem. Indian Journal of Science and Technology, 7(4), 480-490.
375
Swiercz, A., Burke, E. K., Cichenski, M., Pawlak, G., Petrovic, S., Zurkowski, T., & Blazewicz, J. (2014). Unified encoding for hyper-heuristics with application to bioinformatics. Central European Journal of Operations Research, 22(3), 567-589.
376
Magare, S. S., Gedam, Y. K., Randhave, D. S., & Deshmukh, R. R. (2014). Character Recognition of Gujarati and Devanagari Script: A Review.
377
Magare, S. S., & Deshmukh, R. R. (2014). Offline Handwritten Sanskrit Character Recognition Using Hough Transform and Euclidean Distance. International Journal of Innovation and Scientific Research ISSN, 2351-8014.
378
Mendapara, M. B., & Goswami, M. M. (2014, March). Stroke identification in Gujarati text using directional feature. In Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on (pp. 1-5). IEEE.
379
El Korbi, I., & Zeadally, S. (2014). Energy-aware sensor node relocation in mobile sensor networks. Ad Hoc Networks, 16, 247-265.
380
Anil, M. C., & Shirbahadurkar, S. D. (2014, February). Speech modification for prosody conversion in expressive Marathi text-to-speech synthesis. In Signal Processing and Integrated Networks (SPIN), 2014 International Conference on (pp. 56-58). IEEE.
381
Banerjee, S., Sardar, M., & Majumder, K. (2014, January). Aodv based black-hole attack mitigation in manet. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 345-352). Springer International Publishing.
382
Gopalakrishnan, S., & Ganeshkumar, P. (2014). Intrusion detection in mobile ad hoc network using secure routing for attacker identification protocol. American Journal of Applied Sciences, 11(8), 1391.
383
Silwal, S., & Sharma, A. (2014). A new Security approach for integrating wireless adhoc network using octant bit computation and routing test. IJSEAT, 2(6), 154-157.
384
Banerjee, S., & Majumder, K. (2014). wormhole attack mitigation in manet: a cluster based avoidance technique. International Journal of Computer Networks & Communications, 6(1), 45.
385
Abomhara, M., & Koien, G. M. (2014, May). Security and privacy in the Internet of Things: Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on (pp. 1-8). IEEE.
386
Garg, G., Kaushal, S., & Sharma, A. (2014). Behavioural Study of Reactive Protocols with Wormhole Attack in Mobile ADHOC Networks. Journal of Emerging Technologies in Web Intelligence, 6(4), 445-455.
387
Sivagurunathan, S., & Prathapchandran, K. (2014, January). Trust and cluster based authentication schemes in mobile Ad Hoc networks—A review. In Power Signals Control and Computations (EPSCICON), 2014 International Conference on (pp. 1-5). IEEE.
388
Tamizarasu, k., kalpana, a., & rajaram, M. (2014). maliciousness in mobile ad hoc networks: a performance evaluation. Journal of Theoretical & Applied Information Technology, 65(3).
389
Patil, K. T., & Patil, M. E. (2014). Study of Attacks in MANET, Attacks on AES, Cryptographically Generated Addresses (CGAs) Methods and Possible Alleviation in IPV6 over MANET Area. International Journal of Computer Applications, 96(1).
390
Kirubakaran, N., & Kathirvel, A. (2014). Performance Improvement of Security Attacks in Wireless Mobile Ad Hoc Networks. Asian Journal of Information Technology, 13(2), 68-76.
391
Dureja, A., & Dahiya, V. (2014). performance evaluation of collaborative attacks in manet.
392
Jasim, S. I. (2014). pcf investigation to improve the performance of tora-based manet against jamming attacks. International Journal of Computer Science and Engineering Survey, 5(3), 17.
393
Guo, C., Xu, H., Ju, L., Jia, Z., & Xu, J. (2014, September). A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on (pp. 156-163). IEEE.
394
Sivagurunathan, S., & Prathapchandran, K. (2014, March). Trust Based Security Schemes in Mobile Ad Hoc Networks-A Review. In Intelligent Computing Applications (ICICA), 2014 International Conference on (pp. 291-295). IEEE.
395
Sardar, M., Banerjee, S., Majhi, K., & Majumder, K. (2014). Trust Based Network Layer Attacks Prevention in MANET. In Emerging Trends in Computing and Communication (pp. 193-204). Springer India.
396
Vaibhav, A. (2014). Security in Monitoring Schemes: A Survey. arXiv preprint arXiv:1411.5213.
397
Samanta, C. K., Hota, M. K., Nayak, S. R., Panigrahi, S. P., & Panigrahi, B. K. (2014). Energy management in hybrid electric vehicles using optimized radial basis function neural network. International Journal of Sustainable Engineering, 7(4), 352-359.
398
Kodali, R. K., & Boppana, L. (2014, September). FPGA implementation of energy efficient multiplication over GF (2 m) for ECC. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 1815-1821). IEEE.
399
Anagreh, M., Samsudin, A., & Omar, M. A. (2014). Parallel Method for Computing Elliptic Curve Scalar Multiplication Based on MOF. International Arab Journal of Information Technology (IAJIT), 11(6).
400
Abdulrazeg, A. A., Norwawi, N. M., & Basir, N. (2014, October). Extending V-model practices to support SRE to build secure web application. In Advanced Computer Science and Information Systems (ICACSIS), 2014 International Conference on (pp. 213-218). IEEE.
401
Chawla, D., & Kaur, M. (2014). System & Web based Modeling for Secure Software Development. International Journal of Computer Technology and Applications, 5(1), 257.
402
Moedjiono, s., rifai, a., & mantoro, t. (2014). a robust steganography approach with high embedding capacity using unique value embedding and codebook. Journal of Theoretical & Applied Information Technology, 66(1).
403
Doshi, J. C., Christian, M., & Trivedi, B. H. (2014). SQL FILTER–SQL Injection prevention and logging using dynamic network filter. In Security in Computing and Communications (pp. 400-406). Springer Berlin Heidelberg.
404
Manimegalai, R. (2014). Efficient joint compression and encryption techniques for video data.
405
Kansal, A., & Singh, Y. Survey on Machine Learning Techniques for Event Detection in Wireless Sensor Networks.
406
Medany, I., Shazly, M., & El-Sherbiny, M. G. (2014). Expert-Based-Computer Aided Design and Component Selection for Dust Collection Systems. International Journal of Scientific Research in Environmental Sciences, 2(1), 14.
407
Mehrasa, M., Zaker, S. R., Larki, B., Mehmandoust, M., Baghshahi, H., Sekhavati, M. H., & Gavanji, S. (2014). Computational Prediction and Analysis of Interaction of Silver Nitrate with Peptidoglycan-Associated lipoprotein (Pal). International Journal of Scientific Research in Environmental Sciences, 2(1), 8.
408
Kotenko, I., & Chechulin, A. Fast Network Attack Modeling and Security Evaluation based on Attack Graphs. Journal of Cyber Security, 3(1), 27-46.
409
Parul, M., & Rohil, H. (2014). Optimized Image Steganography using Discrete Wavelet Transform (DWT). International Journal of Recent Development in Engineering and Technology (IJRDET), 2(2), 75-81.
410
Nag, A., Singh, J. P., Biswas, S., Sarkar, D., & Sarkar, P. P. (2014). A Huffman Code Based Image Steganography Technique. In Applied Algorithms (pp. 257-265). Springer International Publishing.
411
Zan, M. M., & Aye, N. (2014). Implementation of Secure Steganography System Based on DWT in RGB Color Channel. IJCCER, 2(3), 114-118.
412
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication.
413
Azaminezhad, M. S., & Bidgoli, A. M. (2014). A new high capacity steganography based on bit-inverting method in DWT domain. Journal of Advanced Computer Science & Technology, 3(2), 169-178.
414
Mandal, P. C. (2014). A study of Steganography Techniques using Discrete Wavelet Transform. Journal of Global Research in Computer Science, 5(5), 7-14.
415
Kalami, A. (2014). A modified robust and effective algorithm with mathematical calculation for minutiae detection. Physical Sciences Research International, 2(1), 1-5.
416
Jana, B., Mondal, S. K., Jana, S., & Giri, D. (2014, February). Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach. In Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on (pp. 319-324). IEEE.
417
Garg, S., & Mathur, M. (2014, February). Chaotic map based steganography of gray scale images in wavelet domain. In Signal Processing and Integrated Networks (SPIN), 2014 International Conference on (pp. 689-694). IEEE.
418
REZA, W. (2014). Implementasi Slantlet Transform (SLT) dan Huffman Coding pada Steganografi Citra Grayscale. Skripsi, Fakultas Ilmu Komputer.
419
Thanikaiselvan, V., Arulmozhivarman, P., Chakrabarty, S., Agarwal, A., Subashanthini, S., & Amirtharajan, R. (2014). Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13(16), 2534.
420
Nag, A., Singh, J. P., Biswas, S., Sarkar, D., & Sarkar, P. P. (2014, January). A Huffman Code Based Image Steganography. In Applied Algorithms: First International Conference, ICAA 2014, Kolkata, India, January 13-15, 2014. Proceedings (Vol. 8321, p. 257). Springer..
421
Goel, S., Kumar, P., & Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator.
422
Nuri, S. A Modified Robust and Effective Algorithm with Mathematical Calculation for Minutiae Detection.
423
Madiavale, B. A. (2014). Information security management practices and organizational goals: a study of microfinanace organizations in Nairobi (Doctoral dissertation, University of Nairobi).
424
Peng, B., & Li, L. (2014). Combination of Genetic Algorithm and Ant Colony Optimization for QoS Multicast Routing. In Soft Computing in Artificial Intelligence (pp. 49-56). Springer International Publishing.
425
Prayudi, Y., Ashari, A., & Priyambodo, T. K. (2014). Digital Evidence Cabinets: A Proposed Frameworks for Handling Digital Chain of Custody. Int. J. Comput. Appl, 109(9), 30-36.
426
Saleem, S., Popov, O., & Bagilli, I. (2014). Extended abstract digital forensics model with preservation and protection as umbrella principles. Procedia Computer Science, 35, 812-821.
427
Rahman, A. F. A., Ahmad, R., & Mohamad, M. Z. (2014). Developing Forensic Readiness Secure Network Architecture for Wireless Body Area Network (WBAN). International Journal of Security and Its Applications, 8(5), 403-420.
428
Bera, A., Bhattacharjee, D., & Nasipuri, M. (2014). Hand Biometrics in Digital Forensics. In Computational Intelligence in Digital Forensics: Forensic Investigation and Applications (pp. 145-163). Springer International Publishing.
429
Malik, N. M. N. A., Yahya, S., & Abdullah, M. T. (2014). Critical Phases in Network Forensics-A Review. In The International Conference on Digital Security and Forensics (DigitalSec2014) (pp. 68-75). The Society of Digital Information and Wireless Communication.
430
Tonellotto, M. (2014). Evidenza informatica, computer forensics e best practices. Rivista di Criminologia, Vittimologia e Sicurezza, 8(2), 68-103.
431
Akosu, N., & Selamat, A. (2014). Incorporating Language Identification in Digital Forensics Investigation Framework. In Computational Intelligence in Digital Forensics: Forensic Investigation and Applications (pp. 63-78). Springer International Publishing.
432
Solinas, F. (2014). Technical and legal perspectives on forensics scenario.
433
Dlamini, M., Venter, H., Eloff, J., & Eloff, M. (2014, March). Requirements for Preparing the Cloud to Become Ready for Digital Forensic Investigation. In 13th European Conference on Cyber Warfare and Security ECCWS-2014 The University of Piraeus Piraeus, Greece (p. 242).
434
Bai, J., & Pu, T. C. (2014, May). Online Data Compression Technique for Real Time Data of Energy Management System in the Industrial Production. In Applied Mechanics and Materials (Vol. 519, pp. 70-73).
435
Pu, T., & Bai, J. (2014, May). An auto regression compression method for industrial real time data. In Control and Decision Conference (2014 CCDC), The 26th Chinese (pp. 5129-5132). IEEE.
436
Garba, A. M., & Zirra, P. B. Analysing Forward Difference Scheme on Huffman to Encode and Decode Data Losslessly.
437
Bharathi, K., & Vijaylakshmi, C. Optimization for Flexible Job Shop Scheduling by Evolutionary Representation.
438
Vignesh, B. (2014). Pipelined Quadratic Equation Based Novel Multiplication Method for Cryptographic Applications. Indian Journal of Science and Technology, 7(4), 34-39.
439
Chickerur, S., Rayudu, D. M. K., Hiriyannaiah, S., & Shabalina, O. (2014). Performance Analysis of Alternative Open Source Parallel Computing Approach to OpenMP on Multicore Processors. In Knowledge-Based Software Engineering (pp. 466-476). Springer International Publishing.
440
Lee, J. D., Im, H. J., Kang, W. M., & Park, J. H. (2014). Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices. Mathematical Problems in Engineering, 2014.
441
Mobhani, A. B., & Mishra, S. K. (2014). Diffusion of Cipher Blocks at Bit Level in Parallel AES to Improve Bit–Ratio Test thus Increasing Cryptanalysis Complexity.
442
Kumar, C., Dutta, S., & Chakborty, S. (2014, March). Musical cryptography using genetic algorithm. In Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference on (pp. 1742-1747). IEEE.
443
Sharma, R. S., Hiranwal, S., & Goyal, D. Analysis & Design Of Hybrid Cryptography Using Moving Image.
444
Sharma, R. S., Hiranwal, S., & Goyal, D. Analysis & Design Of Hybrid Cryptography Using Moving Image.
445
Jiji, G. W., Lakshmi, V. S., Lakshmi, K. V., & Priya, S. S. (2014). Diagnosis and Prognosis of the Arbovirus-Dengue using Intelligent Algorithm. Journal of The Institution of Engineers (India): Series B, 1-6.
446
Kang, Y. J., Ha, Y. R., & Lee, S. J. (2014). Microfluidic-based measurement of erythrocyte sedimentation rate for biophysical assessment of blood in an in vivo malaria-infected mouse. Biomicrofluidics, 8(4), 044114.
447
Opoku-Ansah, J., Eghan, M. J., Anderson, B., & Boampong, J. N. (2014). Wavelength Markers for Malaria (Plasmodium Falciparum) Infected and Uninfected Red Blood Cells for Ring and Trophozoite Stages. Applied Physics Research, 6(2), p47.
448
Kirongo, N. N. (2014). A Video Conferencing Security Framework For Synchronous Elearning (Doctoral dissertation).
449
El Mekawy, M., AlSabbagh, B., & Kowalski, S. (2014). The Impact of Business-IT Alignment on Information Security Process. In HCI in Business (pp. 25-36). Springer International Publishing.
450
Banerjee, C., & Banerjee, A. it security practices in an organization: balancing technology and management perspective. editorial board chief bebefactor, 495, 506.
451
Radouane, M., Messoussi, R., Touahni, R., & Boujiha, T. (2014, April). Robust method of digital image watermarking using SVD transform on DWT coefficients with optimal block. In Multimedia Computing and Systems (ICMCS), 2014 International Conference on (pp. 255-260). IEEE.
452
Wahaballa, A., Wahballa, O., Li, F., Ramadan, M., & Qin, Z. (2014). Multiple-Layered Securities Using Steganography and Cryptography. International Journal of Computers and Applications, 36(3), 93-100.
453
Thiruvengatanadhan, R., & Dhanalakshmi, P. (2014). A Fuzzy C-Means based GMM for Classifying Speech and Music Signals. International Journal of Computer Applications, 102(5).
454
Ramalingam, T., & Dhanalakshmi, P. (2014). Speech/music classification using wavelet based feature extraction techniques. Journal of Computer Science, 10(1), 34-44.
455
Pol, K. (2014). Image steganography based on DWT using Huffman LWZ Encoding. Int J Eng Tech Res, 2(3), 100-103.
456
Rajput, P., Arya, S., Kumari, S., & Lehana, P. (2014). Qualitative and quantitative analysis of non-uniform dark images. Advances in Image and Video Processing, 2(1), 23-34.
457
Thanikaiselvan, V., Arulmozhivarman, P., Chakrabarty, S., Agarwal, A., Subashanthini, S., & Amirtharajan, R. (2014). Comparative Analysis of (5/3) and Haar IWT Based Steganography. Information Technology Journal, 13(16), 2534.
458
Kaur, H., & Goyal, E. D. (2014). Performance Enhancement of a Transform Domain Based Steganographic Technique Using Segmentation.
459
Basatini, F. M., & Chinipardaz, R. (2014). Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting. Journal of Data Science, 12, 563-574.
460
Shibata, S. I., Sato, F., Kimura, H., & Oyabu, T. (2014). Evaluating Abnormal Condition in Physiological Disorder Using a Fluctuation Characteristic of Plant Bioelectric Potential. Sensors and Materials, 26(7), 483-493.
461
George, R., & Manimekalai, M. A. P. (2014, February). A novel approach for image compression using zero tree coding. In Electronics and Communication Systems (ICECS), 2014 International Conference on (pp. 1-5). IEEE.
462
Ortega-Corral, C., Palafox, L. E., García-Macías, J. A., Sánchez-García, J., & Aguilar, L. (2014). End-to-end message exchange in a deployable marine environment hierarchical wireless sensor network. International Journal of Distributed Sensor Networks, 2014.
463
Mafra, P. M., Fraga, J. S., & Santin, A. O. (2014). Algorithms for a distributed IDS in MANETs. Journal of Computer and System Sciences, 80(3), 554-570.
464
Azzawi, A. L. H. M. (2014). Enhancing The Encryption Process Of Advanced Encryption Standard (AES) By Using Proposed Algorithm To Generate S-Box. Journal of Engineering and Development, 18(2).
465
Kaul, V., Choudhari, P., & Narayankhedkar, S. K. (2014, September). Security enhancement for data transmission in 4G networks. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 373-378). IEEE.
466
Das, S., Zaman, J. S. U., & Ghosh, R. (2014). Study of Randomness in AES Ciphertexts Produced by Randomly Generated S-Boxes and S-Boxes with Various Modulus and Additive Constant Polynomials. Journal of The Institution of Engineers (India): Series B, 1-16.
467
Dara, M., & Manochehri, K. (2014). Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES. Information Security Journal: A Global Perspective, 23(1-2), 1-9.
468
Choudhari, P., Kaul, V., & Narayankhedkar, S. K. Security Enhancement Algorithms for Data Transmission in 4G Networks.
469
Kaur, N., & Behal, S. Audio Steganography Using LSB Edge Detection Algorithm.
470
Akhtar, M., Khusru, A., Usmani, A., & Sahoo, G. (2014). Nontransitive Ranking to Enhance Routing Decision in MANETS. arXiv preprint arXiv:1407.5385.
471
Patil, S., & Borade, D. (2014). Dynamic Cluster Based Intrusion Detection Architecture to Detect Routing Protocol Attacks in MANET. Sensor Netw Data Commun, 3(116), 2.
472
Rueda, J. S. R., & Bautista, D. R. (2014). análisis forense digital en dispositivos móviles. Revista de Semilleros de Investigación, 1(1).
473
Kasiaras, D., Zafeiropoulos, T., Clarke, N., & Kambourakis, G. (2014, December). Android forensics: Correlation analysis. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for (pp. 157-162). IEEE.
474
Cusack, B., & Lutui, R. (2014). Up-dating investigation models for smart phone procedures.
475
Mumba, E. R., & Venter, H. S. (2014, August). Mobile forensics using the harmonised digital forensic investigation process. In Information Security for South Africa (ISSA), 2014 (pp. 1-10). IEEE.
476
NK, P. J. K. (2014). an overview of mobile phone forensics. global journal of multidisciplinary studies, 4(1).
477
Shrivastava, G., & Gupta, B. B. (2014, October). An Encapsulated Approach of Forensic Model for digital investigation. In Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on (pp. 280-284). IEEE.
478
Morrell, C., Ransbottom, J. S., Marchany, R., & Tront, J. G. (2014, December). Scaling IPv6 address bindings in support of a moving target defense. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for (pp. 440-445). IEEE.
479
Victor, A. (2014). Splice Zerocopy System optimization using dual pipe schemes (Doctoral dissertation, TELKOM UNIVERSITY).
480
Wei, J., Zhihong, T., Chao, C., & Bei, G. (2014). Bottleneck analysis for data acquisition in high-speed network traffic monitoring. Communications, China, 11(1), 110-118.
481
Eisfeld, A. (2014). Entwurf und Analyse von Konzepten zur effizienten Datenübertragung von Grafikrendering-Befehlen auf eingebetteten Systemen.
482
Ali Tandra, S., & Rizvi, S. M. (2014). Security for Cloud Based Services.
483
Latif, R., Abbas, H., & Assar, S. (2014). Distributed denial of service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review. Journal of medical systems, 38(11), 1-10.
484
Kumar Shridhar, N. G. (2014). A Prevention of DDos Attacks in Cloud Using Honeypot. International Journal of Science and Research, 3(11), 2378-2383.
485
Aishwarya, R., & Malliga, S. (2014, April). Intrusion detection system-An efficient way to thwart against Dos/DDos attack in the cloud environment. In Recent Trends in Information Technology (ICRTIT), 2014 International Conference on (pp. 1-6). IEEE.
486
Dupin-Bryant, P. A., & Olsen, D. H. (2014). Business Intelligence, Analytics And Data Visualization: A Heat Map Project Tutorial. International Journal of Management & Information Systems (IJMIS), 18(3), 185-200.
487
Tarek, M., Ouda, O., & Hamza, T. (2014). Tokenless Cancelable Biometric Templates Based on Hetroassociation Neural Network. International Journal of Biometrics and Bioinformatics (IJBB), 8(2), 8.
488
Shiri, S., Anvari, A., & Soltani, H. An Assessment of Readiness Factors for Implementing ERP Based on Agility (Extension of Mckinsey 7s Model).
489
Ghafoor, I., Jattalai, I., Durranit, S., & Ch, M. T. Analysis of OpenSSL Heartbleed Vulnerability for Embedded Systems.
490
Sharvani, C. S. (2014). Development of Swarm Intelligent Systems for MANET: ACO based routing in MANETs for effective communication.
491
Sheta, A. F., Kassaymeh, S., & Rine, D. Estimating the Number of Test Workers Necessary for a Software Testing Process Using Artificial Neural Networks.
492
Rao, P. S., Rao, K. V., Varma, P. S., & Kim, T. H. (2014). Programming Evaluation Process Using Hybrid Cost Estimation Model. International Journal of Software Engineering and Its Applications, 8(10), 55-64.
493
KUMAR, M. S., & RAJAN, B. C. (2014).Experimental evaluation of fuzzy-based function point analysis for software effort estimation. Journal of Theoretical & Applied Information Technology, 67(2).
494
Kumar, G., & Bhatia, P. K. (2014).Automation of software cost estimation using neural network technique. International Journal of Computer Applications, 98(20).
495
Kalinic, z., arsovski, s., arsovski, z., & rankovic, v. The effectiveness and students’ perception of an adaptive mobile learning system based on personalized content and mobile web. Stanislaw juszczyk, 43.
496
Karadimce, a., & davcev, d. (2014, october). Collaborative cloud service model for delivering multimedia content in mcloud. In collaborative computing: networking, applications and worksharing (collaboratecom), 2014 international conference on (pp. 469-474). Ieee.
497
Hashim, Y. E., Osman, A., & El-Gelany, A. (2014). Mobile Technology and Education: Theoretical Study.
498
Chouarfia, M. Y. A. (2014). SCAE: Software Component Assembly Evaluation.
499
Thapar, S. S., Singh, P., & Rani, S. (2014). Reusability-based quality framework for software components. ACM SIGSOFT Software Engineering Notes, 39(2), 1-5.
500
Sampath, S., Nanjesh, B. R., Sagar, B. B., & Subbaraya, C. K. (2014, February). Performance optimization of PVM based parallel applications using optimal number of slaves. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on (pp. 388-392). IEEE.
501
Abebe, H. (2014). Predicting Infant Immunization Status in Ethiopian (Doctoral dissertation, AAU).
502
Ibrahim, M. H. (2014). Realizing Sender’s Deniability in Public Key Encryption via Random Coins Isolation. European Journal of Scientific Research, 119(2), 177-187.
503
Biedermann, S., Ruppenthal, T., & Katzenbeisser, S. (2014, July). Data-centric phishing detection based on transparent virtualization technologies. In Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on (pp. 215-223). IEEE.
504
Emilin, S. C. (2014). Detecting And Preventing Phishing Websites Dppws.
505
Chawla, M., & Chouhan, S. S. (2014). A Survey of Phishing Attack Techniques. International Journal of Computer Applications, 93(3).
506
Zeydan, h. z., & selamat, m. s. (2014).current state of anti-phishing approaches and revealing competencies. journal of theoretical and applied information technology, 70(3).
507
Philip, C., Paulus, R., & Ashok, A. (2014). Comparative Analysis of Adhoc Routing Protocols in Wi-Fi & Wi Max Networks using QualNet 6.1. International Journal of Current Engineering and Technology, 4(1).
508
Sadek, M. M., Khalifa, A. S., & Mostafa, M. G. (2014). Video steganography: a comprehensive review. Multimedia Tools and Applications, 1-32.
509
Kelash, H. M., Wahab, O. F. A., Elshakankiry, O. A., & El-sayed, H. S. (2014). Utilization of Steganographic Techniques in Video Sequences. International Journal of Computing and Network Technology, Sys, 2, 17-24.
510
Othman, J. A. (2014). Steganographic scheme to avoid statistical Steganalysis. J. Of College Of Education For Women, 25(1).
511
Al-Dmour, H., Al-Ani, A., & Nguyen, H. (2014, August). An efficient steganography method for hiding patient confidential information. In Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE (pp. 222-225). IEEE.
512
Agrawal, A., & Borikar, D. A. (2014). An approach to video steganography using novel substitution technique.
513
Kaur, S., Kaur, A., & Singh, K. (2014). A Survey of Image Steganography. IJRECE, 2(3), 102-105.
514
Priyanka, B. G., & Sathyanarayana, S. V. (2014, November). A steganographic system for embedding image and encrypted text. In Contemporary Computing and Informatics (IC3I), 2014 International Conference on (pp. 1351-1355). IEEE.
515
Praneeta, G., & Pradeep, B. (2014, January). Security Analysis of Digital Stegno Images Using Genetic Algorithm. In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013 (pp. 277-283). Springer International Publishing.
516
Juneja, M. (2014). High Capacity and Statistical Attacks Resistant Reversible Image Data Hiding Scheme using LSB Substitution. International Journal of Computer Applications, 92(12).
517
Juneja, M. (2014). High Capacity Information Hiding System for Encrypted Text Message Using Pixel Intensity Based LSB Substitution Technique. International Journal of Computer Science Issues (IJCSI), 11(2), 159.
518
aldeen najim Alzubaidy, D. (2014). Paper of Nagham. pdf.
519
Bhalchandra, B. D., Bhatnagar, V., Tomer, R., Singh, R., Saran, S. S., Asadullah, M., ... & Khan, S. Safety and Concealing Information Utilizing Combinatorial Data Hiding Proficiencies.
520
Zahedinia, M. S., & Ahmadi, H. (2014). Color Image Steganography Method based on Difference between Pixel Values in Tri-direction. Majlesi Journal of Multimedia Processing, 3(3).
521
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication.
522
Nashier, N., & Singhrova, A. An Steganography Implementation Based Upon Improved LSB Technique.
523
Agrawal, A., & Borikar, D. A. A Novel Approach to Video Steganography using Secured Multi-Channel Substitution.
524
Shinde, P., Palmal, A., & Singh, R. Digital Image Steganography-Then, Now & Analysis of its Techniques.
525
Ahmed, Z. H. (2014). Comparison of data hiding using LSB and DCT for image (Doctoral dissertation, Universiti Tun Hussein Onn Malaysia).
526
Mehndiratta, A. Publication Procedure Topics.
527
Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., & Okediran, O. O. Performance Assessment of an Enhanced Crystographic Model for Secure E-Voting.
528
Khosla, S., & Kaur, P. Secure Data Hiding Technique Using Video Steganography and Watermarking-A Review.
529
Mostaghim, M., & Boostani, R. (2014, September). CVC: Chaotic visual cryptography to enhance steganography. In Information Security and Cryptology (ISCISC), 2014 11th International ISC Conference on (pp. 44-48). IEEE.
530
Sahu, M. (2014). Review of Image Steganography Techniques in Cloud Security.
531
Ramalingam, M., & Isa, N. A. M. (2014, October). A steganography approach for sequential data encoding and decoding in video images. In Computer, Control, Informatics and Its Applications (IC3INA), 2014 International Conference on (pp. 120-125). IEEE.
532
Senaratne, H., Gunatilaka, P., Gamage, S., Gunarathna, U., & Vithana, Y. Information Hiding with Steganography.
533
Ali, A. A., Abdellateef, B. A., & Seddik, A. H. (2014). Enhancing the Security of SMMWB Image Steganography Technique by using the Linked List structure (Cover Package Method). International Journal of Computer Applications, 90(7).
534
Molaei Kermani, and., Amir Masoud, honest, & Abrahymnzhad. (2014). Blind steganography based on Reed-Solomon codes and the substitution optimized embedded with improved payload and resistance. Journal of Electrical Engineering, University of Tabriz, 43 (2), 43-59.
535
Dhondge, K., Choi, B. Y., Song, S., & Park, H. (2014, August). Optical Wireless authentication for smart devices using an onboard ambient light sensor. In Computer Communication and Networks (ICCCN), 2014 23rd International Conference on (pp. 1-8). IEEE.
536
Xiong, J., Xiong, J., & Claramunt, C. (2014, November). A spatial entropy-based approach to improve mobile risk-based authentication. In Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis (p. 3). ACM.
537
vongsingthong, s., & boonkrong, s. (2014). a survey on smartphone authentication. walailak journal of science and technology (wjst), 12(1), 1-19.
538
Young stars, & Peng Xinguang. (2014) A lightweight one-time password authentication scheme. Small Computer Systems, 35 (008), 1808-1811.
539
Koneru, A. (2014). Knowledge Extraction from Work Instructions through Text Processing and Analysis.
540
Montero, C. (2014). Cost aware real time big data processing in Cloud Environments (Doctoral dissertation, The University of Melbourne).
541
Parsania, V. S., Jani, N. N., & Bhalodiya, N. H. Applying Naïve bayes, BayesNet, PART, JRip and OneR Algorithms on Hypothyroid Database for Comparative Analysis.
542
Babatunde, I. G. Review and Evaluation of Fingerprint Singular Point Detection Algorithms.
543
Iwasokun, G. B., & Akinyokun, O. C. False Minutiae’Impact on Fingerprint Matching.
544
Babatunde, I. G., Lange, M. J., Charles, A. O., & Olumuyiwa, D. J. (2014, August). Experimental study of thumbprint-based authentication framework for ATM machines. In Science and Information Conference (SAI), 2014 (pp. 505-514). IEEE.
545
Bifari, E. N., & Elrefaei, L. (2014, September). Automated Fingerprint Identification System based on weighted feature points matching algorithm. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 2212-2217). IEEE.
546
Akinyokun Oluwole, C., Alese Boniface, K., & Iwasokun Gabriel, B. (2014). Fingerprint Matching Using Spatial Characteristics. In Proceedings of the World Congress on Engineering (Vol. 1).
547
Iwasokun, G. B., Akinyokun, O. C., & Dehinbo, O. J. (2014). Fingerprint Matching Using Features Mapping. In Proceedings of the World Congress on Engineering and Computer Science (Vol. 1).
548
Iwasokun, G. B., & Ojo, S. O. (2014). Review and Evaluation of Fingerprint Singular Point Detection Algorithms. British Journal of Applied Science & Technology, 4(35), 4918.
549
Babatunde, I. G., Charles, A. O., & Olusegun, O. S. (2014). An Investigation into the Impact of False Minutiae Points on Fingerprint Matching. International Journal of Database Theory and Application, 7(3), 159-178.
550
Iwasokun, G. B., Akinyokun, O. C., & Angaye, C. O. (2014). Spatial Relation Approach to Fingerprint Matching. In Intelligent Systems for Science and Information (pp. 87-110). Springer International Publishing.
551
Yadav, V., & Aggarwaal, P. (2014). A Survey on Security in Cloud Computing.
552
Owusu, E., Zhan, Y., & Mao, Q. R. (2014). A neural-AdaBoost based facial expression recognition system. Expert Systems with Applications, 41(7), 3383-3390.
553
Sun, W., Halevy, A., Benedetto, J. J., Czaja, W., Li, W., Liu, C., ... & Wang, R. (2014). Nonlinear dimensionality reduction via the ENH-LTSA method for hyperspectral image classification. Selected Topics in Applied Earth Observations and Remote Sensing, IEEE Journal of, 7(2), 375-388.
554
Sun, W., Halevy, A., Benedetto, J. J., Czaja, W., Liu, C., Wu, H., ... & Li, W. (2014). UL-Isomap based nonlinear dimensionality reduction for hyperspectral imagery classification. ISPRS Journal of Photogrammetry and Remote Sensing, 89, 25-36.
555
Owusu, E., Zhan, Y. Z., & Mao, Q. R. (2014). An SVM–AdaBoost-based face detection system. Journal of Experimental & Theoretical Artificial Intelligence, 26(4), 477-491.
556
Kishore, B., Rana, V. L., Manikantan, K., & Ramachandran, S. (2014, December). Face recognition using Gabor-Feature-based DFT shifting. In Industrial and Information Systems (ICIIS), 2014 9th International Conference on (pp. 1-8). IEEE.
557
Biswas, A., Ghose, M. K., & Pandit, M. (2014). Comparison of Different Neural Network Architectures for Classification of Feature Transformed Data for Face Recognition. International Journal of Computer Applications, 96(12).
558
Makinde, A. S., Nkansah-Gyekye, Y., & Laizer, L. S. (2014). Enhancing the Accuracy of Biometric Feature Extraction Fusion Using Gabor Filter and Mahalanobis Distance Algorithm. arXiv preprint arXiv:1407.6748.
559
Biswal, M. S. (2014). Feature Extraction of Face Using Various Techniques (Doctoral dissertation, National Institute of Technology Rourkela).
560
Gupta, B. Performance Comparison of Various Face Detection Techniques.
561
Awati, J. S. (2014). Application of wireless sensor networks for agricultural parameter control.
562
Sahu, R. A., & Saraswat, V. (2014). Secure and Efficient Scheme for Delegation of Signing Rights. In Information and Communications Security (pp. 258-273). Springer International Publishing.
563
Demarinis, F., Accettura, A., Garzia, F., & Cusani, R. (2014, October). Automatic security system for recognizing unexpected motions through video surveillance. In Security Technology (ICCST), 2014 International Carnahan Conference on (pp. 1-5). IEEE.
564
Nayak, C., & Pradhan, S. Adaptive Filtering for Linear System Identification by Different Variants of LMS.
565
Eke, H. N., & Odoh, N. J. (2014). The Use of Social Networking Sites among the Undergraduate Students of University of Nigeria, Nsukka. Library Philosophy and Practice, 0_1.
566
Zhang, Y., & Rau, P. L. P. (2014). User Adoption and Loyalty of Location Based Social Network Service in China. In Cross-Cultural Design (pp. 392-402). Springer International Publishing.
567
Eke Miss, H. N., Obiora, C., & Odoh Miss, J. N. (2014). The Use of Social Networking Sites among the Undergraduate Students of University of Nigeria, Nsukka.
568
TIJJANI, H. (2014). adoption of improved pearl millet production practices by farmers in borno state, nigeria (Doctoral dissertation, USMANU DANFODIYO UNIVERSITY, SOKOTO).
569
yatigammana, m., johar, d. m. g. m., & gunawardhana, c. Impact of Innovations Attributes on e-learning Acceptance among Sri Lankan Postgraduate Students.
570
Yatigammana, K., Johar, M. G. M., & Gunawardhana, C. (2014). comparison of e-learning acceptance among postgraduate students in sri lanka and malaysia. Journal of South Asian Studies, 2(2), 165-176.
571
Madahi, A., & Sukati, I. (2014). Examining online and brick and mortar store channels switching behaviour among Malaysian consumers. International Journal of Electronic Marketing and Retailing, 6(2), 128-163.
572
Abdelrehim, S. H. M. O. (2014). The diffusion of edublogs among educators in Egypt.
573
Aligol, M., & Mohammadbeigi, A. (2014). Doctors tend to investigate the private sector to contribute to the family physician. Journal of Qom, 8 (1).
574
Mahajan, N., Bedi, R., & Gupta, S. K. A Survey on Detection of Byzantine and Resource Consumption Attacks.
575
Khan, A., Shrivastava, S., & Richariya, V. (2014, January). Normalized Worm-hole Local Intrusion Detection Algorithm (NWLIDA). In Computer Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-6). IEEE.
576
Bayeva, Z. Detection and Containment the Attack that Leads to a Denial of Service Attack.
577
Masdari, M., & Bakhtiari, F. C. (2014). Alert Management System using K-means Based Genetic for IDS. International Journal of Security and Its Applications, 8(5), 109-118.
578
Kumar, R., Verma, P., & Singh, Y. (2014). Review of MANET Protocols and Introduction of a New Optimized Routing Scheme using Evolutionary Algorithms and Analytical Hierarchy Process. Wireless Communication, 6(4), 161-171.
579
Sodagudi, S., & Rao, D. K. R. (2014). Behavior based Anomaly detection technique to identify Multilayer attacks. International Journal, 2(5).
580
Padma, T., & Pillai, J. S. (2014). Image Watermarking using PQ Sequences.
581
Gholami, S., & Bashirzadeh, R. (2014). A new effective algorithm for on-line robot motion planning. Decision Science Letters, 3(1), 121-130.
582
Padma, T., & Pillai, J. S. (2014). Image Watermarking using PQ Sequences.
583
Belaidi, H., Bentarzi, H., Belaidi, A., & Hentout, A. (2014). Terrain Traversability and Optimal Path Planning in 3D Uneven Environment for an Autonomous Mobile Robot. Arabian Journal for Science and Engineering, 39(11), 8371-8381.
584
Jothi, M. S., & Chandrasekaran, M. Fuzzy Based Optimal Clustering Protocol for Maximizing Lifetime in WSN.
585
Zhaoliu Rong, Shu Mei E, & Zhong Weijun. (2014). Virtual private networks, and intrusion detection systems analyze the optimal allocation of Game Strategies Management Engineering, (4), 187-192.
586
Behdad, M. (2014). Application of Learning Classifier Systems to Fraud Detection Problem (Doctoral dissertation, University of Western Australia).
587
Emilin, S. C. (2014). Detecting And Preventing Phishing Websites Dppws.
588
Varughese, N. M. (2014). collaborative network security management system based on association mining rule. ictact journal on soft computing, 4(4).
589
Singh, G., Kumar, N., & Verma, A. K. (2014). Antalg: An innovative aco based routing algorithm for manets. Journal of Network and Computer Applications, 45, 151-167.
590
Musau, F., Wang, G., & Abdullahi, M. B. (2014). Group formation with neighbor similarity trust in P2P E-commerce. Peer-to-Peer Networking and Applications, 7(4), 295-310.
591
Fouchal, H., Hunel, P., & Ramassamy, C. (2014). Towards efficient deployment of wireless sensor networks. Security and Communication Networks.
592
Mohsin, R., & Woods, J. (2014, September). Performance evaluation of MANET routing protocols in a maritime environment. In Computer Science and Electronic Engineering Conference (CEEC), 2014 6th (pp. 1-5). IEEE.
593
Shegokar, M. S., & Tuteja, M. R. Performance Evaluation of AODV and DSR Routing Protocols for Random Speed Mobility and Intensity Model in MANET Using NS2.
594
Natarajan, E., & Devi, L. (2014). Cross Layer Based Energy Aware Routing and Congestion Control Algorithm in MANET.
595
Ratnaparkhi, V., Patidar, P., & Rawat, M. K. (2014). Implementation of Hybrid Algorithm for Mobility and Routing Issues in MANET. International Journal of Computer Applications, 98(4).
596
Harpal, S. K., & Singh, G. Comparative Performance of MANET Routing Protocols at varying Speed in Different Traffic Patterns.
597
Kaur, A. K. A., & Kaur, A. Improving Node Stability Using Hotspot Algorithm in Mobile Ad-hoc Network.
598
Dhaliwal, B. S., & Malhotra, R. Comparative Appraise and Future Perspectives of Reactive and Proactive Routing Protocols in Manets.
599
Borade, J. L., Mishra, B. K., & Bansode, R. Performance Analysis of LLECLAIR versus AODV in wireless networks.
600
Malathy, E. M., & Muthuswamy, V. (2014, December). Vertical handover performance investigation with discrete event system simulation in next generation wireless network. In Advanced Computing (ICoAC), 2014 Sixth International Conference on (pp. 220-223). IEEE.
601
Arasomwan, A. M., & Adewumi, A. O. (2014). An investigation into the performance of particle swarm optimization with various chaotic maps. Mathematical Problems in Engineering, 2014.
602
Arya, M., Deep, K., & Bansal, J. C. (2014). A nature inspired adaptive inertia weight in particle swarm optimisation. International Journal of Artificial Intelligence and Soft Computing 13, 4(2-3), 228-248.
603
Alrabady, L. A. Y. (2014). An online-integrated condition monitoring and prognostics framework for rotating equipment.
604
Adewumi, A. O., & Arasomwan, A. M. (2014). An improved particle swarm optimiser based on swarm success rate for global optimisation problems. Journal of Experimental & Theoretical Artificial Intelligence, (ahead-of-print), 1-43.
605
Gu, J., & Shi, X. (2014, July). An adaptive PSO based on motivation mechanism and acceleration restraint operator. In Evolutionary Computation (CEC), 2014 IEEE Congress on (pp. 1328-1336). IEEE.
606
Mandil, P., & Mishra, A. MINIMIZATION OF THD IN CASCADE MULTILEVEL INVERTER USING WEIGHT IMPROVED PARTICLE SWARM OPTIMIZATION ALGORITHM.
607
Chen, R. M., & Huang, H. T. (2014, August). Particle Swarm Optimization Enhancement by Applying Global Ratio Based Communication Topology. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on (pp. 443-446). IEEE.
608
Lopez , C. E. M. ( 2014 ) . Search parameters particle swarm optimization solver for constraint satisfaction problems.
609
Babu, K. R., & Sunitha, K. V. N. (2014). An effective hybrid technique for image enhancement through Genetic Algorithm-morphological operations. International Journal of Signal and Imaging Systems Engineering, 7(2), 83-91.
610
Raut, S. D., & Humbe, V. T. (2014). An Approach to Boundary Extraction of Palm Lines and Vein Pattern. International Journal of Image, Graphics and Signal Processing (IJIGSP), 6(12), 47.
611
Babatunde, I. G., Charles, A. O., & Olusegun, O. S. (2014). An Investigation into the Impact of False Minutiae Points on Fingerprint Matching. International Journal of Database Theory and Application, 7(3), 159-178.
612
Babatunde, I. G. Review and Evaluation of Fingerprint Singular Point Detection Algorithms.
613
Karthikeyini, C., Rajamani, V., & Bommanna Raja, K. (2014). Exploring fingerprints using composite minutiae descriptors to determine hereditary relation across multiple generations. International Journal of Biomedical Engineering and Technology, 15(3), 224-242.
614
Chin, R. K. Y., & Lim, J. F. (2014). Fingerprint Recognition Using a Hybrid of Minutiae-and Image-Based Matching Techniques. International Journal of Simulation--Systems, Science & Technology, 15(2).
615
Iwasokun, G. B., & Akinyokun, O. C. False Minutiae’Impact on Fingerprint Matching.
616
Iwasokun, G. B., & Ojo, S. O. (2014). Review and Evaluation of Fingerprint Singular Point Detection Algorithms. British Journal of Applied Science & Technology, 4(35), 4918.
617
Saleh, A. M. A. M. (2014). Enhanced Secure Algorithm for Fingerprint Recognition. arXiv preprint arXiv:1402.4936.
618
Kalia, A., & Sood, S. characterization of reusable software components for better reuse.
619
Al-Khazraji, S. H. A. A. Effect of Creating Dll Libraries in Software Reusable Components.
620
Al-tarawneh, f. h. a framework for cots software evaluation and selection for cots mismatches handling and non-functional requirements.
621
Reddy, J. M., & Prasad, S. V. A. V. Quality Focus of Software Layered Technology using Analytic Hierarchy Process: A Case Study.
622
Kalia, A., & Sood, S. Component Based Software Reusability and Framing Standards for Components to be Reused.
623
Elkamchouchi, H. M., & Hassan, M. (2014). Array pattern synthesis approach using a genetic algorithm. Microwaves, Antennas & Propagation, IET, 8(14), 1236-1240.
624
Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4).
625
Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey. International Journal of Recent Development in Engineering and Technology, 3(4).
626
Rocabado, S. (2014). Caso de estudio de comunicaciones seguras sobre redes móviles ad hoc (Doctoral dissertation, Facultad de Informática).
627
Pattnaik, O., & Pattanayak, B. K. (2014). Security in vehicular ad hoc network based on intrusion detection system. American Journal of Applied Sciences, 11(2), 337.
628
Ponsam, J. G., & Srinivasan, R. (2014). Multilayer intrusion detection in MANET. International Journal of Computer Applications, 98(20).
629
Vimal, S. (2014). An energy efficient intrusion detection system in MANET for secure routing and clustering (Doctoral dissertation).
630
Saraireh, S., Al-Sbou, Y., & Alsmadi, O. (2014). Image Encryption Scheme Based on Filter Bank and Lifting. Int'l J. of Communications, Network and System Sciences, 2014.
631
Gowraj, N., Avireddy, S., & Prabhu, S. SDI-ON: Secure Digital Images over the Network.
632
Osho, O., Zubair, Y. O., Ojeniyi, J. A., & Osho, L. O. a simple encryption and decryption system.
633
Singh, V., Dhiman, H., & Khatkar, M. (2014). a comprehensive study of time complexity of various encryption algorithms. international journal of advances in engineering & technology, 7(2), 495.
634
Ashik, M. H. M., & Vydehi, M. S. Secure Symmetric Key Algorithm [SSKA] For Information Exchange Using Modulo.
635
Mushtaque, M. A., & Singh, M. K. Feasibility Evaluation of Symmetric Key Encryption Techniques for Wireless Channel and Disk Storage. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2.
636
Singh, S., Kumar, A., Shaw, D. K., & Ghosh, D. (2014, February). Script separation in machine printed bilingual (Devnagari and Gurumukhi) documents using morphological approach. In Communications (NCC), 2014 Twentieth National Conference on (pp. 1-5). IEEE.
637
Aparna, R. R., & Radha, R. (2014). Script Identification In Trilingual Indian Documents. International Journal of Image Processing (IJIP), 8(4), 178.
638
ISA, N. A. N. B. M. (2014). language use on twitter among malaysian l2 speakers (doctoral dissertation, university of malaya kuala lumpur).
639
Butt, A. J., Butt, N. A., Butt, R. G., & Ikram, M. T. (2014, January). Predicting Mobile Subscriber’s Behaviour from Contextual Information Extraction: SMS Data. In Neural Information Processing (pp. 661-672). Springer International Publishing.
640
Sasitharan, D. (2014). An empirical investigation of smartphone technology acceptance among Universiti Utara Malaysia students (Doctoral dissertation, Universiti Utara Malaysia).
641
Nicol, E., Dunlop, M., Komninos, A., McGee-Lennon, M., Baillie, L., Edwards, A., ... & Mulder, I. (2014, September). Re-imagining commonly used mobile interfaces for older adults. In Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services (pp. 585-588). ACM.
642
Gilad Gressel, H. P., Surendran, K., Thara, S., & Aravind, A. Ensemble Learning Approach for Author Profiling.
643
Arunkumar, R., & Annalakshmi, A. (2014). A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET. International Journal of Computer Applications, 85(8).
644
VinothKumar, K., & Rajaram, A. (2014). An Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks. IJCSNS, 14(12), 66.
645
Cangea, O. (2014). Cryptographic Protocol for Wireless Networks Security. Petroleum-Gas University of Ploiesti Bulletin, Technical Series, 66(2).
646
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for Manets. Middle-East Journal of Scientific Research, 22(1), 91-98.
647
Deka, S., & Khaturia, M. Performance Analysis of DYMO Routing Protocol under Wormhole Attack in MANET.
648
Pandian, A., & Sadiq, M. A. K. (2014). Authorship categorization in email investigations using fisher's linear discriminant method with radial basis function. Journal of Computer Science, 10(6), 1003.
649
Qi, J. P., Zhang, Q., Zhu, Y., & Qi, J. (2014). A Novel Method for Fast Change-Point Detection on Simulated Time Series and Electrocardiogram Data. PloS one, 9(4), e93365.
650
Jamil, N., Ramli, M. I., Abu Bakar, Z., & Seman, N. (2014, January). Prosody-based sentence boundary detection of spontaneous speech. In Intelligent Systems, Modelling and Simulation (ISMS), 2014 5th International Conference on (pp. 311-317). IEEE.
651
Qi, J. P., Zhang, Q., Qi, J., & Zhu, Y. (2014). A Fast Method for Abrupt Change Detection from Large-Scale Electrocardiogram (ECG) Time Series. In Service Science and Knowledge Innovation (pp. 420-429). Springer Berlin Heidelberg.
652
Jin-peng, Q., Qing, Z., Fang, P., & Jie, Q. (2014, July). A fast method for change point detection from large-scale time series based on Haar Wavelet and Binary Search Tree (HWBST). In Control Conference (CCC), 2014 33rd Chinese (pp. 506-511). IEEE.
653
Han, G., Qian, A., Zhang, C., Wang, Y., & Rodrigues, J. J. (2014). Localization algorithms in large-scale underwater acoustic sensor networks: a quantitative comparison. International Journal of Distributed Sensor Networks, 2014.
654
Ramezani, H., Fazel, F., Stojanovic, M., & Leus, G. (2014). Collision Tolerant Packet Scheduling for Underwater Acoustic Localization. arXiv preprint arXiv:1404.3881.
655
Kulhandjian, H., & Melodia, T. (2014, September). A low-cost distributed networked localization and time synchronization framework for underwater acoustic testbeds. In Underwater Communications and Networking (UComms), 2014 (pp. 1-5). IEEE.
656
Rao, P. M., & Raju, G. S. N. (2014). International Journal of Advanced Research in Computer Science and Software Engineering. International Journal, 4(12).
657
Swain, G. (2014). Digital image steganography using nine-pixel differencing and modified LSB substitution. Indian Journal of Science and Technology, 7(9), 1444-1450.
658
Kachare, H., & Deshmukh, M. Metamorphic Cryptography: A Fusion of Cryptography and Steganography. International Journal of Engineering and Technical Research (IJETR), 2.
659
Venkatesh, K., Shah, S. S. M., Narasimhan, D., Krishnan, R. B., & Raajan, N. R. (2014). A Crypto-Stego Based Approach for Secured Key Transfer. International Journal of Applied Engineering Research, 9(19), 5679-5687.
660
Manjunatha Reddy, H. S. (2014). Design of image steganographic systems for covert communication.
661
Wai, Z., & Than, S. Data Hiding Technique Depended on Pseudorandom Sequences.
662
Leng, H. S. (2014) information hidden research - using perfect square , mixing with minimal distortion and edge detection function modulus of Information Management Thesis Chaoyang University of Technology , 1-64.
663
Aldasouqi, I., & Salameh, W. A. (2014). Using GIS in Designing and Deploying Wireless Network in City Plans.
664
Bikov, D., Bouyuklieva, S., & Stojanova, A. (2014). Wireless network security and cracking security key.
665
Farjamfar, A., Abdullah, M. T., Mahmod, R., & Udzir, N. I. (2014). A review on mobile device's digital forensic process models. Res. J. Applied Sci. Eng. Technol, 8, 358-366.
666
Agbele, K. K. (2014). Context-awareness for adaptive information retrieval systems (Doctoral dissertation, University of the Western Cape).
667
Molaei Kermani , a. , Amir Masoud , mahr , & Abrahymnzhad . (2014 ) . Blind steganography based on Reed-Solomon codes and tables substituted with improved payload optimized embedded and resistance. Journal of Electrical Engineering , University of Tabriz , 43 ( 2 ) , 43-59.
668
Finsterbusch, M., Richter, C., Rocha, E., Muller, J. A., & Hanssgen, K. (2014). A survey of payload-based traffic classification approaches. Communications Surveys & Tutorials, IEEE, 16(2), 1135-1156.
669
Ghaffari, M., & Ghadiri, N. (2014). Ambiguity-Driven Fuzzy C-Means Clustering: How to Detect Uncertain Clustered Records. arXiv preprint arXiv:1409.2821.
670
Suryaputra, A., Samopa, F., & Hindayanto, B. C. (2014). klasterisasi dan analisis trafik internet menggunakan fuzzy c mean dengan ekstraksi fitur data. jurnal informatika, 12(1), 33-39.
671
Paramita, A. S., Samopa, F., & Hindayanto, B. C. (2014). Klasterisasi dan Analisis Trafik Internet Menggunakan Fuzzy C Mean Dengan Ekstraksi Fitur Data.
672
Babu, K. R., & Sunitha, K. V. N. (2014). An effective hybrid technique for image enhancement through Genetic Algorithm-morphological operations. International Journal of Signal and Imaging Systems Engineering, 7(2), 83-91.
673
Barai, A. K. Performance Based Association Rule-Mining Technique Using Genetic Algorithm. algorithms, 1, 2.
674
Asha, T., Natarajan, S., & Murthy, K. N. B. (2014). optimization of association rules for tuberculosis using genetic algorithm. international journal of computing, 12(2), 151-159.
675
Abubacker, N. F., Azman, A., Doraisamy, S., Murad, M. A. A., Elmanna, M. E. M., & Saravanan, R. (2014). Correlation-Based Feature Selection for Association Rule Mining in Semantic Annotation of Mammographic Medical Images. In Information Retrieval Technology (pp. 482-493). Springer International Publishing.
676
Zhao, D. (2014). International Journal of" Computing" Research Institute of Intelligent Computer Systems Ternopil National Economic University. Computing, 13(2).
677
Soundararajan, S. (2014). Multipath congestion control schemes for mobile ad hoc networks.
678
Joardar, S., Giri, D., & Bhattacherjee, V. (2014). Probabilistic Approach-Based Congestion-Aware Swarm-Inspired Load-Balancing Multipath Data Routing in MANETs. In Intelligent Computing, Networking, and Informatics (pp. 409-421). Springer India.
679
Knappstein-Hamelink, S. (2014). Network Discovery in a Recursive Internet Network Architecture (Doctoral dissertation, TU Delft, Delft University of Technology).
680
Singh, G. (2014). Design and Development of ACO Routing Protocol for MANETs (Doctoral dissertation, THAPAR UNIVERSITY, PATIALA).
681
Archana, S., & Saravanan, N. P. (2014, April). Biologically inspired QoS aware routing protocol to optimize lifetime in Sensor Networks. In Recent Trends in Information Technology (ICRTIT), 2014 International Conference on (pp. 1-6). IEEE.
682
Singh, G., Kumar, N., & Verma, A. K. (2014). ANTALG: An Innovative ACO based Routing Algorithm for MANETs. Journal of Network and Computer Applications, 45, 151-167.
683
Shial, R. K., Reddy, K. H. K., & Gouda, B. S. (2014, January). Finding a Trusted and Shortest Path Mechanism of Routing Protocol for Mobile Ad Hoc Network. In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol I (pp. 311-320). Springer International Publishing.
684
Tan, S., Sok, P., & Kim, K. (2014). Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET. International Journal of Networked and Distributed Computing, 2(2), 100-107.
685
Gupta, A., & Gupta, A. K. (2014). A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks. Global Journal of Computer Science and Technology, 14(1-E), 23.
686
Hatzivasilis, G., Papaefstathiou, I., & Manifavas, C. (2014, November). ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks. In Computer Systems and Applications (AICCSA), 2014 IEEE/ACS 11th International Conference on (pp. 56-63). IEEE.
687
Pradeep, P. V., & Harika, C. (2014). Detecting Adversary Location in Mobile Sensor Networks. International Journal of Research, 1(11), 1011-1022.
688
Sharma, R., & Singla, B. An Introduction to MANETS.
689
Sharma, R., & Singla, B. Comparison of AOMDV With and Without Black Hole Attack.
690
BAKILER, H. IMPROVEMENT OF PERFORMANCE AND CAPACITIES OF WIRELESS AD HOC NETWORKS.
691
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for MANETs. Journal of Convergence Information Technology, 9(6), 210.
692
Enshaei, M., Hanapi, Z. M., & Othman, M. (2014). A review: Mobile Ad Hoc Networks challenges, attacks, security, vulnerability and routing protocols. International Journal on Communications Antenna and Propagation (IRECAP), 4(5), 168-179.
693
Hassan, A., Ahsan, S., Alshomrani, S., & Alshamrani, A. (2014). Packet Travel Time based Mechanism for Detection and Mitigation against Wormhole Attack in AODV for MANETs. Life Science Journal, 11(10s).
694
Hassan, A., & Radenkovic, M. (2014, August). Simulation of security attacks and preventions on AODV protocol in ns-3. In Innovative Computing Technology (INTECH), 2014 Fourth International Conference on (pp. 158-163). IEEE.
695
Barkouzos, T. (2014). Security in Ad Hoc networks.
696
Enshaei, M., Hanapi, Z. M., & Othman, M. (2014). Vulnerability and Routing Protocols.
697
Aggarwal, A., Gandhi, S., Chaubey, N., Tada, N., & Trivedi, S. (2014). NDTAODV: Neighbor Defense Technique for Ad Hoc On-Demand Distance Vector (AODV) to mitigate flood attack in MANETS. arXiv preprint arXiv:1405.6216.
698
Aligol, M., & Mohammadbeigi, A. (2014). Studying the tendency of the private sector to participate in family medicine doctors . Journal of Qom University of Medical Sciences , 8 ( 1 ).
699
Abuadlla, Y., Kvascev, G., Gajin, S., & Jovanovic, Z. (2014). Flow-based anomaly intrusion detection system using two neural network stages. Computer Science and Information Systems, 11(2), 601-622.
700
Choi, Y. B., Sershon, C., Briggs, J., & Clukey, C. Survey of Layered Defense, Defense in Depth and Testing of Network Security.
701
ONUwA, O. B. (2014). Improving Network Attack Alarm System: A Proposed Hybrid Intrusion Detection System Model.
702
Hameed, S. M., & Rashid, O. F. Intrusion Detection Approach Based on DNA Signature.
703
Mgabile, T. (2014). Network intrusion detection system using neural networks approach in networked biometrics system (Doctoral dissertation).
704
Chan, G. Y., Lee, C. S., & Heng, S. H. (2014). Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules. Applied Soft Computing, 24, 142-157.
705
Kachurka, P., & Golovko, V. (2014). fusion of recirculation neural networks for real-time network intrusion detection and recognition. international Journal of Computing, 11(4), 383-390.
706
Sethuramalingam, S., & Naganathan, E. R. A Fuzzy Model for Network Intrusion Detection.
707
Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for MANETs. Journal of Convergence Information Technology, 9(6), 210.
708
Sekulski, R., & Woda, M. (2014). Adaptive method of users authentication and authorisation. In Proceedings of the 2nd Asia-Pacific Conference on Computer-Aided System Engineering, APCASE (pp. 10-12).
709
van Eekelen, W., van den Elst, J., & Khan, V. J. (2014). Dynamic layering graphical elements for graphical password schemes. Creating the Difference, 65.
710
Shrivastava, A., & Rizvi, M. A. (2014). Network Security Analysis Based on Authentication Techniques.
711
Vasile, M. A., Pop, F., Tutueanu, R. I., Cristea, V., & Kolodziej, J. (2014). Resource-aware hybrid scheduling algorithm in heterogeneous distributed computing. Future Generation Computer Systems.
712
Singh, S., & Kalra, M. (2014, November). Scheduling of Independent Tasks in Cloud Computing Using Modified Genetic Algorithm. In Computational Intelligence and Communication Networks (CICN), 2014 International Conference on (pp. 565-569). IEEE.
713
Sharma, A., Singh, N., Hans, A., & Kumar, K. (2014, November). Review of task scheduling algorithms using genetic approach. In Computational Intelligence on Power, Energy and Controls with their impact on Humanity (CIPECH), 2014 Innovative Applications of (pp. 169-172). IEEE.
714
Kara, N., Soualhia, M., Belqasmi, F., Azar, C., & Glitho, R. (2014). Genetic-based algorithms for resource management in virtualized IVR applications. Journal of Cloud Computing, 3(1), 1-18.
715
YUSUF, A. B. (2014). application of genetic algorithm in modeling university admission decision support system (doctoral dissertation).
716
Patel, P. S. (2014). Multi-Objective Job Scheduler using Genetic Algorithm in Grid Computing. International Journal of Computer Applications, 92(14).
717
Kang, Y., Zhang, Y., Lin, Y., & Lu, H. (2014). An Improved Ant Colony System for Task Scheduling Problem in Heterogeneous Distributed System. In Computer Engineering and Networking (pp. 83-90). Springer International Publishing.
718
Pan Yang, Qiu Jianlin, Yang Na, Biancai Feng, & Lu Pengcheng. (2014). Multiprocessor task scheduling algorithm based on tabu search. Computer Engineering and Design, 35 (12), 4186-4190.
719
Kadhim, A. I., Cheah, Y. N., & Ahamed, N. H. (2014, December). Text Document Preprocessing and Dimension Reduction Techniques for Text Document Clustering. In Artificial Intelligence with Applications in Engineering and Technology (ICAIET), 2014 4th International Conference on (pp. 69-73). IEEE.
720
Goel, S., Kumar, P., & Saraswat, R. High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator.
721
Angaitkar, A. V., Shekokar, N., & Maurya, M. The Countering the XDoS Attack for Securing the Web Services.
722
Wu Xindong, Li Yadong, & Hu Donghui. (2014). Evidence of the social network. Journal of Software, 25 (12).
723
Rahman, A. F. A., Mohamad, M. Z., Ahmad, R., & Malaysia, C. (2014). Preventive and Detective Mechanism for Forensic Readiness Secure Network Architecture for WBAN.
724
Rahim, N., Wahab, W. A., Idris, Y. I., & Kiah, L. M. Digital Forensics: An Overview of the Current Trends.
725
Liu, Y., Li, C., & Liu, W. (2014). Integrated solution for timely delivery of customer change requests: A case study of using devops approach. International Journal of U-and E-Service Science and Technology, 7(2), 41-50.
726
Kamalzaman, S. N. A., Mohamad, S. M. S., & Sulaiman, S. (2014). Managing Modification Requests in Web Applications: A Systematic Literature Review. International Journal of Software Engineering and Technology, 1(1).
727
Mellado, D., Mouratidis, H., & Fernández-Medina, E. (2014). Secure Tropos framework for software product lines requirements engineering. Computer Standards & Interfaces, 36(4), 711-722.
728
Keerthi, T. (2014). Distilling Mobile Privacy Requirements from Qualitative Data (Doctoral dissertation, The Open University).
729
Tamrakar, S., & Aloney, M. R. (2013). Role of Artificial Neural Networks in Digital Image Processing: A review. Journal of Environmental Science, 2(3), 908-913.
730
Sardar, M., & Majumder, K. (2013). A Comparative Study on Different Trust Based Routing Schemes in MANET. International Journal of Wireless & Mobile Networks, 5(5), 145.
731
Abel, K. (2013).benefits of shifting freight delivery to night time, considering routing and environmental effects for addis ababa city (Doctoral dissertation, aau).
732
Fasola, J., & Mataric, M. (2013). A socially assistive robot exercise coach for the elderly. Journal of Human-Robot Interaction, 2(2), 3-32.
733
Kalaivani, R., & Thangaraj, P. (2013). An effective technique to identify a river’s stage through satellite images by means of RBFNN. The Imaging Science Journal, 61(3), 279-291.
734
Sun, D., Deng, H., Wang, F., Ji, K., Dai, W., Liang, B., & Wei, S. (2013, November). The Feature Related Techniques in Content-Based Image Retrieval and Their Application in Solar Image Data. In Intelligent Networks and Intelligent Systems (ICINIS), 2013 6th International Conference on (pp. 336-339). IEEE.
735
Khandelwal, V., & Goyal, D. (2013). BlackHole Attack and Detection Method for AODV Routing Protocol in MANETs. IJARCET, 2(4), 1555-9.
736
Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of Impact of Wormhole Attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652.
737
Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of Impact of Wormhole Attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652.
738
Karthikeyan, P., Baskar, S., & Alphones, A. (2013). Improved genetic algorithm using different genetic operator combinations (GOCs) for multicast routing in ad hoc networks. Soft Computing, 17(9), 1563-1572.
739
Saehana, S., Iskandar, F., & Abdullah, M. (2013). Optimization of electrospinning parameter by employing genetic algorithm in order to produce desired nanofiber diameter. World Academy of Science, Engineering and Technology, International Journal of Chemical, Molecular, Nuclear, Materials and Metallurgical Engineering, 7(1), 78-83.
740
Singh, M., Sharma, S., & Kaur, A. (2013). Performance Analysis of Decision Trees. International Journal of Computer Applications, 71(19), 10-14.
741
Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques.
742
Li Nan , & Zhang Xuefu . ( 2013 ) found that knowledge-based Application System related data . Library and Information Service , ( 6 ) , 127-133.
743
Rong, C., Quan, Z., & Chakravorty, A. (2013, December). On Access Control Schemes for Hadoop Data Storage. In Cloud Computing and Big Data (CloudCom-Asia), 2013 International Conference on (pp. 641-645). IEEE.
744
Pandian, A., & Sadiq, A. K. (2013). Authorship Attribution in Tamil Language Email For Forensic Analysis. International Review on Computers and Software (IRECOS), 8(12), 3002-3008.
745
Murtaza, M., Shah, J. H., Azeem, A., Nisar, W., & Masood, M. (2013). Structured Language Requirement Elicitation Using Case Base Reasoning. Research Journal of Applied Sciences, Engineering and Technology, 6, 23.
746
Aziz, A. S., Azar, A. T., Salama, M., Hassanien, A. E., & Hanafy, S. E. O. (2013, September). Genetic algorithm with different feature selection techniques for anomaly detectors generation. In Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on (pp. 769-774). IEEE.
747
Alanazi, H. O., Abdullah, A., & Al Jumah, M. (2013). A critical review for an accurate and dynamic prediction for the outcomes of traumatic brain injury based on Glasgow Outcome Scale. Journal of Medical Sciences, 13(4), 244.
748
Priedniece, K., Nikitenko, A., Liekna, A., & Kulikovskis, G. (2013). Use of Learning Methods to Improve Kinematic Models. Applied Computer Systems, 14(1), 73-79.
749
Günüç, S. (2013). Internet Bagimliligini Yordayan Bazi Degiskenlerin Cart ve Chaid Analizleri ile Incelenmesi. Turk Psikoloji Dergisi, 28(71).
750
Günüç, S. (2013). Internet Bagimliligini Yordayan Bazi Degiskenlerin Cart ve Chaid Analizleri ile Incelenmesi. Türk Psikoloji Dergisi, 28(71), 88.
751
Madhura, G. K., & Shivamurthy, R. C. twitter sentiment analysis for product reviews to gather information using mach ine learning.
752
Anand, R., Khanna, R., Student, N. C., & Israna, P. (2013). International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net. CYBERNETICS: SYSTEMS, 43(4).
753
Zhang, Q. (2013). Aspect-Oriented Product Family Modeling.
754
Mguni, K., & Ayalew, Y. (2013). An Assessment of Maintainability of an Aspect-Oriented System. ISRN Software Engineering, 2013.
755
Ramos de Oliveira, R., Sanchez, V., Vinicius, R., Estrella, J. C., Pontin de Mattos Fortes, R., & Brusamolin, V. (2013, September). Comparative evaluation of the maintainability of RESTful and SOAP-WSDL web services. In Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA), 2013 IEEE 7th International Symposium on the (pp. 40-49
756
Tiwari, G., & Sharma, A. Maintainability Prediction-An Artificial Neural Network Based Approach.
757
Ahmed, S., & Nirkhi, S. M. (2013). Fuzzy Forensic Analysis System for DDoS Attack in MANET Response Analysis. simulation, 639(156), 343.
758
Sulaiman, S., Shamsuddin, S. M., & Abraham, A. (2013). A Survey of Web Caching Architectures or Deployment Schemes. International Journal of Innovative Computing, 3(1).
759
Sirour, H. A. N., Hamad, Y. A. M., & Eisa, A. (2013, August). An agent-based proxy cache cleanup model using fuzzy logic. In Computing, Electrical and Electronics Engineering (ICCEEE), 2013 International Conference on (pp. 486-491). IEEE.
760
ShanmugaSundaram, G., & Aswini, S. Optimizing the Performance in Web Browsers through Data Compression.
761
Alguliev, R. M., Aliguliyev, R. M., & Isazade, N. R. (2013). Mr&Mr-Sum: Maximum Relevance And Minimum Redundancy Document Summarization Model. International Journal of Information Technology & Decision Making, 12(03), 361-393.
762
Black, J. (2013). On the derivation of value from geospatial linked data (Doctoral dissertation, University of Southampton).
763
Tan, M., & Morales-Arroyo, M. (2013). Understanding distributional disruptions in the Interactive Digital Media eco-system. International Journal of Electronic Business, 11(1), 42-62.
764
Wong, R. K. (2013). Feasibility and a case study on content optimization services on cloud. Information Systems Frontiers, 15(4), 525-532.
765
Al-Azawi, R., Ayesh, A., Kenny, I., & Al-Masruri, K. A. (2013). Towards an AOSE: Game development methodology. In Distributed Computing and Artificial Intelligence (pp. 493-501). Springer International Publishing.
766
Pauline, M., Aruna, P., & Shadaksharappa, B. (2013). Layered model to Estimate Effort, Performance and cost of the Software projects. International Journal of Computer Applications, 63(13), 17-23.
767
Rai, D., & Tyagi, K. (2013, July). Estimating the regression test case selection probability using fuzzy rules. In Recent Trends in Information Technology (ICRTIT), 2013 International Conference on (pp. 603-611). IEEE.
768
Elgamel, M. S., Korani, E. A., & El Helow, K. R. Developing a Software Certification for Quality Assurance.
769
Dhule, C. A., & Nagrare, T. H. (2013). Design Of Virtual Sense Technology For System Interface. IJRCCT, 2(12), 1454-1459.
770
Eun, H., Lee, H., & Oh, H. (2013). Conditional privacy preserving security protocol for NFC applications. Consumer Electronics, IEEE Transactions on, 59(1), 153-160.
771
Lin, Y., Hou, M., & Xu, Q. (2013, December). Strongly Password-Based Three-Party Authenticated Key Exchange Protocol. In Computational Intelligence and Security (CIS), 2013 9th International Conference on (pp. 555-558). IEEE.
772
Banu, S. S., & Dhanasekaran, R. (2013). EMRCS: Efficient Multipath Routing based Cryptography Scheme in Wireless Sensor Networks. Wireless Communication, 5(1), 24-31.
773
Singh, P., & Chadha, R. S. (2013). A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology (IJEIT), 2(9), 165-175.
774
Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques.
775
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42.
776
Sahu, M., Pradhan, S. R., & Das, M. (2013). Unicode and Colours Mapping for Cryptography and Steganography using Discrete Wavelet Transform. International Journal of Computer Applications, 70(5), 36-41.
777
Tayel, M., Hafez, A., & Shawky, H. (2013, December). A new hybrid fuzzy-decomposed full capacity Stego-system. In High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 2013 10th International Conference on (pp. 16-20). IEEE.
778
ShivaKumar, K. B., Jayaramu, H. S., & Srinidhi, G. A. (2013, September). A novel data hiding technique. In Research & Technology in the Coming Decades (CRT 2013), National Conference on Challenges in (pp. 1-5). IET.
779
Yajurvedi, A. H., & Kulkarni, S. (2013, January). An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 203-212). Springer India.
780
Saejung, S., Boondee, A., Preechasuk, J., & Chantrapornchai, C. (2013, September). On the comparison of digital image steganography algorithm based on DCT and wavelet. In Computer Science and Engineering Conference (ICSEC), 2013 International (pp. 328-333). IEEE.
781
Fayyaz, N., Imranuddin, R., Anwar, S. U., & Rukh, L. (2013). Steganography Based Authentication to Prevent IP Spoofing. Life Science Journal, 10(12s).
782
Nagaty, K. A. (2013). Secret Sharing using Image Hashing. International Journal of Computer Applications, 73(20), 14-22.
783
Sagheer, A. M., Abdulhameed, A. A., & AbdulJabbar, M. A. (2013, December). SMS Security for Smartphone. In Developments in eSystems Engineering (DeSE), 2013 Sixth International Conference on (pp. 281-285). IEEE.
784
Begum, M. B., & Venkataramani, Y. (2013). A new compression scheme for secure transmission. International Journal of Automation and Computing, 10(6), 578-586.
785
Patil, M., & Sahu, V. (2013). A Survey of Compression and Encryption Techniques for SMS.
786
Ahmed, Z. H. (2013). An exact algorithm for the clustered travelling salesman problem. Opsearch, 50(2), 215-228.
787
Ahmed, Z. H. (2013). A hybrid genetic algorithm for the bottleneck traveling salesman problem. ACM Transactions on Embedded Computing Systems (TECS), 12(1), 9.
788
Ahmed, Z. H. (2013). A new reformulation and an exact algorithm for the quadratic assignment problem. Indian Journal of Science and Technology, 6(4), 4368-4377.
789
Kale, K. V., Deshmukh, P. D., Chavan, S. V., Kazi, M. M., & Rode, Y. S. (2013, October). Zernike moment feature extraction for handwritten Devanagari compound character recognition. In Science and Information Conference (SAI), 2013 (pp. 459-466). IEEE.
790
Dineshkumar, R., & Suganthi, J. (2013). A research survey on sanskrit offline handwritten character recognition. International Journal of Scientific and Research Publications (IJSRP), 3, 13-16.
791
Kazi, M. M., & Rode, Y. S. (2013). Handwritten and Printed Devanagari Compound using Multiclass SVM Classifier with Orthogonal moment Feature.
792
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013, March). Handwritten devnagari consonants recognition using mlpnn with five fold cross validation. In Circuits, Power and Computing Technologies (ICCPCT), 2013 International Conference on (pp. 1222-1226). IEEE.
793
Garg, N. K., Kaur, L., & Jindal, M. (2013). Recognition of Offline Handwritten Hindi Text Using SVM. International Journal of Image Processing (IJIP), 7(4), 395.
794
Thaker, H. R., & Kumbharana, C. K. (2013). Study of Different Off-line Handwritten Character Recognition Algorithms for Various Indian Scripts. International Journal of Computer Applications, 65(16).
795
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013, August). Design and analysis of LRTB feature based classifier applied to handwritten Devnagari characters: A neural network approach. In Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on (pp. 96-101). IEEE.
796
Goyal, M., & Garg, N. K. (2013). Techniques for Recognition of Handwritten Devanagari Numeral. International Journal of Advanced Research in Computer Science, 4(9).
797
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. (2013). Classification of Devnagari Handwritten Characters using Single Hidden Layer Neural Network with Mixed Activation Function.
798
Choudhury, A. (2013). Recognition of Handwritten Bangla Numerals using Template Matching (Doctoral dissertation, jadavpur university kolkata).
799
Arora, S. Studies on some Soft Computing Techniques: A Case Study for Constrained Handwritten Devnagari Characters and Numerals.
800
Shinde, S., & Mane, M. V. LBG Vector Quantization for Recognition of Handwritten Marathi Barakhadi.
801
Rojatkar, D. V., Chinchkhede, K. D., & Sarate, G. G. Offline Recognition of Devanagari Handwritten Consonants Using Projection features and mlpnn.
802
Ikram, A., Anjum, A., Hill, R., Antonopoulos, N., Liu, L., & Sotiriadis, S. (2013). Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience.
803
Skracic, K., Pale, P., & Jeren, B. (2013, May). Knowledge based authentication requirements. In Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention on (pp. 1116-1120). IEEE.
804
Kumar, S. B. on-chip address and test pattern generation for image watermarking sram.
805
Uma, M., & Padmavathi, G. (2013). A Survey on Various Cyber Attacks and their Classification. IJ Network Security, 15(5), 390-396.
806
Tanwar, S., & Prema, K. V. (2013). Threats & Security Issues in Ad hoc network: A Survey Report. International Journal of Soft Computing and Engineering, 2(6).
807
Kumar, B. A., Kavuri, K., & Batchanaboyina, M. (2013). A Novel Approach for Preventing Hackers in Data Communication. International Journal of Advanced Studies in Computers, Science and Engineering, 2(2), 1.
808
Grochocki, D. (2013). Deployment considerations for intrusion detection systems in advanced metering infrastructure.
809
Khubalkar, A. S., & Ragha, L. R. (2013, July). Security enabled DSR for establishing symmetric key and security in MANETS. In Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on (pp. 1-5). IEEE.
810
Mandala, S., Abdullah, A. H., Ismail, A. S., Haron, H., Ngadi, M. A., & Coulibaly, Y. (2013, November). A review of blackhole attack in mobile adhoc network. In Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), 2013 3rd International Conference on (pp. 339-344). IEEE.
811
Gupta, N. K., & Garg, A. (2013). Trust and Shortest Path Selection based Routing Protocol for MANET. International Journal of Computer Applications, 76(12).
812
Saxena, N., Kumar, S., & Saxena, V. (2013). Performance Analysis of AODV Routing Protocol under the Different Attacks Through The Use Of OPNET Simulator. International Journal of Innovative Research and Development, 2(12).
813
Shrivastava, S., & Jain, S. (2013). A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network. International Journal of Computer Science & Engineering Technology (IJCSET), 4(3).
814
Singhal, P., & Kumar, R. (2013). Analyzing Misbehavior of Selfish Nodes in Mobile Adhoc Network. International Journal of Computer Applications (0975–8887) Volume.
815
Ahmed, M. N., Abdullah, A. H., & El-Sayed, A. (2013). A survey of MANET survivability routing techniques.
816
Singh, J. P., & Gupta, A. K. (2013). Protocol Stack based Security Vulnerabilities in MANETs. International Journal of Computer Applications (0975–8887), 69(21).
817
Singh, D. (2013). Intrusion Detection System based on Fuzzy C Means Clustering and Probabilistic Neural Network.
818
Singh, A., Khanna, O. S., Singh, S. P., & Singh, J. (2013). Multipath Algorithm For Prevention Of Wormhole Attack In Manet.
819
Shrivastava, A., & Ahirwal, R. R. (2013). A SVM and K-means Clustering based Fast and Efficient Intrusion Detection System. International Journal of Computer Applications, 72(6), 25-29.
820
Callegari, C., Giordano, S., Mannella, S., & Pagano, M. (2013). Design and Implementation of a Testbed for the Security Assessment of MANETs. In Cyberspace Safety and Security (pp. 228-242). Springer International Publishing.
821
Nirmala, G., Thudupathi, E., & Nadu, T. (2013). Risk-Aware Response Mechanism with Extended DS theory. Risk, 2(1), 6-15.
822
Gupta, N. K., & Pandey, K. (2013, August). Trust based Ad-hoc on Demand Routing protocol for MANET. In Contemporary Computing (IC3), 2013 Sixth International Conference on (pp. 225-231). IEEE.
823
ON, S. O. B. H. A. (2013). A STUDY OF DIFFERENT ATTACKS IN MANET AND DISCUSSION ABOUT SOLUTIONS OF BLACK HOLE ATTACK ON AODV PROTOCOL.
824
Chen, P. Y., & Lin, F. Y. S. (2013). Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques. Journal of Applied Mathematics, 2013.
825
Dhiman, D., & Nayyar, A. (2013). Complete Scenario of Routing Protocols, Security Leaks and Attacks in MANETs. International Journal, 3(10).
826
Shukla, R., & Bhandari, R. (2013). A Novel Minimized Computational Time Based Encryption and Authentication Using ECDSA. International Journal of Modern Education and Computer Science (IJMECS), 5(9), 19.
827
Yadav, N. A Detail Qualitative Survey on Denial of Service Attacks in Mobile Ad-hoc Networks.
828
Elamathi, N. a study of routing attacks in wireless mobile adhoc networks.
829
Barcena-Humanes, J. L., Mata-Moya, D., Jarabo-Amores, M. P., del Rey-Maestre, N., & Martin de Nicolas-Presa, J. (2013, June). Analysis of NNs Detectors for Targets with Unknown Correlation in Gaussian Interference. In Computational Intelligence, Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on (pp. 48-53). IEEE.
830
Zamani, A., Sorbi, M. R., & Safavi, A. A. (2013). Application of neural network and ANFIS model for earthquake occurrence in Iran. Earth Science Informatics, 6(2), 71-85.
831
Kodali, R. K., Patel, K. H., & Sarma, N. N. (2013). Implementation of Energy Efficient Scalar Point Multiplication Techniques for ECC. International Journal on Recent Trends in Engineering & Technology, 9(1), 14.
832
Kodali, R. K., Patel, K. H., & Sarma, N. (2013, February). Energy efficient elliptic curve point multiplication for WSN applications. In Communications (NCC), 2013 National Conference on (pp. 1-5). IEEE.
833
Zele, A. P., & Wadhe, A. P. Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography.
834
Kulkarni, V. (2013). Speaker identification using orthogonal transforms and vector quantization.
835
Kekre, H. B., & Kulkarni, V. (2013, January). Closed set and open set Speaker Identification using amplitude distribution of different Transforms. In Advances in Technology and Engineering (ICATE), 2013 International Conference on (pp. 1-8). IEEE.
836
Siddiqui, S. T., Hamatta, H. S., & Bokhari, M. U. (2013). Multilevel Security Spiral (MSS) Model: NOVEL Approach. International Journal of Computer Applications, 65(20).
837
Pirnau, M. (2013, June). The analysis of the. NET architecture security system. In Electronics, Computers and Artificial Intelligence (ECAI), 2013 International Conference on (pp. 1-6). IEEE.
838
Athawale, A. (2013). Information Hiding in image and audio files.
839
Xu, L., Yeh, Y. R., Lee, Y. J., & Li, J. (2013). A Hierarchical Framework Using Approximated Local Outlier Factor for Efficient Anomaly Detection. Procedia Computer Science, 19, 1174-1181.
840
Sladic, G., Vidakovic, M., & Konjovic, Z. (2013). Network Monitoring Using Intelligent Mobile Agents. In Intelligent Systems: Models and Applications (pp. 301-318). Springer Berlin Heidelberg.
841
Chaoyu, Y. A. N. G., Yerong, H. E., & Minli, S. O. N. G. (2013). Wireless Sensor Network Topology Control Based on Agent. Sensors & Transducers (1726-5479), 160(12).
842
Kotenko, I., & Chechulin, A. (2013, June). A cyber attack modeling and impact assessment framework. In Cyber Conflict (CyCon), 2013 5th International Conference on (pp. 1-24). IEEE.
843
Mazumder, J. A., & Hemachandran, K. (2013). A high capacity and secured color image steganographic technique using discrete wavelet transformation. International Journal of Computer Science and Information Technologies, 4(4), 583-589.
844
Mann, V. K., & Dhaliwal, H. S. (2013). 32* 32 Colour Image Steganography. International Journal of Engineering Trends and Technology (IJETT) Vol, 4.
845
Mazumder, J. A., & Hemachandran, K. (2013). Study of Image steganography using LSB, DFT and DWT. International Journal of Computers & Technology, 11(5), 2618-2627.
846
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42.
847
Atawneh, S., & Sumari, P. (2013). Hybrid and Blind Steganographic Method for Digital Images Based on DWT and Chaotic Map. Journal of Communications, 8(11).
848
Zhou, Y., & Ng, W. W. (2013, July). A study of influence between digital watermarking and steganography. In Wavelet Analysis and Pattern Recognition (ICWAPR), 2013 International Conference on (pp. 49-55). IEEE.
849
Lin, Q., Wang, R., Ye, N., & Wang, Z. (2013). Energy efficient distributed steganography for secure communication in wireless multimedia sensor networks. Journal of Electronics (China), 30(1), 9-16.
850
Kanzariya, N., Nimavat, A., & Patel, H. (2013). Security of Digital Images using Steganography Techniques based on LSB, DCT and Huffman Encoding.
851
Yajurvedi, A. H., & Kulkarni, S. (2013, January). An Adaptive Image Steganography Algorithm Using Successive Pixel Difference Embedding and Integer Wavelet Transform. In Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012) (pp. 203-212). Springer India.
852
Mondal, A., Sahana, S., & Mahata, S. K. (2013, April). A Pictorial Block Steganography based Secure Algorithm for Data Transfer. In IJCA Special Issue on International Conference on Computing, Communication and Sensor Network (No. 4, pp. 12-15). Foundation of Computer Science (FCS).
853
Dagar, S. (2013). RGB Based Dual Key Image Steganography.
854
Sahana, S., Sen, J., & Mondal, C. Secure Adaptive N-cryption (SAN).
855
Shahana, T. A Secure DCT Image Steganography based on Public-Key Cryptography.
856
Kamble, S. V., & Warvante, B. G. A Review on Novel Image Steganography Techniques.
857
Mann, V. K., Dhaliwal, H. S., & Dhaliwal, H. S. Nav view search.
858
Maan, V. K., & Dhaliwal, H. S. 32× 32 Vector Quantization Based Colour Image Steganography.
859
Chaturvedi, P., & Bairwa, R. K. Image Steganography Method for Hiding Secret Message in Colored Images by Using IWT.
860
Wang, D., Chen, D., & Guo, R. (2013). DDoS mitigation in content distribution networks. International Journal of Wireless and Mobile Computing, 6(5), 508-514.
861
Cartier, G., Cartier, J. F., & Fernandez, J. M. (2013). Next-generation dos at the higher layers: A study of smtp flooding. In Network and System Security (pp. 149-163). Springer Berlin Heidelberg.
862
Bou-Harb, E., Pourzandi, M., Debbabi, M., & Assi, C. (2013). A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. Security and Communication Networks, 6(12), 1478-1489.
863
Bedi, D. S. (2013). Information security in hospitality SMMEs in the Cape Metropole area: policies and measures in the online environment (Doctoral dissertation, Cape Peninsula University of Technology).
864
Aye, N., Khin, H. S., Win, T. T., KoKo, T., Than, M. Z., Hattori, F., & Kuwabara, K. (2013). Multi-domain public key infrastructure for information security with use of a multi-agent system. In Intelligent Information and Database Systems (pp. 365-374). Springer Berlin Heidelberg.
865
Peng, B., & Li, L. (2013). QoS Multicast Routing Algorithm Based on Genetic Algorithm and Ant Colony Optimization. International Information Institute (Tokyo). Information, 16(10), 7717.
866
Chen, H., & Zhou, P. (2013, July). An ant algorithm for solving the four-coloring map problem. In Natural Computation (ICNC), 2013 Ninth International Conference on (pp. 491-495). IEEE.
867
Nakhumwa, J. N. (2013). Adoption of E-commerce Payment Systems by Commercial Banks in Kenya (Doctoral dissertation, University of Nairobi).
868
Kerrigan, M. (2013). A capability maturity model for digital investigations. Digital Investigation, 10(1), 19-33.
869
Saleem, S., Popov, O., & Appiah-Kubi, O. K. (2013). Evaluating and comparing tools for mobile device forensics using quantitative analysis. In Digital Forensics and Cyber Crime (pp. 264-282). Springer Berlin Heidelberg.
870
Fenu, G., & Solinas, F. (2013). computer forensics investigation an approach to evidence in cyperspace. In The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) (pp. 77-88). The Society of Digital Information and Wireless Communication.
871
Neil, A. M., Elmogy, M., & RIAD, A. (2013). A Proposed Framework for Crime Investigation Based On Windows Registry Analysis. Journal of Engineering and Applied Science, Faculty of Engineering, Cairo University, 60(1).
872
Fenu, G., & Solinas, F. (2013). Computer forensics between the italian legislation and pragmatic questions. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2(1), 9-24.
873
Vlachopoulos, K., Magkos, E., & Chrissikopoulos, V. (2013). A model for hybrid evidence investigation. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, 150.
874
Bulbul, H. I., Yavuzcan, H. G., & Ozel, M. (2013). Digital forensics: An Analytical Crime Scene Procedure Model (ACSPM). Forensic science international, 233(1), 244-256.
875
Hewling, M. O. (2013). Digital forensics: an integrated approach for the investigation of cyber/computer related crimes.
876
Krishnan, M., Karthikeyan, T., Chinnusamy, T. R., & Murugesan, A. (2013). Dynamic Scheduling of Flexible Manufacturing System Using Scatter Search Algorithm. International Journal of Emerging Technology and Advanced Engineering, 3(10), 329-341.
877
Ismail, M. A. (2013, April). Multi-core processor based parallel implementation for finding distribution vectors in Markov processes. In Electronics, Communications and Photonics Conference (SIECPC), 2013 Saudi International (pp. 1-5). IEEE.
878
Shahi, G., & Singh, C. (2013). To Secure and Compress the Message on Local Area Network. International Journal of Computer Applications, 69(17), 43-47.
879
Dutta, S., Kumar, C., & Chakraborty, S. (2013). A symmetric key algorithm for cryptography using music. International Journal of Engineering and Technology, 5(3), 3109-3115.
880
Rote, G. D., & Patil, A. M. Steganography with Cryptography Technique For Data Hiding.
881
Das, D., Lanjewar, U. A., & Sharma, S. J. The Art of Cryptology: From Ancient Number System to Strange Number System.
882
Nithyaa, A. N., Premkumar, R., Kanchana, D., & Krishnan, N. A. (2013). Automated Detection and Classification of Blood Diseases. In Recent Advancements in System Modelling Applications (pp. 393-404). Springer India.
883
Suradkar, P. T. (2013). Detection of malarial parasite in blood using image processing. International Journal of Engineering and Innovative Technology (IJEIT), 2(10).
884
Waghmare, V., & Akhter, S. Image Analysis Based System for Automatic Detection of Malarial Parasite in Blood Images.
885
Opoku-Ansah, J., Anderson, B., Eghan, J. M., Boampong, J. N., Adueming, P. O. W., Amuah, C. L. Y., & Akyea, A. G. (2013). Automated Protocol for Counting Malaria Parasites (P. falciparum) from Digital Microscopic Image Based on L* a* b* Colour Model and K-Means Clustering.
886
Elmir, A., Elmir, B., & Bounabat, B. (2013, November). Multi-facet quality assessment of process driven services in collaborative networks. In ISKO-Maghreb, 2013 3rd International Symposium (pp. 1-7). IEEE.
887
Könst, W. J. (2013). Usability of Networked Information.
888
Elmir, A., Elmir, B., & Bounabat, B. (2013). Towards an Assessment-oriented Model for External Information System Quality Characterization. arXiv preprint arXiv:1310.8111.
889
Mahajan, D., & Sachdeva, M. (2013, December). Distinguishing DDoS Attack from Flash Event Using Real-World Datasets with Entropy as an Evaluation Metric. In Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on (pp. 90-94). IEEE.
890
Kaur, S., & Bansal, R. (2013). enhanced technique for secured and reliable watermarking using mfhwt. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(5), pp-1674.
891
Mishra, S., Mahapatra, A., & Mishra, P. (2013). A survey on Digital watermarking techniques. International Journal of Computer Science and Information Technologies, 4(3), 451-456.
892
Shrirao, D. W., & Honole, S. A Survey on Improving Robustness of Image Watermarking By Using Gradient.
893
Hasan, H. R., Sulong, G. B., & Selamat, A. A Novel Blind Color Image Watermarking Technique in Hybrid Domain Using LSB Approach and Discrete Slantlet Transform.
894
Nilizadeh, A. F., & Nilchi, A. R. N. (2013). Steganography on RGB Images Based on a “Matrix Pattern” using Random Blocks. International Journal of Modern Education and Computer Science (IJMECS), 5(4), 8.
895
Mann, V. K., & Dhaliwal, H. S. (2013). 32* 32 Colour Image Steganography. International Journal of Engineering Trends and Technology (IJETT) Vol, 4.
896
Maan, V. K., & Dhaliwal, H. S. 32× 32 Vector Quantization Based Colour Image Steganography.
897
Mohebbi, K., Ibrahim, S., & Idris, N. B. (2013). Prediction of relevance between requests and web services using ANN and LR models. In Intelligent Information and Database Systems (pp. 40-49). Springer Berlin Heidelberg.
898
Shibata, S. I., Sato, F., Kimura, H., & Oyabu, T. A Fluctuation Characteristic of Plant Bioelectric Potential for Evaluating Abnormal Growth in Physiological Disorders.
899
Das, S., Zaman, J. U., & Ghosh, R. (2013). Generation of AES S-boxes with Various Modulus and Additive Constant Polynomials and Testing their Randomization. Procedia Technology, 10, 957-962.
900
Riman, C., & Hallal, H. H. (2013, January). DES Based Educational Encryption System. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
901
Yadav, S., & Lakhani, K. (2013). A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET. International Journal of Distributed and Parallel Systems, 4(2), 17.
902
Sivagurunathan, S., & Prathapchandran, K. (2013). Survey of Cluster-Based Cryptographic Schemes to Secure MANET. In Proceedings of the International Conference on Applied Mathematics and Theoretical Computer Science (p. 243).
903
Oguike, O. E. (2013). Recursive Shortest Route Algorithm Using Abstract Data Type, Graph. African Journal of Computing & ICT, 6(2).
904
Shaikh, E. A., & Dhale, A. AGV Path Planning and Obstacle Avoidance Using Dijkstra’s Algorithm.
905
Ismail, M. N., Aborujilah, A., Musa, S., & Shahzad, A. (2013, January). Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach. In Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication (p. 36). ACM.
906
Chawla, I., Kaur, D., & Luthra, P. DDoS Attacks in Cloud and Mitigation Techniques.
907
Shah, N., Chaudhary, L., Rajmane, A., Patil, N., & Khatke, K. (2013). Implementation Of C-Trend For Commercial Application.
908
Sardar, M., & Majumder, K. Asurvey on trust based secure routing in manet.
909
Ganesh, M. S., & Thanushkodi, K. (2013).Fashcep: Fuzzy and Analogy Based Hybrid Software Cost Estimation Process. International Review on Computers and Software (IRECOS), 8(7), 1497-1505.
910
Pauline, M., Aruna, P., & Shadaksharappa, B. Comparison of available Methods to Estimate Effort, Performance and Cost with the Proposed Method.
911
Aljahdali, S., & Sheta, A. (2013).Evolving software effort estimation models using multigene symbolic regression genetic programming. Int. J. Adv. Res. Artif. Intell, 2, 52-57.
912
Haghshenas, m., & jeddi, k. Y. (2013). Using mobile devices to improve learning technologies. Ijitr, 1(6), 519-523.
913
Gómez ardila, s. E. (2013). Learning design implementation in context-aware and adaptive mobile learning.
914
Sun, g. (2013). Teamwork as a service: design of a cloud-based system for enhancing teamwork performance in mobile learning.
915
Mehigan, t. J. (2013). Automatic detection of learner-style for adaptive elearning.
916
Ahmad, A. (2013).A model of distributed rights allocation in online social interaction: a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology at Massey University, Albany, Auckland, New Zealand (Doctoral dissertation).
917
Zheng, Y., Huang, Z., & He, T. (2013). Classification based on both attribute value weight and tuple weight under the cloud computing. Mathematical Problems in Engineering, 2013.
918
Vern, R., & Dubey, S. K. (2013). A Survey on Evaluation of the Quality of Software System by Using Fuzzy Logic Approach. Global Journal of Computer Science and Technology, 13(1).
919
Tegegne, W., Belachew, M., & Kifle, M. (2013). Quantification of Software Requirements Specification and Software Quality: Quantitative Approach. HiLCoE Journal of Computer Science and Technology, 144.
920
Hmood, A. (2013). A Unified Metamodel for Assessing and Predicting Software Evolvability Quality (Doctoral dissertation, Concordia University).
921
Tomar, A., & Thakare, V. M. (2013). A Customized Model on Software Quality Assurance & Reuse. International Journal Of Computer Science And Applications, 6(2).
922
Ibrahim, N. H., Mustapha, A., Rosli, R., & Helmee, N. H. (2013). A hybrid model of hierarchical clustering and decision tree for rule-based classification of diabetic patients. International Journal of Engineering and Technology (IJET), 5(5), 3986-91.
923
Thakare, S., & Wadhe, A. P. (2013). A literature Review on Desktop Phishing Based on Visual Appearance Analysis. International Journal of Research in Computer Engineering & Electronics, 2(2).
924
Mitev, I., & Maimarev, R. International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net.
925
Gayathri, C., & Kalpana, V. (2013). Study on Image Steganography Techniques. International Journal of Engineering and Technology (IJET) Vol, 5.
926
Al-Bahadili, H. (2013). A Secure Block Permutation Image Steganography Algorithm. Submitted to the International Journal on Cryptography and Information Security (IJCIS) on 30th July.
927
Kelash, H. M., Abdel Wahab, O. F., Elshakankiry, O., & El-sayed, H. S. (2013, October). Hiding data in video sequences using steganography algorithms. In ICT Convergence (ICTC), 2013 International Conference on (pp. 353-358). IEEE.
928
Chugh, G. (2013). Image Steganography Techniques: A Review Article. acta technica corviniesis-Bulletin of engineering Tome VI July-September, 97-104.
929
Sharda, S., & Budhiraja, S. (2013). Performance Analysis of Image Steganography based on DWT and Arnold Transform. International Journal of Computer Applications, 69(21).
930
Sehgal, P., & Sharma, V. K. (2013). Eliminating Cover Image Requirement in Discrete Wavelet Transform based Digital Image Steganography. International Journal of Computer Applications, 68(3), 37-42.
931
Chee, A. (2013). Steganographic techniques on social media: investigation guidelines (Doctoral dissertation, Auckland University of Technology).
932
Sohag, S. A., Islam, D. M. K., & Islam, M. B. (2013). A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key. American Journal of Engineering Research (AJER) Volume-02, Issue-09.
933
Shah, H., Shinde, P., & Kukreja, J. (2013). Retouching Detection and Steganalysis. International Journal of Engineering Innovations and Research, 2(6), 487.
934
Ali, A. A., & Saad, A. H. S. (2013). New Image Steganography Method by Matching Secret Message with pixels of Cover Image (SMM). International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), 3 (2), 1-10.
935
Saejung, S., Boondee, A., Preechasuk, J., & Chantrapornchai, C. (2013, September). On the comparison of digital image steganography algorithm based on DCT and wavelet. In Computer Science and Engineering Conference (ICSEC), 2013 International (pp. 328-333). IEEE.
936
Patil, H. H., & Hingway, S. P. Improved Way of Image Stegnography for JPEG2000 Compression Standard by Using EBCOT.
937
Poongavanam, V., & Shamala, l. m. an enhanced difference pair mapping steganography method to improve embedding capacity.
938
FADHIL, J. A. (2013). A New Method for Improving the Capacity of Data Hiding in an Image Steganography.
939
Rad, J. M. (2013). Intensity Adaptive LSB Method Applying a Revised Matching. International Journal of Computer Applications, 70(27).
940
Bedwal, T., & Kumar, M. (2013). An Enhanced and Secure Image Steganographic Technique Using RGB-Box Mapping.
941
Arora, A., Neeru, M. N., & Taqdir, M. image steganography techniques: an overview.
942
Jassim, F. A. (2013). A Novel Robust Method to Add Watermarks to Bitmap Images by Fading Technique. arXiv preprint arXiv:1307.1166.
943
Lal, G. J., Veena, V. K., & Soman, K. P. (2013). A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition. In Security in Computing and Communications (pp. 52-62). Springer Berlin Heidelberg.
944
Shihab, A. M., Mohammed, R. K., & Abed, W. M. (2013). evaluating the performance of the secure block permutation image steganography algorithm. international journal of network security & its applications, 5(5), 167.
945
Nagaty, K. A. (2013). Secret Sharing using Image Hashing. International Journal of Computer Applications, 73(20), 14-22.
946
Patil, A. U., Hingway, S. P., & Hingway, S. P. Nav view search.
947
Barmawi, A. M. (2013, November). Strengthening Dynamic Cell Spreading (DCS) image steganography. In Information and Network Security (ICINS 2013), 2013 International Conference on (pp. 1-6). IET.
948
Yunus, Y. A., Ab Rahman, S., & Ibrahim, J. (2013). Steganography: A Review of Information Security Research and Development in Muslim World. American Journal of Engineering Research (AJER), 2(11), 122-128.
949
AKTAS, H., & KALKAN, M. An Application of the Crystography.
950
Kovtun, VY, Hnatiuk, S., & Kinzeryavyy, A. (2013). Systematics modern methods of computer steganography. Safety information, 19 (3), 209-217.
951
Rodrigues, P., Belguinha, A., Gomes, C., Cardoso, P., Vilas, T., Mestre, R., & Rodrigues, J. M. F. (2013). Open source technologies involved in constructing a web-based football information system. In Advances in Information Systems and Technologies (pp. 715-723). Springer Berlin Heidelberg.
952
Syamala, P. J., Vimalai, R., & Vimala, R. Nav view search.
953
Kuseler, T., Lami, I. A., & Al-Assam, H. (2013, May). Location-assured, multifactor authentication on smartphones via LTE communication. In SPIE Defense, Security, and Sensing (pp. 87550B-87550B). International Society for Optics and Photonics.
954
Al-Assam, H., Lami, I. A., & Kuseler, T. (2013). Integrating Cancellable Biometrics with Geographical Location for Effective Unattended Authentication of Users of Mobile Devices. Journal of Communications, 8(11).
955
Namayanja, J. M., & Janeja, V. P. (2013, June). Discovery of persistent threat structures through temporal and geo-spatial characterization in evolving networks. In Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on (pp. 191-196). IEEE.
956
Mandal, S., Saha, G., & Pal, R. K. (2013). An Approach towards Automated Disease Diagnosis & Drug Design Using Hybrid Rough-Decision Tree from Microarray Dataset. J Comput Sci Syst Biol, 6, 337-343.
957
Yinkfu Chuye, K. (2013). Design and Implementation of Machine Learning and Rule-Based System for Verifying Automation System Designs.
958
Gabriel, I., Charles, A. O., & Officer, A. C. (2013). Fingerprint Matching using Neighbourhood Distinctiveness.
959
Babatunde, I. G., & Charles, A. O. (2013). A Fingerprint-based Authentication Framework for ATM Machines. J Comput Eng Inf Technol 2: 3. doi: http://dx. doi. org/10.4172/2324, 9307, 2.
960
Babatunde, I. G., Charles, A. O., & Officer, A. C. (2013, October). Fingerprint matching by neighbourhood characteristics. In Science and Information Conference (SAI), 2013 (pp. 434-442). IEEE.
961
Angaye, C. O., Akinyokun, O. C., & Iwasokun, g. b. experimental study of minutiae based algorithm for fingerprint matching.
962
Han, S. W., Jeoune, D. S., & Yoon, Y. W. (2013). New Minutiae Detection Algorithm from Fingerprint Image using the Improved Tracing on Ridge Curve. International Journal of Security and Its Applications, 7(4), 343-352.
963
Babatunde, I. G., Charles, A. O., & Olatunbosun, O. (2013). Uniformity Level Approach to Fingerprint Ridge Frequency Estimation. International Journal of Computer Applications, 62(22).
964
Jain, N., Sharma, S. K., & Pal, B. L. (2013). Development of a Multimodal Biometric Identification and Verification System using Two Fingerprints. International Journal of Computer Applications, 74(12).
965
Sahu, M., & Shukla, N. Rotation Invariant Approach of SURF for Unimodal Biometric System.
966
Peng xi, peng xiao-qi, zhong yunfei, tang ying, & left the dragon. (2013). extraction of minutiae identity detection method.computer applications and software, 30 (6), 132-136.
967
Dogra, N., & Kaur, H. (2013). Cloud Computing Security: Issues and Concerns. International Journal of Emerging Technology and Advanced Engineering, 3(3).
968
Beham, M. P., & Roomi, S. M. M. (2013). A review of face recognition methods. International Journal of Pattern Recognition and Artificial Intelligence, 27(04), 1356005.
969
Shah, S., Khan, S. A., & Riaz, N. (2013). Analytical Study of Face Recognition Techniques.
970
Thomas, L. L., Gopakumar, C., & Thomas, A. A. Face Recognition based on Gabor Wavelet and Backpropagation Neural Network.
971
Sahraoui, S., & Bouam, S. (2013). Secure routing optimization in hierarchical cluster-based wireless sensor networks. International Journal of Communication Networks and Information Security (IJCNIS), 5(3).
972
Yuhong Zhen, Wu Yonghao, & Zhou Fengli. (2013). Based on vehicle terminal system design µC / OS-? Computer Applications and Software, 30 (2), 324-327.
973
Left flat, Yunfang, Wangsan Fu, & Wang ya. (2013). A new proxy signature scheme without certificate directional Computer Applications and Software, 30 (2), 315-316.
974
Chen, B. C., & Yeh, H. T. (2013). Secure proxy signature schemes from the Weil pairing. The Journal of Supercomputing, 65(2), 496-506.
975
Zambrano, J. G., Guzmán-Ramírez, E., & Pogrebnyak, O. (2013). Search Algorithm for Image Recognition Based on Learning Algorithm for Multivariate Data Analysis. INTECH Open Access Publisher.
976
Hoelz, B. W., & Ralha, C. G. (2013, March). A framework for semantic annotation of digital evidence. In Proceedings of the 28th Annual ACM Symposium on Applied Computing (pp. 1966-1971). ACM.
977
Tanner, A., & Duncan, S. On Integrating Mobile Applications into the Digital Forensic Investigative Process.
978
Ezeah, G. H., Asogwa, C. E., & Edogor, I. O. (2013). Social media use among students of universities in South-East Nigeria. Journal of Humanities and Social Sciences, 16, 23-32.
979
Shittu, A. T., Madarsha, K. B., AbduRahman, N. S. N., & Ahmad, T. B. T. (2013). Determinants of social networking software acceptance: A multi-theoretical approach. The Malaysian Online Journal of Educational Technology, 1(1), 27-43.
980
koçak, n. g., kaya, s., & EROL, E. Social Media from the Perspective of Diffusion of Innovation Approach.
981
Mahmud, Y., Rahim, N. Z. A., & Miskon, S. (2013, October). Developing a conceptual framework of Social Network Site (SNS) appropriation in family context. In Science and Information Conference (SAI), 2013 (pp. 288-293). IEEE.
982
Yaghmaei, & F. Users tend to use this system to evaluate the hospital information system based on innovation diffusion model Razi hospital. Journal of Health Administration.
983
Patel, A., & Verma, M. K. Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET: Reliability Value based Approach. International Journal of Computer Applications (0975-8887) Volume.
984
Patel, A., & Verma, M. K. (2013). Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET. International Journal of Computer Applications, 82(1).
985
Shrivastava, S. Normalized Worm-Hole Local Intrusion Detection Algorithm (NWLIDA).
986
Gupta, A., & Malviya, M. A Novel Recommendation Trust Proxy (RTP) Based Pre-emptive Malicious Node Detection Mechanism for AODV in MANET.
987
Seo, D., Lee, H., & Perrig, A. (2013). APFS: adaptive probabilistic filter scheduling against distributed denial-of-service attacks. Computers & Security, 39, 366-385.
988
Chellani, G., & Kalla, A. (2013). A Review: Study of Handover Performance in Mobile IP. arXiv preprint arXiv:1312.2108.
989
Kumar, R., Verma, P., & Singh, Y. (2013). Mobile Ad Hoc Networks and It’s Routing Protocols. World Academy of Science, Engineering and Technology International Journal of Computer, Information, Systems and Control Engineering, 7(8).
990
Roopak, M., & Reddy, B. (2013). Blackhole Attack Implementation in AODV Routing Protocol. International Journal of Scientific & Engineering Research, 4(5), 402-406.
991
Mobadersany, P., Khanmohammadi, S., & Ghaemi, S. (2013, May). An efficient fuzzy method for path planning a robot in complex environments. In Electrical Engineering (ICEE), 2013 21st Iranian Conference on (pp. 1-6). IEEE.
992
Jafarzadeh, H., Gholami, S., & Bashirzadeh, R. (2013). Decision Science Letters.
993
Garbervetsky, D., & Kim, S. (2013). Report from 2nd international workshop on developing tools as plug-ins (TOPI 2012). ACM SIGSOFT Software Engineering Notes, 38(1), 49-51.
994
Singh, Y., Khatkar, A., Rani, P., Deepika, D., & Barak, D. D. (2013, April). Wormhole Attack Avoidance Technique in Mobile Adhoc Networks. In Advanced Computing and Communication Technologies (ACCT), 2013 Third International Conference on (pp. 283-287). IEEE.
995
Fritzsche, M., & Gilani, W. (2013). U.S. Patent No. 8,438,533. Washington, DC: U.S. Patent and Trademark Office.
996
Elkabbany, G. F., & Elnemr, H. A. (2013). An Efficient Parallel Based Diabetic Retinopathy Grading Algorithm. International Journal of Computer Science and Information Security, 11(9), 12.
997
Younes, O., & Thomas, N. (2013). Modelling and performance analysis of multi-hop ad hoc networks. Simulation Modelling Practice and Theory, 38, 69-97.
998
Krishnakumar, L., & Varughese, N. M. (2013, December). High speed classification of vulnerabilities in cloud computing using collaborative network security management. In Advanced Computing and Communication Systems (ICACCS), 2013 International Conference on (pp. 1-6). IEEE.
999
Kaur, R. (2013). Energy efficient routing protocols in mobile ad hoc network based on AODV protocol. Int. J. Appl. Innov. Eng. Manag.(IJAIEM), 2(1), 323-324.
1000
Rajeshkanna, R., & Saradha, A. (2013). Energy Efficient Enhanced AODV Routing Protocol for maximize the lifetime of Mobile Ad hoc Networks. International Journal of Computer Technology and Applications, 4(5), 856.
1001
Gupta, R., & Aggarwal, H. (2013). Network Density based Analysis of MANET Routing Protocols. International Journal of Computer Applications, 77(10).
1002
Gupta, R. (2013). Ad-hoc routing protocol “review paper”. Journal of Global Research in Computer Science, 4(5), 26-29.
1003
Bernard, T., Fouchal, H., Linck, S., & Perrin, E. (2013, June). Impact of routing protocols on packet retransmission over wireless networks. In Communications (ICC), 2013 IEEE International Conference on (pp. 2979-2983). IEEE.
1004
Rajeshkanna, R., Senthilkumar, S. P., & Kumuthini, C. (2013). Energy Efficient Routing Protocols in Mobile Ad hoc Network Based on Enhanced AODV Protocol.
1005
Bhushan, S., Saroliya, A., & Singh, V. (2013). Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols. International Journal of Advanced Research in Computer and Communication Engineering, 2(6).
1006
Sharma, V., Singh, H., & Kant, S. (2013, September). AODV based energy efficient IEEE 802.16 G VANET network. In Communication and Computing (ARTCom 2013), Fifth International Conference on Advances in Recent Technologies in (pp. 35-43). IET.
1007
Arya, P., Vijay, S., Gupta, V., & Pandey, A. (2013). Effect of File Mobility Pattern on AODV, DSDV and ZRP Routing Protocols in MANET. International Journal of Computer Applications, 80(2).
1008
Yibyeonggwan , and jeongeunhui . (2013) . GSK (Group Secret Key) based SAODV (Secure AODV) routing protocol to detect packet injection attacks. Security Engineering Research Institute Journal of Security Engineering, 10 (6), 681-694.
1009
Agarwal, M. (2013). Text steganographic approaches: a comparison. arXiv preprint arXiv:1302.2718.
1010
Awad, W. S., & Zolait, A. H. (2013). E-Mail as an Official Communication Tool in Bahrain: Individual and Public Organization Perspectives. International Journal of E-Services and Mobile Applications (IJESMA), 5(1), 51-76.
1011
da Rocha, M. C., & Saraiva, J. T. (2013). A discrete evolutionary PSO based approach to the multiyear transmission expansion planning problem considering demand uncertainties. International Journal of Electrical Power & Energy Systems, 45(1), 427-442.
1012
Latha, K., Rajinikanth, V., & Surekha, P. M. (2013). PSO-based PID controller design for a class of stable and unstable systems. ISRN Artificial Intelligence, 2013.
1013
Arasomwan, M. A., & Adewumi, A. O. (2013, June). An adaptive velocity particle swarm optimization for high-dimensional function optimization. In Evolutionary Computation (CEC), 2013 IEEE Congress on (pp. 2352-2359). IEEE.
1014
Arasomwan, M. A., & Adewumi, A. O. (2013). On the performance of linear decreasing inertia weight particle swarm optimization for global optimization. The Scientific World Journal, 2013.
1015
Arasomwan, M. A., & Adewumi, A. O. (2013, April). On adaptive chaotic inertia weights in particle swarm optimization. In Swarm Intelligence (SIS), 2013 IEEE Symposium on (pp. 72-79). IEEE.
1016
Jadon, S. S., Sharma, H., Bansal, J. C., & Tiwari, R. (2013, January). Self adaptive acceleration factor in particle swarm optimization. In Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012) (pp. 325-340). Springer India.
1017
Yavari, S., Zoej, V., Mohammad, J., Mohammadzadeh, A., & Mokhtarzade, M. (2013). Particle swarm optimization of RFM for georeferencing of satellite images. Geoscience and Remote Sensing Letters, IEEE, 10(1), 135-139.
1018
Pessin, G., Osório, F. S., Souza, J. R., Ueyama, J., Costa, F. G., Wolf, D. F., ... & Vargas, P. A. (2013). Investigation on the evolution of an indoor robotic localization system based on wireless networks. Applied Artificial Intelligence, 27(8), 743-758.
1019
Wang, L. (2013). An improved cooperative particle swarm optimizer. Telecommunication Systems, 53(1), 147-154.
1020
Chen, R. M., & Wu, D. S. (2013). Solving Scheduling Problem Using Particle Swarm Optimization with Novel Curve Based Inertia Weight and Grouped Communication Topology. International Journal of Digital Content Technology and its Applications, 7(7), 94.
1021
Ramphuengnit, P., & Polvichai, J. An Effective Hybrid-DEPSO applied with Dynamic Sigmoid Weights.
1022
Costeira da Rocha, M., & Tome Saraiva, J. (2013, June). Transmission expansion planning—A multiyear PSO based approach considering load uncertainties. In PowerTech (POWERTECH), 2013 IEEE Grenoble (pp. 1-6). IEEE.
1023
Singh, N., & Singh, S. B. (2013, September). A New Modified Approach of Mean Particle Swarm Optimization Algorithm. In Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on (pp. 296-300). IEEE.
1024
Chen, R. M., & Hsu, C. C. (2013). Guiding Search Using an Asymmetric Decline Control Function for Solving Flowshop Problems. Journal of Convergence Information Technology, 8(6).
1025
Bahaa-Eldin, A. M. (2013). A medium resolution fingerprint matching system. Ain Shams Engineering Journal, 4(3), 393-408.
1026
Lim, J. F., & Chin, R. K. Y. (2013, December). Enhancing Fingerprint Recognition Using Minutiae-Based and Image-Based Matching Techniques. In Artificial Intelligence, Modelling and Simulation (AIMS), 2013 1st International Conference on (pp. 261-266). IEEE.
1027
Chockaian, K., Vayanaperumal, R., & Kanagaraj, B. R. (2013). New approach for identifying hereditary relation using primary fingerprint patterns. Image Processing, IET, 7(5), 423-431.
1028
Babu, K. R., & Sunitha, K. V. N. (2013). Enhancing Hazy Images with the Aid of Particle Swarm Optimization (PSO) and Morphological Operation. International Review on Computers and Software (IRECOS), 8(1), 21-28.
1029
Babu, K. R., & Sunitha, K. V. N. (2013). Image De-noising and Enhancement for Salt and Pepper Noise using Genetic Algorithm-Morphological Operations. International Journal on Signal and Image Processing, 4(1), 36.
1030
Koteska, B., & Velinov, G. (2013). Component-Based Development: A Unified Model of Reusability Metrics. In ICT Innovations 2012 (pp. 335-344). Springer Berlin Heidelberg.
1031
Valliappan, N., Lozano, A., & Heath, R. W. (2013). Antenna subset modulation for secure millimeter-wave wireless communication. Communications, IEEE Transactions on, 61(8), 3231-3245.
1032
Goswami, B., & Mandal, D. (2013). A genetic algorithm for the level control of nulls and side lobes in linear antenna arrays. Journal of King Saud University-Computer and Information Sciences, 25(2), 117-126.
1033
Banerjee, S., & DWIVEDI, V. V. (2013). Review of Adaptive Linear Antenna Array Pattern Optimization. International Journal of Electronics.
1034
Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24.
1035
Mandala, S., Abdullah, A. H., Ismail, A. S., Haron, H., Ngadi, M. A., & Coulibaly, Y. (2013, November). A review of blackhole attack in mobile adhoc network. In Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), 2013 3rd International Conference on (pp. 339-344). IEEE.
1036
Daniel, J. V., Joshna, S., & Manjula, P. (2013). A Survey of Various Intrusion Detection Techniques in Wireless Sensor Networks. International Journal of Computer Science and Mobile Computing, 2(9).
1037
Singh, D., & Bedi, S. S. (2013). A State of an Art Survey of Intrusion Detection System in Mobile Ad-hoc Network. International Journal of Computer Applications, 82(5).
1038
Butun, I. (2013). Prevention and Detection of Intrusions in Wireless Sensor Networks.
1039
Subha, P. S., & Moses, J. C. A Survey of Various Risk Mitigating Techniques in MANET Environment.
1040
Jacobs, M., Chang, L., & Pulkkinen, A. (2013, January). Automatic Segmentation and Classification of Multiple Coronal Mass Ejections from Coronagraph Images. In Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV) (p. 1). The Steering Committee of The World Congress in Computer Science, Compute
1041
Lee, g. s. color image segmentation using a morphological gradient-based active contour model.
1042
Gupta, R. K., & Singh, P. (2013). A new way to design and implementation of hybrid crypto system for security of the information in public network. International Journal of Emerging Technology and Advanced Engineering, 3(8), 108-115.
1043
Msvs, B. R., Vardhan, V., & Reddy, P. A noval security model for indic scripts-a case study on Telugu. Int. J. Comput. Sci. Secur.(IJCSS), 3(4), 303.
1044
Sinha, S. K., Shrivastava, M., & Pandey, K. K. (2013). A New Way of Design and Implementation of Hybrid Encryption to Protect Confidential Information from Malicious Attack in Network. system, 6, 7.
1045
Das, D., Lanjewar, U. A., & Sharma, S. J. Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS.
1046
Jain, S. A New Approach of Dynamic Encryption using Steganography.
1047
Ceccucci, W., Peslak, A., Kruck, S. E., & Patricia, S. (2013). DOES GENDER PLAY A ROLE IN TEXT MESSAGING?. Issues in Information Systems, 14(2).
1048
Lewis-Mohabir, B. N. (2013). English Language Butchered: A Study of the Correlational Relationship Between Text Messaging Frequency and the Instance of Jargon in Formal Writing.
1049
Fasola, J. P. (2013). socially assistive and service robotics for older adults: from motivating exercise to following spatial language instructions.
1050
Lazim, h. b. m., & sasitharan, d. what factor persuade malaysians consumer to purchase smartphone?.
1051
Kaur, V., Chattopadhyay, D. P., & Kaur, S. (2013). Study on Extraction of Bamboo Fibres from Raw Bamboo Fibres Bundles Using Different Retting Techniques. Textiles and Light Industrial Science and Technology.
1052
Faruk, I. H. (2013). A Novel Approach of Secure Routing Protocol for Mobile Ad Hoc Network (Doctoral dissertation).
1053
Joshi, M. K., & Lalmandoria, H. A Review On Wireless Adhoc Network Security.
1054
Azad, M., Pal, R., Nautiyal, J., Panday, M., & Kumar, K. Review of Emerging Threats, Vulnerabilities and Techniques of Security on Mobile Ad hoc Networks.
1055
Kazemitabar Amirkolaei, M. (2013). Enhancing Bio-inspired Intrusion Response in Ad-hoc Networks (Doctoral dissertation, Edinburgh Napier Unversity).
1056
Valluvan, K. R. (2013). A Comparative Study of Secure Intrusion-Detection Systems for Discovering Malicious Nodes on MANETs.
1057
Labbai, t. p. m., & rajamani, v. (2013). prevention of worm hole and black hole attacks in secure vbor for mobile ad hoc networks. journal of theoretical and applied information technology, 55(2).
1058
Kalaivani, R., & Thangaraj, P. (2013). An effective technique to identify a river’s stage through satellite images by means of RBFNN. The Imaging Science Journal, 61(3), 279-291.
1059
Medialdea, J. L. G., Manamparan, M. E. C., Sorita, M. G. M., Ponce, E. L., & Beltran Jr, A. A. A Novel Thermal Gas Analyzer Using Adaptive Neuro-Fuzzy Inference System (ANFIS).
1060
Salam, M. S. B. H., Mohamad, D., & Salleh, S. H. S. Connected digit speech segmentation: a malay speech case using statistical approach with insertion reduction using neural network.
1061
Diamant, R., & Lampe, L. (2013). Underwater localization with time-synchronization and propagation speed uncertainties. Mobile Computing, IEEE Transactions on, 12(7), 1257-1269.
1062
Kheirabadi, M. T., & Mohamad, M. M. (2013). Greedy routing in underwater acoustic sensor networks: a survey. International Journal of Distributed Sensor Networks, 2013.
1063
Han, G., Qian, A., Li, X., Jiang, J., & Shu, L. (2013, August). Performance evaluation of localization algorithms in large-scale underwater sensor networks. In Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on (pp. 493-498). IEEE.
1064
Li Zuopeng, Caishao Bin, Zhang Jing, high Zhenguo, & Zhao Jing. (2012). Summary of underwater acoustic sensor network node localization technology. Small Computer Systems, 33 (3), 442-447.
1065
Roee, D. (2013). Spatial reuse scheduling and localization for underwater acoustic communication networks.
1066
Tunaa, G., Gungorb, V. C., Dasc, R., & Gulezd, K. A Survey on Potential Applications of Underwater Acoustic Sensor Networks: Deployment Techniques, Localization Algorithms, and Research Challenges.
1067
Dabbour, M., Alsmadi, I., & Alsukhni, E. (2013). Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT. International Journal of Security and its Applications IJAST, 7(1).
1068
Devaraju, S., & Ramakrishnan, S. (2013). Performance comparison of intrusion detection system using various techniques–A review. ICTACT Journal on Communication Technology, 4(3), 802-812.
1069
Manivannan, S. S., & Sathiyamoorthy, E. An Efficient and Accurate Intrusion Detection System to detect the Network Attack Groups using the Layer wise Individual Feature Set.
1070
Nugroho, H. T., & Wicaksono, B. A. (2013). Utilizing Instant Messaging for Real-Time Notification and Information Retrieval of Snort Intrusion Detection System. ISICO 2013.
1071
Arunachalam, V. P., & Ravichandran, T. A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback. International Journal of Computer Science and Security (IJCSS), 3(4), 272.
1072
Barreto, rdmm right, cyberspace and networks: consumer protection challenges in social commerce.
1073
Nithya, M., & Varadarajan, V. (2013). An Security Architecture for Campus Virtual Organization Using Role Based Access Control. Life Science Journal, 10(7s).
1074
Swain, G., & Lenka, S. K. (2013). Steganography using two sided, three sided, and four sided side match methods. CSI transactions on ICT, 1(2), 127-133.
1075
Swain, G. (2013). Steganography in Digital Images Using Maximum Difference of Neighboring Pixel Values. International Journal of Security & Its Applications, 7(6).
1076
Tayel, M., Shawky, H., & Hafez, A. E. S. (2013, January). A hybrid chaos-fuzzy-threshold steganography algorithm for hiding secure data. In Advanced Communication Technology (ICACT), 2013 15th International Conference on (pp. 156-161). IEEE.
1077
Thanekar, S., & Pawar, S. S. (2013, December). OCTA (STAR) PVD: A different approach of image steganopgraphy. In Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on (pp. 1-5). IEEE.
1078
Solanki, R., Chuahan, M., & Desai, m. survey of image steganography techniques.
1079
Kaur, R., & Kaur, B. A Study and Review of Techniques of Spatial Steganography.
1080
Elangovan, B., Rajesh, K., & Venkateswari, P. (2013). An Efficient Method for High Secured Image Steganography Using Image Segments. International Journal of Applied Engineering Research, 8(12).
1081
Sedeeq, I. T. (2013). Steganography in Colored Images. International Journal of Computer Science and Information Security, 11(4), 87.
1082
Gracy, S. A., & Jayakumar, C. (2013). Identifying and Locating Multiple Spoofing Attackers Using Cluster Analysis. In International Conference on Engineering and Technology (p. 123).
1083
Kovtun, VY , Hnatyuk, S. , & Kinzeryavyy , A. (2013) . Systematics modern methods of computer steganography . Safety information , 19 ( 3), 209-217.
1084
Kumari, P., Kumar, C., & Preeyanshi, J. B. (2013). Data Security Using Image Steganography And Weighing Its Techniques. International Journal of Scientific & Technology Research, 2(11).
1085
Al-Bahadili, H. (2013). A Secure Block Permutation Image Teganography Algorithm. Submitted to the International Journal on Cryptography and Information Security (IJCIS) on 30th July.
1086
Asole, S., & Mundada, M. (2013). A Survey on Securing Databases From Unauthorized Users. Int. J. Sci. Technol. Res, 2(4), 2-4.
1087
Abbasy, M. B., & Ordonez, L. M. L. (2013, March). Single-Sink Mobility Performance Analysis on a Wireless Senosr Networks. In Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on (pp. 407-412). IEEE.
1088
Li, B., Springer, J., Bebis, G., & Gunes, M. H. (2013). A survey of network flow applications. Journal of Network and Computer Applications, 36(2), 567-581.
1089
Chadokar, S. K., Singh, D., & Singh, A. (2013, July). Optimizing network traffic by generating association rules using hybrid apriori-genetic algorithm. In Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on (pp. 1-5). IEEE.
1090
Dhanore, G., & Chaturvedi, S. K. (2013). An Optimization of Association Rule Mining using K-Map and Genetic Algorithm for Large Database. International Journal of Computer Applications, 84(17), 26-31.
1091
Taleb, A. M., Yahya, A. A., & Taleb, N. M. Parallel Genetic Algorithm Model to Extract Association Rules.
1092
Krishnamoorthy, k. pagerank algorithm and genetic algorithm in web mining.
1093
Shankar, S., & Purusothaman, T. (2013). A new utility-emphasized analysis for stock trading rules. Intelligent Data Analysis, 17(2), 271-294.
1094
Dahiya, P., & Jyotsna, M. Swam Based ACO Routing Protocol in MANET.
1095
Sutariya, D., & Kamboj, P. (2013). A Survey of QOS Multicast Routing Protocol for MANET.
1096
Nivetha, S. K., Asokan, R., & Senthilkumaran, N. (2013, July). A swarm-based hybrid routing protocol to support multiple Quality of Service (QoS) metrics in mobile ad hoc networks. In Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on (pp. 1-8). IEEE.
1097
Pourahmad, S., Safarpour, A. R., Bananzadeh, A., Rahimikazerooni, S., & Zabangirfard, Z. (2013). A Pilot study on Prediction of Pouchitis in Ulcerative Colitis Patients by Decision Tree Method Versus Logistic Regression Analysis. Annals of Colorectal Research, 1(2), 67-70.
1098
Gebremeskel, K. (2013). Application of Data Mining Techniques to Predict Customers’ churn at Commercial Bank of Ethiopia (Doctoral dissertation, AAU).
1099
Jahantigh, F. F., Nazarnejad, R., & Jahantigh, M. F. Investigating the Risk Factors for Low Birth Weight Using Data Mining: A Case Study of Imam Ali Hospital, Zahedan, Iran.
1100
Blandón, M. G., Howard, G. M., & Torres, R. (2013). Estudio de Medición de la Actividad de Botnets en la República de Panamá.
1101
LA, A. D. B. E.mario isaac gongora bland on.
1102
Lekova, A., & Adda, M. (2013). Reliable OLSR in MANETs for detecting and isolating user selfish nodes. Complex Control Systems, 11, 1-9.
1103
SAI PRAGATHI, Y. V. S., & Setty, S. P. (2013). HYBRID ANONYMOUS LOCATION-AIDED ROUTING PROTOCOL FOR PRIVACY PRESERVING AND AUTHENTICATION IN MANET. Journal of Theoretical & Applied Information Technology, 55(2).
1104
Bhuvaneshwari, K., & Devaraj, A. F. S. (2013). Examination of Impact of Flooding attack on MANET and to accentuate on Performance Degradation. International Journal of Advanced Networking and Applications, 4(4), 1695.
1105
Seethalakshmi, S., & Manikandan, K. C. (2013). Comparison of Different Methods to identify wormhole attacks in MANETS. International Journal of Advanced Networking and Applications, 4(5), 1760.
1106
Sinnreich, A., Graham, N., & Trammell, A. MONDO NET.
1107
Callegari, C., Giordano, S., Mannella, S., & Pagano, M. (2013). Design and Implementation of a Testbed for the Security Assessment of MANETs. In Cyberspace Safety and Security (pp. 228-242). Springer International Publishing.
1108
Sanaei, M. G., Ghani, I., Hakemi, A., & Jeong, S. R. (2013). ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW. Science International, 25(4).
1109
Sudhakar Sengan, D. S. (2013). A Trust and Co-Operative Nodes with Affects of Malicious Attacks and Measure the Performance Degradation on Geographic Aided Routing in Mobile Ad Hoc Network. Life Science Journal, 10(4s).
1110
Arunachalam, V. P., & Ravichandran, T. A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback. International Journal of Computer Science and Security (IJCSS), 3(4), 272.
1111
Arora, K., & Jindal, S. ANALYTICAL REVIEW OF AODV IN WORM HOLE ATTACK.
1112
Abdul Jawad, P. P., & Chacko, B. ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS.
1113
Ghani, I., Hakemi, A., Jeong, S. R., & Sanaei, M. G. P. (2013). ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW. Science International, 25(4).
1114
Gandhi, R., & Joeg, P. LERP: A Secure Location Based Efficient Routing Protocol.
1115
Panda, P., Gadnayak, K. K., & Panda, N. (2013). MANET Attacks and their Countermeasures: A Survey.
1116
Benghabrit, A., Ouhbi, B., Behja, H., & Frikh, B. (2013, June). Text clustering using statistical and semantic data. In Computer and Information Technology (WCCIT), 2013 World Congress on (pp. 1-6). IEEE.
1117
Suja, K. R., & Raglend, I. J. (2013). Adaptive genetic algorithm/neuro-fuzzy logic controller based unified power quality conditioner controller for compensating power quality problems. Australian Journal of Electrical and Electronics Engineering, 10(3), 351-361.
1118
Chan, G. Y., Lee, C. S., & Heng, S. H. (2013). Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks. Journal of Network and Computer Applications, 36(2), 829-842.
1119
Chandrashekhar, A. M., & Raghuveer, K. (2013). Fortification of hybrid intrusion detection system using variants of neural networks and support vector machines. International Journal of Network Security & Its Applications, 5(1), 71-90.
1120
Husagic-Selman, A., Koker, R., & Selman, S. (2013, October). Intrusion detection using neural network committee machine. In Information, Communication and Automation Technologies (ICAT), 2013 XXIV International Symposium on (pp. 1-6). IEEE.
1121
Parate, S., Nirkhi, S. M., & Dharaskar, R. V. (2013, December). Application of Network Forensics for Detection of Web Attack using Neural Network. In IJCA Proceedings on National Conference on Innovative Paradigms in Engineering & Technology 2013 (No. 2, pp. 28-31). Foundation of Computer Science (FCS).
1122
Chana, G. Y., Leea, C. S., & Hengb, S. H. (2013). peanfis-farm framework in defending against web service attacks.
1123
Hameed, S. M., Saad, S., & AlAni, M. F. (2013). An Extended Modified Fuzzy Possibilistic C-Means Clustering Algorithm for Intrusion Detection. Lecture Notes on Software Engineering, 1(3), 273-278.
1124
Selman, A. H. (2013). Intrusion Detection System using Fuzzy Logic.
1125
Li Nan , Zhang Xuefu & study found that knowledge-based application system related data.
1126
LABBAI, T. P. M., & RAJAMANI, V. (2013). PREVENTION OF WORM HOLE AND BLACK HOLE ATTACKS IN SECURE VBOR FOR MOBILE AD HOC NETWORKS. Journal of Theoretical and Applied Information Technology, 55(2).
1127
Skracic, K., Pale, P., & Jeren, B. (2013, January). Knowledge based authentication requirements. In MIPRO 2012 International Convention Opatija.
1128
van Eekelen, W. A., van den Elst, J., & Khan, V. J. (2013, April). Picassopass: a password scheme using a dynamically layered combination of graphical elements. In CHI'13 Extended Abstracts on Human Factors in Computing Systems (pp. 1857-1862). ACM.
1129
Khan, F. N., & Govil, K. (2013). Distributed Task Allocation Scheme for Performance Improvement in Mobile Computing Network. International Journal of Trends in Computer Science, 2(3), 809-817.
1130
Kamal, S., & Singh, B. H. (2013). Scheduling Of Parallel Constrained Task Graphs On Multiprocessor Systems. American International Journal of Research in Science, Technology, Engineering and Mathematics, 153-158.
1131
Kaur, A., & Kaur, P. (2013). Implementation of Mapping Heuristic Genetic Algorithm. International Journal of Advanced Research in Computer and Communication Engineering, 3224-3229.
1132
Tutueanu, R. I., Pop, F., Vasile, M. A., & Cristea, V. (2013). Scheduling Algorithm Based on Agreement Protocol for Cloud Systems. In Algorithms and Architectures for Parallel Processing (pp. 94-101). Springer International Publishing.
1133
Kaur, P., & Kaur, A. Implementation of Dynamic Level Scheduling Algorithm using Genetic Operators. International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume, 2.
1134
Awadall, M., Ahmad, A., & Al-Busaidi, S. (2013). Min–min GA Based Task Scheduling In Multiprocessor Systems. International Journal of Soft Computing and Engineering (IJSCE). ISSN, 2231-2307.
1135
Vasile, M. A., Pop, F., Tutueanu, R. I., & Cristea, V. (2013). HySARC2: Hybrid Scheduling Algorithm Based on Resource Clustering in Cloud Environments. In Algorithms and Architectures for Parallel Processing (pp. 416-425). Springer International Publishing.
1136
Geetha, T., Mahalakshmi, K., Ummusalma, I., & Kumaran, K. M. (2013). An Observational Analysis of Genetic Operators. International Journal of Computer Applications, 63(18), 24-34.
1137
Kaur, A., & Singh, B. (2013). Enhancement of Power Aware Job Scheduling with Minimum Completion Time Algorithm. International Journal of Engineering Science and Technology, 5(7), 1465.
1138
Na'mneh, A., & Darabkh, K. (2013, November). A new genetic-based algorithm for scheduling static tasks in homogeneous parallel systems. In Robotics, Biomimetics, and Intelligent Computational Systems (ROBIONETICS), 2013 IEEE International Conference on (pp. 46-50). IEEE.
1139
Sivasankar, S., Jeyapaul, R., & Kunhahamed, P. K. (2013). Performance study of tool materials and optimisation of pulse duration on EDM of zirconium di boride. International Journal of Machining and Machinability of Materials, 14(2), 123-141.
1140
El-Said, A. M., Eldesoky, A. I., & Arafat, H. A. (2013). An efficient object oriented text analysis (OOTA) approach to construct static structure with dynamic behavior. International Journal of Information Acquisition, 9(01), 1350006.
1141
Benghabrit, A., Ouhbi, B., Behja, H., & Frikh, B. (2013). Statistical and Semantic Feature Selection for Text Clustering. Journal of Intelligent Computing, 4(2), 69-79.
1142
De Quiroz, V. B. A., & Guizzardi, R. S. S. Secure Tropos.
1143
Mohammadi, F. G., & Abadeh, M. S. (2012). A survey of data mining techniques for steganalysis. Recent Advances in Steganography, 1-25.
1144
5. G. Liu and X. Chen, “A Positioning Research of Underwater Acoustic Sensor Networks Based on Support Vector Regression”, Engineering Future Computing, Communication, Control and Management Lecture Notes in Electrical Engineering, 2012, Volume 144, pp. 9-16.
1145
Shukla, D., Verma, K., & Gangele, S. (2012). Least square curve fitting applications under rest state environment in internet traffic sharing in computer network. International Journal of Computer Science and Telecommunications (IJCST), 3(05), 43-51.
1146
Shukla, D., Verma, K., & Gangele, S. (2012). Iso-Failure in Web Browsing using Markov chain model and curve fitting analysis. International journal of modern engineering research (IJMER), 2(02), 512-517.
1147
Sultan Aljahdali, “Development of a Software Effort Estimation Model Using Differential Evolution”, Journal Of Electronics And Computer Systems (IJECS). 12(1), pp. 1-8, 2012.
1148
Woungang, I., Dhurandher, S. K., Peddi, R. D., & Obaidat, M. S. (2012, May). Detecting blackhole attacks on DSR-based mobile ad hoc networks. In Computer, Information and Telecommunication Systems (CITS), 2012 International Conference on (pp. 1-5). IEEE.
1149
Ramana, V. V., Reddy, A., & Sekaran, K. C. (2012). Bio Inspired Approach to Secure Routing in MANETs. arXiv preprint arXiv:1208.3486.
1150
Choudhury, P., Nandi, S., Pal, A., & Debnath, N. C. (2012, July). Mitigating route request flooding attack in MANET using node reputation. In Industrial Informatics (INDIN), 2012 10th IEEE International Conference on (pp. 1010-1015). IEEE.
<