CATEGORIES
IJANA ARTICLES

VOLUME 6
Issue 1
Issue 2
Issue 3
Issue 4
Issue 5
Issue 6
Volume 6 Issue:02 Sep-Oct 2014
Application Layer Intrusion Detection with Combination of Explicit-Rule-Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program

Amal Saha, Sugata Sanyal
2202-2208
Investigation and application of Personalizing Recommender Systems based on ALIDATA DISCOVERY

Tang Zhi-hang
2209-2213
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms and Messenger Environments

Dr. Jatinderkumar R. Saini
2214-2221
Applying Content-Based Image Retrieval Techniques to Provide New Services for Tourism Industry

Zobeir Raisi, Farahnaz Mohanna, Mehdi Rezaei
2222-2232
Software Defined Networking: A Concept and Related Issues

Deepak Kumar, Manu Sood
2233-2239
Security Issues in Cloud Computing - A Review

Irfan Hussain, Imran Ashraf
2240-2243
A Novel Technique in Software Engineering for Building Scalable Large Parallel Software: Demonstration on Dynamical Core of VARSHA - A Global Circulation Model Software

T. Venkatesh, U.N.Sinha
2244-2252
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks

P.V. Siva Kumar, Dr. Rajasekhara Rao Kurra, Appala Naidu Tentu and G.Padmavathi
2253-2261
Securing Cloud from Cloud Drain

Niva Das, Tanmoy Sarkar
2262-2265
Survey on Host and Network Based Intrusion Detection System

Niva Das, Tanmoy Sarkar
2266-2269
The Management of Information Systems and Its Impact on the Quality of Services

Dr. hiyam S. ensour Tareg M.lafi alinizi
2270-2284
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems

Amal Saha, Sugata Sanyal
2285-2290
All Copyrights © 2017 , Eswar PublicationsDesigned by , klmn Software Solutions