ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
2018: Vol 7 Iss 1-2
Submit Article
River Publishers Journals
View All Issues
About
About the Journal
Editorial Team
Open Access Information
Indexing & Metrics
Publication Ethics
Privacy Policy
Contact
FOR AUTHORS
Submit Paper
Call for Papers
Manuscript Preparation Guidelines
Journal Charges
Download MS Word Template
Download LaTeX Style File
Special Issue Proposal Guidelines
Best Paper Awards
Search
Journal Home
Register
Login
Journal Home
Register
Login
2018
Published January 25, 2018
Vol 7 Iss 1-2
Articles
T. Subburaj, K. Suthendran
1-12
DigitalWatering Hole Attack Detection Using Sequential Pattern
https://doi.org/10.13052/jcsm2245-1439.711
PDF
HTML
S. Rajeswari, K. Suthendran
13-24
Chi-Square MapReduce Model for Agricultural Data
https://doi.org/10.13052/jcsm2245-1439.712
PDF
HTML
C. Revathy, G. Sekar
25-38
Analytic Hierarchy Process for Resource Allocation in Cloud Environment
https://doi.org/10.13052/jcsm2245-1439.713
PDF
HTML
K. Anish Pon Yamini, Suthendran Kannan, Arivoli Thangadurai
39-52
Handling Selfishness over Collaborative Mechanism in a Mobile Ad hoc Network
https://doi.org/10.13052/jcsm2245-1439.714
PDF
HTML
Maragatharajan M, Balakannan S. P.
53-68
A Secured MANET Using Multicast Routing Protocols and Semi Markov Process
https://doi.org/10.13052/jcsm2245-1439.715
PDF
HTML
A. Sebastian, S. Sivagurunathan
69-86
Multi DODAGs in RPL for Reliable Smart City IoT
https://doi.org/10.13052/jcsm2245-1439.716
PDF
HTML
Sam George, K. David
87-94
Security Strategies for Safe Data and Content Access in Operational Modules of Product Data Management Software
https://doi.org/10.13052/jcsm2245-1439.717
PDF
HTML
Karuppasamy M., Balakannan S. P.
95-108
Energy Saving from Cloud Resources for a Sustainable Green Cloud Computing Environment
https://doi.org/10.13052/jcsm2245-1439.718
PDF
HTML
Aswin Gopalakrishnan, Emanuele Vineti, Ashok Kumar Mohan, M. Sethumadhavan
109-130
The Art of Piecewise Hashing: A Step Toward Better Evidence Provability
https://doi.org/10.13052/jcsm2245-1439.719
PDF
HTML
B. Thilagavathi, K. Suthendran
131-144
Boosting Based Implementation of Biometric Authentication in IoT
https://doi.org/10.13052/jcsm2245-1439.7110
PDF
HTML
A. Jainul Fathima, G. Murugaboopathi
145-160
A Novel Customized Big Data Analytics Framework for Drug Discovery
https://doi.org/10.13052/jcsm2245-1439.7111
PDF
HTML
Meenakshi Suresh, P. P. Amritha, Ashok Kumar Mohan, V. Anil Kumar
161-180
An Investigation on HTTP/2 Security
https://doi.org/10.13052/jcsm2245-1439.7112
PDF
HTML
V. Sivasangari, Ashok Kumar Mohan, K. Suthendran, M. Sethumadhavan
181-200
Isolating Rumors Using Sentiment Analysis
https://doi.org/10.13052/jcsm2245-1439.7113
PDF
HTML
A. Aswin Kumar, Ashok Kumar Mohan, P. P. Amritha
201-214
Deceiving Attackers in Wireless Local Area Networks Using Decoys
https://doi.org/10.13052/jcsm2245-1439.7114
PDF
HTML
K. Karthigadevi, S. Balamurali, M. Venkatesulu
215-228
Wormhole Attack Detection and Prevention Using EIGRP Protocol Based on Round Trip Time
https://doi.org/10.13052/jcsm2245-1439.7115
PDF
HTML
×
Username
*
Required
Password
*
Required
Forgot your password?
Keep me logged in
Login
No account?
Register here