ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
2018: Vol 7 Iss 1-2
Vol 7 Iss 1-2

Articles

T. Subburaj, K. Suthendran
1-12
DigitalWatering Hole Attack Detection Using Sequential Pattern
https://doi.org/10.13052/jcsm2245-1439.711
PDF HTML
S. Rajeswari, K. Suthendran
13-24
Chi-Square MapReduce Model for Agricultural Data
https://doi.org/10.13052/jcsm2245-1439.712
PDF HTML
C. Revathy, G. Sekar
25-38
Analytic Hierarchy Process for Resource Allocation in Cloud Environment
https://doi.org/10.13052/jcsm2245-1439.713
PDF HTML
K. Anish Pon Yamini, Suthendran Kannan, Arivoli Thangadurai
39-52
Handling Selfishness over Collaborative Mechanism in a Mobile Ad hoc Network
https://doi.org/10.13052/jcsm2245-1439.714
PDF HTML
Maragatharajan M, Balakannan S. P.
53-68
A Secured MANET Using Multicast Routing Protocols and Semi Markov Process
https://doi.org/10.13052/jcsm2245-1439.715
PDF HTML
A. Sebastian, S. Sivagurunathan
69-86
Multi DODAGs in RPL for Reliable Smart City IoT
https://doi.org/10.13052/jcsm2245-1439.716
PDF HTML
Sam George, K. David
87-94
Security Strategies for Safe Data and Content Access in Operational Modules of Product Data Management Software
https://doi.org/10.13052/jcsm2245-1439.717
PDF HTML
Karuppasamy M., Balakannan S. P.
95-108
Energy Saving from Cloud Resources for a Sustainable Green Cloud Computing Environment
https://doi.org/10.13052/jcsm2245-1439.718
PDF HTML
Aswin Gopalakrishnan, Emanuele Vineti, Ashok Kumar Mohan, M. Sethumadhavan
109-130
The Art of Piecewise Hashing: A Step Toward Better Evidence Provability
https://doi.org/10.13052/jcsm2245-1439.719
PDF HTML
B. Thilagavathi, K. Suthendran
131-144
Boosting Based Implementation of Biometric Authentication in IoT
https://doi.org/10.13052/jcsm2245-1439.7110
PDF HTML
A. Jainul Fathima, G. Murugaboopathi
145-160
A Novel Customized Big Data Analytics Framework for Drug Discovery
https://doi.org/10.13052/jcsm2245-1439.7111
PDF HTML
Meenakshi Suresh, P. P. Amritha, Ashok Kumar Mohan, V. Anil Kumar
161-180
An Investigation on HTTP/2 Security
https://doi.org/10.13052/jcsm2245-1439.7112
PDF HTML
V. Sivasangari, Ashok Kumar Mohan, K. Suthendran, M. Sethumadhavan
181-200
Isolating Rumors Using Sentiment Analysis
https://doi.org/10.13052/jcsm2245-1439.7113
PDF HTML
A. Aswin Kumar, Ashok Kumar Mohan, P. P. Amritha
201-214
Deceiving Attackers in Wireless Local Area Networks Using Decoys
https://doi.org/10.13052/jcsm2245-1439.7114
PDF HTML
K. Karthigadevi, S. Balamurali, M. Venkatesulu
215-228
Wormhole Attack Detection and Prevention Using EIGRP Protocol Based on Round Trip Time
https://doi.org/10.13052/jcsm2245-1439.7115
PDF HTML