To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10849

Title

Proactive Authentication Mechanism to Secure Distance Vector Routing Protocol (RIPV2) by minimizing By-Pass Attacks

Author

Rizwan Hassan, Saleem ullah, Gulfam Ahmed Umar

Citation

Vol. 17  No. 3  pp. 244-251

Keywords

Routing, RIP, SHA 512, Authentication, and Cryptography.


Title

Survey on Security Issues Techniques Used in Data Warehouses

Author

Mayada J. AlMeghari

Citation

Vol. 17  No. 3  pp. 236-243

Keywords

Data Warehouse, Confidentiality, Privacy, Integrity, Information Security, Middleware


Title

An Introduction to Docker and Analysis of its Performance

Author

Babak Bashari Rad, Harrison John Bhatti, Mohammad Ahmadi

Citation

Vol. 17  No. 3  pp. 228-235

Keywords

Docker, Docker Container, Virtual Machine, Virtualization, Cloud Computing.


Title

Voting based Extreme Learning Machine with search based Ensemble Pruning

Author

Sanyam Shukla, Rajesh Wadhvani, Jyoti Bharti, Manasi Gyanchandani

Citation

Vol. 17  No. 3  pp. 223-227

Keywords

Extreme Learning Machine, Voting Based Extreme Learning Machine, Ensemble Pruning, Gain.


[1] ... [prev] [1581] [1582] [1583] [1584] [1585] [1586] [1587] [1588] [1589] [1590] [next] ... [2713]