Vol 2, No 2 (2014)

Table of Contents

Vol 2, No 2 (2014)

Open Access Open Access  Restricted Access Subscription Access

Articles

Remote User Authentication using Optical Character Recognition
C. Sreekanth Reddy, C. Shobha Bindu
 Vol 2, No 2 (2014), Pagination: 1-7
ABSTRACT |  PDF     Abstract Views: 181  |  PDF Views: 1
Extraction of Protein Sequence Motif Information using PSO K-Means
R. Gowri, R. Rathipriya
 Vol 2, No 2 (2014), Pagination: 8-13
ABSTRACT |  PDF     Abstract Views: 190  |  PDF Views: 1
Intelligent Firewall Using Intrusion Detection System Based on Neural Networks
Mandar Dinesh Sawant, Madhura Milind Phatak, Mrugank Ajay Ranavde, Nitya R. Laxamanan
 Vol 2, No 2 (2014), Pagination: 14-17
ABSTRACT |  PDF     Abstract Views: 221  |  PDF Views: 1
Security Architecture for Telemetry Networks
Farzad Moazzami, Richard Dean
 Vol 2, No 2 (2014), Pagination: 18-24
ABSTRACT |  PDF     Abstract Views: 193  |  PDF Views: 1
An Architecture for Host-Based Intrusion Detection Systems using Fuzzy Logic
Maryam Rostamipour, Babak Sadeghiyan
 Vol 2, No 2 (2014), Pagination: 25-32
ABSTRACT |  PDF     Abstract Views: 270  |  PDF Views: 1