Follow
International Journal of Computer Science and Information Security
International Journal of Computer Science and Information Security
IJCSIS (ISSN 1947-5500)
No verified email - Homepage
Title
Cited by
Cited by
Year
Speech Recognition by Machine: A Review
MA Anusuya, SK Katti
International Journal of Computer Science and Information Security 6 (3 …, 2010
1416*2010
A survey of attacks, security mechanisms and challenges in wireless sensor networks
DG Padmavathi, M Shanmugapriya
arXiv preprint arXiv:0909.0576, 2009
6602009
A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks
DG Padmavathi, D Shanmugapriya
International Journal of Computer Science and Information Security 4 (1), 2009
6602009
Survey of Nearest Neighbor Techniques
N Bhatia, Vandana
International Journal of Computer Science and Information Security 8 (2 …, 2010
6212010
Data mining: Prediction for performance improvement of graduate students using classification
K Bunkar, UK Singh, B Pandya, R Bunkar
2012 Ninth International Conference on Wireless and Optical Communications …, 2012
6002012
A review on speech recognition technique
SK Gaikwad, BW Gawali, P Yannawar
International Journal of Computer Applications 10 (3), 16-24, 2010
5612010
Application of k Means Clustering algorithm for prediction of Students Academic Performance
OJ Oyelade, OO Oladipupo, IC Obagbuwa
arXiv preprint arXiv:1002.2425, 2010
5372010
Application of k-Means Clustering algorithm for prediction of Students’ Academic Performance
OJ Oyelade, OO Oladipupo, IC Obagbuwa
International Journal of Computer Science and Information Security 7 (1 …, 2010
5372010
A guide to dynamic load balancing in distributed computer systems
AM Alakeel
International journal of computer science and information security 10 (6 …, 2010
4212010
Load Balancing in Distributed Computer Systems
AM Alakeel
International Journal of Computer Science and Information Security 8 (4), 8-13, 2010
421*2010
Solving the problem of the K parameter in the KNN classifier using an ensemble learning approach
AB Hassanat, MA Abbadi, GA Altarawneh, AA Alhasanat
arXiv preprint arXiv:1409.0919, 2014
2912014
Security threats on cloud computing vulnerabilities
TS Chou
AIRCC's International Journal of Computer Science and Information Technology …, 2013
2732013
Entropy based anomaly detection system to prevent DDoS attacks in cloud
AS Navaz, V Sangeetha, C Prabhadevi
arXiv preprint arXiv:1308.6745, 2013
2502013
Intrusion detection techniques for mobile cloud computing in heterogeneous 5G
K Gai, M Qiu, L Tao, Y Zhu
Security and communication networks 9 (16), 3049-3058, 2016
2292016
ECG Feature Extraction Techniques - A Survey Approach
S Karpagachelvi, DM Arthanari, M Sivakumar
International Journal of Computer Science and Information Security 8 (1), 76-80, 2010
2222010
Shoulder Surfing attack in graphical password authentication
AH Lashkari, S Farmand, DOB Zakaria, DR Saleh
International Journal of Computer Science and Information Security 6 (2 …, 2009
1942009
Internet of things security, device authentication and access control: a review
I Ali, S Sabir, Z Ullah
arXiv preprint arXiv:1901.07309, 2019
1892019
Comparison of the characteristic time (CTC), representative interactive flamelet (RIF), and direct integration with detailed chemistry combustion models against optical …
S Singh, RD Reitz, MPB Musculus
SAE transactions, 61-82, 2006
1592006
A survey of cloud computing security challenges and solutions
NH Hussein, A Khalid
International Journal of Computer Science and Information Security 14 (1), 52, 2016
1502016
A Survey on Preprocessing Methods for Web Usage Data
V Chitraa, DAS Davamani
International Journal of Computer Science and Information Security 7 (3), 78-83, 2010
1492010
The system can't perform the operation now. Try again later.
Articles 1–20