Follow
International Journal of Computer Science, Information Technology, & Security
International Journal of Computer Science, Information Technology, & Security
IJCSITS (ISSN 2249-9555)
No verified email - Homepage
Title
Cited by
Cited by
Year
Cloud computing: security issues and research challenges
RP Padhy, MR Patra, SC Satapathy
International Journal of Computer Science and Information Technology …, 2011
3342011
Lightweight cryptography for embedded systems–a comparative analysis
C Manifavas, G Hatzivasilis, K Fysarakis, K Rantos
International Workshop on Data Privacy Management, 333-349, 2013
1652013
A fuzzy logic based personalized recommender system
BA Ojokoh, MO Omisore, OW Samuel, TO Ogunniyi
International Journal of Computer Science and Information Technology …, 2012
652012
Methods of fractal dimension computation
A Annadhason
International Journal of Computer Science and Information Technology …, 2012
652012
Comparative analysis of inter satellite optical wireless channel for NRZ and RZ modulation formats for different levels of input power
P Kaur, A Gupta, M Chaudhary
Procedia Computer Science 58, 572-577, 2015
612015
Allocation of virtual machines in cloud computing using load balancing algorithm
MRMD Shah, MRAA Kariyani, MRDL Agrawal
International Journal of Computer Science and Information Technology …, 2013
612013
A survey on the applications of fuzzy logic in medical diagnosis
V Prasath, N Lakshmi, M Nathiya, N Bharathan, P Neetha
International Journal of Scientific & Engineering Research 4 (4), 1199-1203, 2013
602013
Design of Wireless Home automation and security system using PIC Microcontroller
VS Narayanan, S Gayathri
International Journal of Computer Applications in Engineering Sciences 3 (13 …, 2013
542013
A survey on gray hole attack in manet
V Shanmuganathan, T Anand
IRACST–International Journal of Computer Networks and Wireless …, 2012
482012
Crop yield prediction using Agro Algorithm in Hadoop
AK Kushwaha, S Bhattachrya
International Journal of Computer Science and Information Technology …, 2015
452015
An efficient algorithm for detection of blackhole attack in aodv based manets
N Khemariya, A Khuntetha
International Journal of Computer Applications 66 (18), 2013
452013
Trust and big data: a roadmap for research
J Sänger, C Richthammer, S Hassan, G Pernul
2014 25th international workshop on database and expert systems applications …, 2014
372014
Decision support system for malaria and dengue disease diagnosis (DSSMD)
P Sharma, DBV Singh, MK Bandil, N Mishra
International Journal of Information and Computation Technology 3 (7), 633-640, 2013
362013
Study of security issues in cloud computing
AW Varsha, S Gupta
Int. J. Comput. Sci. Mob. Comput 4 (6), 230-234, 2015
352015
Content based news recommendation system based on fuzzy logic
MNM Adnan, MR Chowdury, I Taz, T Ahmed, RM Rahman
2014 International Conference on Informatics, Electronics & Vision (ICIEV), 1-6, 2014
342014
Hindi named entity recognition by aggregating rule based heuristics and hidden markov model
D Chopra, N Jahan, S Morwal
International Journal of Information 2 (6), 43-52, 2012
342012
An integrated DEMATEL and AHP approach for personnel estimation
B Roy, SK Misra, P Gupta, A Goswami
International Journal of Computer Science and Information Technology …, 2012
342012
Named entity recognition for Punjabi language
A Kaur
Patiala, 2012
322012
Position detection and tracking system
M Kadibagil, HS Guruprasad
International Journal of Computer Science and Information Technology …, 2014
312014
Named entity recognition for nepali language: A semi hybrid approach
A Dey, A Paul, BS Purkayastha
International Journal of Engineering and Innovative Technology (IJEIT …, 2014
302014
The system can't perform the operation now. Try again later.
Articles 1–20