Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

CS (ISBN: 973-93-80864-65-2)

# Article Title
1 Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network
Authors : Madhumathi Rajesh, Rama Sugavanam, G R Gangadevi
2 An Approach for SMS Security using Authentication Functions
Authors : Neetesh Saxena, Narendra S. Chaudhari
3 A New Security Protocol for Mobile Ad Hoc Networks
Authors : K. Sahadevaiah, Prasad Reddy P.V.G.D., G. Narsimha
4 Spatial and Frequency Domain for Grey level Digital Images
Authors : Dharm Singh, Naveen Choudhary, Madhuri Agrawal
5 Impact of Node Density and Mobility on Scalable Routing Protocols in Mobile Ad-Hoc Networks
Authors : Vinay Kumar, Sanjeev Jain, Sudarshan Tiwari
6 An Approach to Increase Bandwidth Utilization under Suspected Flood Attack
Authors : Raman Singh, Harish Kumar, R.K. Singla
7 Honeysand: An Open Source Tools based Sandbox Environment for Bot Analysis and Botnet Tracking
Authors : Saurabh Chamotra, Rakesh Kumar Sehgal, Raj Kamal
8 Analyzing Digital Signature Robustness with Message Digest Algorithms
Authors : Rubina B. Patel, Naveen Chaudhary
9 Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach
Authors : Suriti Gupta, Vinod Kumar
10 An Integrated Framework for Malware Collection and Analysis for Botnet Tracking
Authors : Rakesh Kumar Sehgal, D. S. Bhilare, Saurabh Chamotra
11 Block based Digital Watermarking of Gray Images in the Singular Domain
Authors : Rashmi Agarwal
12 Social Impact of Internet Access: A Survey
Authors : Poonam Dhaka, Sandeep Upadhyay, Drashti Dave
13 Privacy-Preserving Data Sharing Using Data Reconstruction Based Approach
Authors : Kshitij Pathak, Narendra S. Chaudhari, Aruna Tiwari