Skoči na glavni sadržaj
  • Datum izdavanja: 20.03.2015.
  • Objavljen na Hrčku: 13.04.2017.

Sadržaj

Puni tekst

Guest Editorial: Network Security and Data Mining (str. I-II)

Priya Iyer K B
Uvodnik


Single Sign-on Mechanism for Secure Web Service Access through ISSO (str. 8-14)

Ramamurthi Deeptha, Rajeswari Mukesh
Izvorni znanstveni članak


Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT (str. 15-24)

Anjaneyulu Endurthi, Oinam Bidyapati Chanu, Appala Naidu Tentu, V. Ch. Venkaiah
Izvorni znanstveni članak


Effectiveness of Support Vector Machines in Medical Data mining (str. 25-30)

Padmavathi Janardhanan, Heena L., Fathima Sabika
Izvorni znanstveni članak


Mining Software Repositories for Defect Categorization (str. 31-36)

Sakthi Kumaresh, Ramachandran Baskaran
Izvorni znanstveni članak


Towards Effective Control of P2P Traffic Aggregates in Network Infrastructures (str. 37-47)

Pedro Sousa
Izvorni znanstveni članak


Posjeta: 13.579 *