Table of Contents
Articles
Authentication Database Leakage Detection | |
ISRAA S. AHMED | 1-4 |
Single Sink Repositioning Technique in Wireless Sensor Networks for Increasing Throughput and Decreasing Delay | |
Asrat Sime Bedada | 5-15 |
A Proposed Model for Maximizing Broadband Penetration with Submarine Cable in Nigeria | |
Bourdillon Omijeh | 16-24 |
Adaptive Network Based Fuzzy Inference System and the Future of Employability | |
Saada Abdel Gawad Khadragy, Sherief Abdallah | 25-32 |
Intrusion Detection System in Cloud Computing: A Literature Review | |
Kezang Dema, Naghmeh Moradpoor, Thinley Jamtsho | 33-41 |
Paper submission email: NCS@iiste.org
ISSN (Paper)2224-610X ISSN (Online)2225-0603
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org