IEEE Current Titles-1
IEEE Current Titles-1
1. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc
Network.
2. Data Leakage Detection
3. Optimal Service Pricing For A Cloud Cache
4. Three Party Authentication Key Distributed Protocols Using Implicit and Explicit
Quantum Cryptography.
5. Data Integrity Proofs In Cloud Storage
6. NABS Novel Approaches for Biometric Systems
7. Online Modeling of Proactive Moderation System for Auction Fraud Detection
8. Quick Answering General Queries for Web search
9. The World in a Nutshell
10. Towards Secure and Dependable Storage
11. A New Cell Counting Based Attack Against Tor
12. Outsourced Similarity Search on Metric Data Assets
13. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks.
14. MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad
Hoc Networks
15. Integration of Sound Signature in Graphical Password Authentication System
16. One Size Does Not Fit All Towards User- And Query-Dependent Ranking For Web
Databases
17. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient
Social Video Sharing in the Clouds
18. A System to Filter Unwanted Messages from OSN User Walls
19. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
20. Robust Face-Name Graph Matching for Movie Character Identification
21. Robust Watermarking of Compressed and Encrypted JPEG2000 Images.
22. A Keyless Approach to Image Encryption
23. Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
24. Participatory Privacy Enabling Privacy in Participatory Sensing
SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688
45. a Secure Anti Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
46. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
(asp, J2ee)
47. Tag Based Image Search by Social Reranking (asp, J2ee)
SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688
48. Understanding Short Texts through Semantic Enrichment and Hashing (Java)
49. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted
Cloud Data (Asp, Java)
50. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
51. User Vitality Ranking and Prediction in Social Networking
52. SociRank: Identifying and Ranking Prevalent News Topics Using Social Media
Factors
53. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
54. TAFC Time and Attribute Factors Combined Access Control
55. Two-Stage Friend Recommendation Based on Network Alignment
56. NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social
Media
57. CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
58. Rich Short Text Conversation Using Semantic Key Controlled Sequence Generation
59. A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational
Intelligence in Fog Computing
60. Efficient Traceable Authorization Search System for Secure Cloud Storage
61. Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-
Commerce Websites
62. Detection of suicide-related posts in Twitter data streams
63. Scalable Content-Aware Collaborative Filtering for Location Recommendation
64. Credit card fraud detection using AdaBoost and majority voting
65. Analyzing and Detecting Money-Laundering Accounts in Online Social networks
66. Visual Secret Sharing Schemes Encrypting Multiple Images
67. Using Data Mining to Predict Hospital Admissions from the Emergency Department
68. Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter
69. Lightwight Fine-Grained Search over Encrypted Data in Fog Computing
70. Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage
71. Intelligent Electronic Voting System Using Blockchain Technology
SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688
Java (IEEE)
1. Cloud Computing Security From Single to Multi-Clouds
2. Cloud computing for mobile users can offloading compution save energy
3. Ensuring Distributed Accountability for Data Sharing in the Cloud
4. Cooperative Provable Data Possession
5. Organizing User Search Histories
6. Packet-Hiding Methods for Preventing Selective Jamming Attacks
7. Ranking Model Adaptation for Domain-Specific Search
8. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient
Social Video Sharing in the Clouds
9. A System to Filter Unwanted Messages from OSN User Walls
10. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-
hoc Network.
11. Integration of Sound Signature in Graphical Password Authentication System.
12. Ensuring Data Storage Security in Cloud Computing
13. Ajax Browser
14. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P
System
15. Handling Multiple Failures In IP Networks Through Localized On Demand Link
State Routing
16. Independent Directed Acyclic Graphs For Resillient Multipath Routing
17. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
18. Vampire attacks Draining life from wireless ad-hoc sensor networks
19. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI
Problems
20. A Hybrid Cloud Approach for Secure Authorized Deduplication
21. Supporting Privacy Protection in Personalized Web Search
22. Secure Outsourced Attribute-Based Signatures
23. Privacy Preserving Data Sharing With Anonymous ID Assignment
24. Dealing with Concept Drifts in Process Mining
25. A Fast Re-Route Method
SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688
Php (IEEE)
6. In Tags We Trust.
Problems
13. Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
15. Mining Weakly Labeled Web Facial Images for Search Based Face Annotation
20. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688
21. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under
Multiple Keys
24. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
26. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking
in Public Cloud
Cloud Email
28. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
32. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
Incidents
SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688
38. Prediction of Effective Rainfall and Crop Water Needs using Data Mining
Techniques
Environment (PHP)
(PHP)