1.
Margaret Procter, “The Abstract†University of Toronto Coordinator, Writing Support, www.writing.utoronto.ca, Accessed on 5/4/2015
2.
UNC college of Arts and Science, “The writing centerâ€, http://cssac.unc.edu/ Accessed on 5/4/2015
3.
Emerald Group Publishing, “How to write an abstract-some examples, http://www.emeraldgrouppublishing.com/authors/guides/write/abstracts.htm?part=2&view=print
4.
A. Anuba Merlyn and A. Anuja Merlyn, “Energy Efficient Routing (EER) for Reducing Congestion and Time Delay in Wireless Sensor Networkâ€, International Journal of Computer Networks and Applications, volume 1, Issue 1, pp. 1-10, November – December (2014).
5.
M. Milton Joe and Dr. B. Ramakrishnan, “A Survey of Various Security Issues in Online Social Networks, International Journal of Computer Networks and Applications, volume 1, Issue 1, pp. 11-14, November – December (2014).
6.
Tamer Hossam Eldin Helmy, Mohamed zaki Abd-ElMegied, Tarek S. Sobh, and Khaled Mahmoud Shafea Badran, “ Design of a Monitor for Detecting Money Laundering and Terrorist Financingâ€, International Journal of Computer Networks and Applications, volume 1, Issue 1, pp. 15-25, November – December (2014).
7.
Ganesh Potta and Santosh Naidu P, “An Empirical Model of Job Shop Scheduling With Related To Tiny Chemical Assembly Instructions Inside of Living Things and Gels Techniquesâ€, International Journal of Computer Networks and Applications, volume 1, Issue 1, pp. 26-32, November – December (2014).
8.
Ravi Shankar P and Santosh Naidu P, “A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysisâ€, International Journal of Computer Networks and Applications, volume 1, Issue 1, pp. 33-3, November – December (2014).
9.
J.Stanley Jesudoss and S.Selva Kumar, “Automatic Feedback Framework for Deriving Educational Ontologiesâ€, International Journal of Computer Networks and Applications, volume 1, Issue 1, pp. 40-47, November – December (2014).
10.
Sandhya Rani G and Santosh Naidu P “Mitigation of Energy Depletion in Wireless Ad-hoc Sensor Networks through Path Optimizationâ€, International Journal of Computer Networks and Applications, volume 2, Issue 1, pp. 1-11, January – February (2015).
11.
Feyza Altunbey and Bilal Alatas “Overlapping Community Detection in Social Networks Using Parliamentary Optimization Algorithmâ€, International Journal of Computer Networks and Applications, volume 2, Issue 1, pp. 12-19, January – February (2015).
12.
C. Namesh and Dr.B. Ramakrishnan “Analysis of VBF protocol in Underwater Sensor Network for Static and Moving Nodesâ€, International Journal of Computer Networks and Applications, volume 2, Issue 1, pp. 20-26, January – February (2015).
13.
Cheah Wai Zhao, Jayanand Jegatheesan, and Son Chee Loon “Exploring IOT Application Using Raspberry Piâ€, International Journal of Computer Networks and Applications, volume 2, Issue 1, pp. 27-34, January – February (2015).
14.
Heng-Te Chu, Lili Hsieh, and Wen-Shiung Chen, “A Novel Design of Instant Messaging Service Extended from Short Message Service with XMPPâ€, International Journal of Computer Networks and Applications, volume 2, Issue 1, pp. 35-40, January – February (2015).
15.
G.Rohini and Dr. A.Srinivasan, “Dynamic Transition of Bandwidth and Power Saving Mechanism to Support Multimedia Streaming Using H.264/SVC over the Wireless Networksâ€, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 57-63, March – April (2015).
16.
Aarti Singh and Manisha Malhotra “Security Concerns at Various Levels of Cloud Computing Paradigm: A Reviewâ€, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 41-45, March – April (2015).
17.
N. Arulkumar and Dr. E. George Dharma Prakash Raj, “A Study on Topology based Vehicular Ad hoc Network Routing Protocolsâ€, International Journal of Computer Networks and Applications, volume 2, Issue 2, March – April (2015).
18.
Reham M. Abobeah, Dr. Mohamed M. Ezz, and Prof. Hany M. Harb, “Public-Key Cryptography Techniques Evaluationâ€, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 64-75, March – April (2015).
19.
Emad Abu-Shanab and Eman Haddad, “The Influence of Smart Phones on Human Health and Behavior: Jordanians’ Perceptionsâ€, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 52-56, March – April (2015).
20.
Prachi, “A Probabilistic Key Management Protocol based on Kryptograph for WSNâ€, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 76-83, March – April (2015).
21.
A. Meiappane, Dr. V. Prasanna Venkataesan, and V. Premanand, “Security Enhancement in Shoulder Surfing Attacks using Passpoints for Random Similar Images (PRSIm)â€, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 84-91, March – April (2015).
22.
Munna Kumar, Bimal Kumar Mishra, and T. C. Panda, “Effect of Quarantine & Vaccination on Infectious Nodes in Computer Networkâ€, International Journal of Computer Networks and Applications, volume 2, Issue 2, pp. 92-98, March – April (2015).