(3.142.196.223)
Users online: 11477     
Ijournet
Email id
 

IITM Journal of management and IT
Year 2014, Volume-5, Issue-1 (January–June)
Print ISSN : 0976-8629
Online ISSN : 2349-9826

Table of contents

Research Paper & Articles

Study on Cross Site Scripting Attack
Jasvinder Singh

Comparative Analysis of Anomaly Detection Approaches for IDS
Ruby Dahiya

Lightweight Cyber Security in Pervasive Computing Environment
Shukun Tokas, Vanita Kareer

Analysis of Cyber Criminology and Intruder: An Attempt to Explore Cyber Menace
Kanika Jethwani, Supriya Jolly

A Statistical Dimensional Reduction Approach for Face Recognition
Suman Misra, Deepak Gaur, Yaduvir Singh

Internet Based User Profiling is a Threat to Privacy: Proactive Safe User Profiling Mechanism
Monika Pathak, Sukhdev Singh

Analysis of SQL Injection Attack
Jasvinder Singh

Panoramic View of Cyber Ethics
Rama Srivastava

Study on Agents Based Meta-Heuristic Approach for Cyber Security Defense Mechanism
Suruchi Sinha, Shukun Tokas

Access Control in Multi Tenant and Diverse Cloud Computing Environment
Anjali Chhabra, Vanita Kareer, D. Santhadevi

Review on Cryptographic Measures for Information Security in Cloud
D. Santhadevi, Anjali Chhabra, Suruchi Sinha

A Study of Security Threats and Issues in Cloud Computing
Nidhi Grover

Issues and Challenges in Securing the Cloud Environment: A Literature Review
Surbhi Gaur, Savleen Kaur

Study of Securing in Cloud, Virtual and Big Data Infrastructure
Harsh Arora

A Study on Data Mining and Knowledge Discovery in Cyber Security
Ashish Kumar Nayyar

A Study of Cyber Security in Web Environment
Leena Chopra, Tripti Lamba

Top

║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
750,485,263 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.