IITM Journal of management and IT
Year 2014, Volume-5, Issue-1 (January–June)
Print ISSN : 0976-8629
Online ISSN : 2349-9826 Table of contents Research Paper & Articles Study on Cross Site Scripting Attack Jasvinder Singh Comparative Analysis of Anomaly Detection Approaches for IDS Ruby Dahiya Lightweight Cyber Security in Pervasive Computing Environment Shukun Tokas, Vanita Kareer Analysis of Cyber Criminology and Intruder: An Attempt to Explore Cyber Menace Kanika Jethwani, Supriya Jolly A Statistical Dimensional Reduction Approach for Face Recognition Suman Misra, Deepak Gaur, Yaduvir Singh Internet Based User Profiling is a Threat to Privacy: Proactive Safe User Profiling Mechanism Monika Pathak, Sukhdev Singh Analysis of SQL Injection Attack Jasvinder Singh Panoramic View of Cyber Ethics Rama Srivastava Study on Agents Based Meta-Heuristic Approach for Cyber Security Defense Mechanism Suruchi Sinha, Shukun Tokas Access Control in Multi Tenant and Diverse Cloud Computing Environment Anjali Chhabra, Vanita Kareer, D. Santhadevi Review on Cryptographic Measures for Information Security in Cloud D. Santhadevi, Anjali Chhabra, Suruchi Sinha A Study of Security Threats and Issues in Cloud Computing Nidhi Grover Issues and Challenges in Securing the Cloud Environment: A Literature Review Surbhi Gaur, Savleen Kaur Study of Securing in Cloud, Virtual and Big Data Infrastructure Harsh Arora A Study on Data Mining and Knowledge Discovery in Cyber Security Ashish Kumar Nayyar A Study of Cyber Security in Web Environment Leena Chopra, Tripti Lamba Top |