CONTENTS

 

 

Challenges to Security and Reliability in Cloud Computing

 

Authors: Sumati Manchanda, Varsha Parashar, Vasundhara Bhatia and Neha Prabhakar

 

A Survey of Botclouds: Botnet Detection using MapReduce and Big Data Analytics

 

Authors: Sushil Buriya, D.S. Bhilare and Arun Singh

 

OpenFlow Software Defined Networking Controllers: A Comparative Study

 

Authors: Avantika Kondel and Anita Ganpati

 

A Survey of Big Data Analytics for Network Traffic Monitoring to Identify Cyber Attacks

 

Authors: Amreesh Kumar Patel and D.S. Bhilare

 

Creation of Ontology in Higher Education

 

Authors: Annu Yadav and Vikas Yadav

 

Analysis and Development of Information Hiding Techniques using Steganography and Cryptography

 

Authors: Saeed Anwar Jamal Ansari and Ms. Manisha Dawra

 

Cloud Computing in Nutshell

 

Authors: Shivani Jain, Himanshi Chaudhary and Neha Shankar Das

 

Ethics in Information Technology and Law– A Mismatch

 

Authors: Urvashi Sharma and Subhash Sharma

 

SURVEY ON LOAD BALANCING PROTOCOLS USED IN MANET’S (MOBILE AD-HOC NETWORK)

 

Authors: Azra Iftekhar and Ravi Prakash Singh

 

Cryptography Algorithm for Improving Data Security

 

Authors: T. Aravindhan

 

Proposed Model for Network Security Issues using ECC Based Threshold Cryptography

 

Authors: Garima Kaushik, Amit Kathuria and Samruddha Patil

 

Aspects of Effective Software Metrics

 

Authors: Gaurangi Saxena, Asmita Gupta and K. Chandrasekaran

 

A Survey of Wormhole Attack Detection in MANET

 

Authors: Isha Harode and Preeti Saxena

 

Survey of XML to Relational Database Mapping Techniques

 

Authors: Maya Mourya and Preeti Saxena

 

MANET: Mobile Ad-hoc Network its Characteristics, Challenges, Application and Security Attacks

 

Authors: Neha Yadav and Divya Sharma

 

New Improved Multimodal Biometric Recognition System: Taking Retinal’s Optic Disc and Ear as Biometric Trait

 

Authors: Shashank Shekher Tiwari, Rajnish Pandey and Praveen Mishra

 

Word Prediction Systems: A Survey

 

Authors: Riya Makkar, Manjinder Kaur and Dharam Veer Sharma

 

eed of Introducing Adaptivity to MAC Protocols According to the Traffic Type in Wireless Sensor Networks

 

Authors: Ruchi Srivastav