Authors:
Sumati Manchanda, Varsha Parashar, Vasundhara Bhatia and Neha Prabhakar
A Survey of Botclouds: Botnet Detection using MapReduce and Big Data Analytics
Authors:
Sushil Buriya, D.S. Bhilare and Arun Singh
OpenFlow Software Defined Networking Controllers: A Comparative Study
Authors:
Avantika Kondel and Anita Ganpati
A Survey of Big Data Analytics for Network Traffic Monitoring to Identify Cyber Attacks
Authors:
Amreesh Kumar Patel and D.S. Bhilare
Creation of Ontology in Higher Education
Authors:
Annu Yadav and Vikas Yadav
Analysis and Development of Information Hiding Techniques using Steganography and Cryptography
Authors:
Saeed Anwar Jamal Ansari and Ms. Manisha Dawra
Cloud Computing in Nutshell
Authors:
Shivani Jain, Himanshi Chaudhary and Neha Shankar Das
Ethics in Information Technology and Law– A Mismatch
Authors:
Urvashi Sharma and Subhash Sharma
SURVEY ON LOAD BALANCING PROTOCOLS USED IN MANET’S (MOBILE AD-HOC NETWORK)
Authors:
Azra Iftekhar and Ravi Prakash Singh
Cryptography Algorithm for Improving Data Security
Authors:
T. Aravindhan
Proposed Model for Network Security Issues using ECC Based Threshold Cryptography
Authors:
Garima Kaushik, Amit Kathuria and Samruddha Patil
Aspects of Effective Software Metrics
Authors:
Gaurangi Saxena, Asmita Gupta and K. Chandrasekaran
A Survey of Wormhole Attack Detection in MANET
Authors:
Isha Harode and Preeti Saxena
Survey of XML to Relational Database Mapping Techniques
Authors:
Maya Mourya and Preeti Saxena
MANET: Mobile Ad-hoc Network its Characteristics, Challenges, Application and Security Attacks
Authors:
Neha Yadav and Divya Sharma
New Improved Multimodal Biometric Recognition System: Taking Retinal’s Optic Disc and Ear as Biometric Trait
Authors:
Shashank Shekher Tiwari, Rajnish Pandey and Praveen Mishra
Word Prediction Systems: A Survey
Authors:
Riya Makkar, Manjinder Kaur and Dharam Veer Sharma
eed of Introducing Adaptivity to MAC Protocols According to the Traffic Type in Wireless Sensor Networks
Authors:
Ruchi Srivastav