A Survey Of Intrusion Detection Mechanisms In Multitier Web Applications Journal title: International Journal of Research in Computer and Communication Technology Authors: Chinchu M.M, Deepthy Mathews Subject(s): Computer and Information Science, Telecommunications
Generalization Algorithm For Prevent Inference Attacks In Social Network Data Journal title: International Journal of Research in Computer and Communication Technology Authors: Chethana Nair, Neethu Krishna, Siby Abraham Subject(s): Computer and Information Science, Telecommunications
A Survey on Password Attack Resist Tools Journal title: International Journal of Research in Computer and Communication Technology Authors: Meenu Alex, Neena Alex Subject(s): Computer and Information Science, Telecommunications
An Approach to Identify Node Clones in Wireless Sensor Networks Journal title: International Journal of Research in Computer and Communication Technology Authors: M Gowthami, Jessy Nirmal.A.G, P.S.K Patra Subject(s): Computer and Information Science, Telecommunications
Detection and Prevention Of Cooperative Black Hole Attack in a MANET Journal title: International Journal of Research in Computer and Communication Technology Authors: P. S. Hiremath, Anuradha T. Subject(s): Computer and Information Science, Telecommunications
An Enhanced Digital Campus Security System Using RFID, GPS, GSM Journal title: International Journal of Research in Computer and Communication Technology Authors: A.Ashok Kumar, P.Swapna Subject(s): Computer and Information Science, Telecommunications
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor communication of Networks Journal title: International Journal of Research in Computer and Communication Technology Authors: Dantam.Ramesh, Dasari .Koteswara Rao Subject(s): Computer and Information Science, Telecommunications
Providing High Security for WSN’s Using Distributed Hash Table (DHT) Journal title: International Journal of Research in Computer and Communication Technology Authors: V Sarah Grace, Ramu Vikruthi Subject(s): Computer and Information Science, Telecommunications
Side-Channel Passive Attacks Implementation to Cryptographic Hardware Using FPGA Journal title: International Journal of Research in Computer and Communication Technology Authors: K.Durga Rajasekhar, O.Sudha Bharathi, K. Sirisha, R.Satish Kumar Subject(s): Computer and Information Science, Telecommunications
Detecting Network And Application Layer Attacks in Networks Journal title: International Journal of Research in Computer and Communication Technology Authors: N.V.V. Soujanya, G.Uma Mahesh Subject(s): Computer and Information Science, Telecommunications
Distributed Hash Table (DHT) Based Clone Detection In WSN’s Journal title: International Journal of Research in Computer and Communication Technology Authors: P.V. Siva Durga, U. Vinod Kumar Subject(s): Computer and Information Science, Telecommunications
Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE) Journal title: International Journal of Research in Computer and Communication Technology Authors: B Hemanth, U Vinod Kumar Subject(s): Computer and Information Science, Telecommunications
Cloud Computing Security With Two-Level Mechanism Journal title: International Journal of Research in Computer and Communication Technology Authors: H. V. Taiwade Subject(s): Computer and Information Science, Telecommunications
Secure Fog Computing: Providing Data Security Journal title: International Journal of Research in Computer and Communication Technology Authors: T.Rajesh Kanna, M. Nagaraju, Ch. Vijay Bhaskar Subject(s): Computer and Information Science, Telecommunications
Exemplary Instinctive Repression Of Worms Journal title: International Journal of Research in Computer and Communication Technology Authors: Manuri Parthasarathi, Jhansi Rani S Subject(s): Computer and Information Science, Telecommunications