S.No. |
Title of Paper |
Page No. |
1. |
Confidentiality Evaluation schemes of Data on Cloud in Service Oriented Architecture
Authors: Shashi, Dr. Anuranjan Mishra |
1-4 |
2. |
Various Techniques for Spam Filtering Using Machine Learning Algorithms
Authors: Deepak Sharma, Rajendra Kachhwaha, Manju Vyas |
5-8 |
3. |
Analysis and Performance Overview of RSA Algorithm
Authors: Dr. Himanshu Arora, Gaurav Kumar Soni, Deepti Arora |
9-12 |
4. |
Ethical Hacking: A Technique To Enhance Information Security
Authors: Harshit Janjani, Pallavi Gupta, Pradeep Jha, Himanshu Arora |
13-17 |
5. |
Development of the Framework for the Solution of the Security Problems in Data Transmission Involving Advanced Asymmetric Algorithm
Authors: Dr. Himanshu Arora, Shilpi Mishra, Manish Dubey |
18-20 |
6. |
An Empirical Review of Data Mining Applications
Authors: Vani V G , Dr Thippeswamy K |
21-29 |
7. |
Discrepancy Removal From Specific Imaging Modalities Using Image Processing Features in MATLAB R2013a.
Authors: Rajal Bansal, Vanshika Gupta |
28-32 |
8. |
Inliers Detection and Recovered Missing value in Data Mining
Authors: Darshanaben Dipakkumar Pandya, Dr.Sanjay Gaur |
33-38 |
9. |
Identifying Candidate Symmetric and Candidate Transitive Binary Relations
Authors: Khalid Al-Barrak, Dr. Mohammed Alawairdhi, Dr. Kailash Kumar |
39-42 |
10. |
IoT Security: A Challenge in Wireless Technology
Authors: Mamata Rath, Jhum Swain |
43-46 |
11. |
New Approach of Software Development Life Cycle to improve Software Quality Management
Authors: Kunal Gupta, Naresh Lodha, Radha Krishna Rambola |
47-50 |
12. |
Blowfish Encryption Algorithm for IoT Security: A study and Analysis
Authors: Aastha Sharma, Nitin Kumar, Saurabh Allawadhi |
51-54 |
13. |
Sentiment Analysis in Social Media using Data Mining Techniques
Authors: Nitin, Saurabh Allawadhi, Aastha Sharma |
55-57 |
14. |
Design Pattern and Antipatterns in Cloud Computing
Authors: Shivani Saluja, Dr.Usha Batra |
58-62 |
15. |
Trustworthiness of Social Interactive Sites News Real or Fake
Authors: Pragya Rawat, Dr C P Gupta |
63-66 |
16. |
E-Commerce- Consumer’s Perspective on Privacy, Trust and Security
Authors: Dr. Syed Akmal |
67-71 |
17. |
Study of HALLUCINATIONS using (Medical Image
Processing)
Authors: Aditi Tripathi, Riya Arora |
72-78 |
18. |
Quantum Networks: Possibilities of Hacking in an Unhackable
Network
Authors: Shipra Sarkar, Dr.Shaligram Prajapat |
79-84 |
19. |
A Survey of Email Sevice - Attack , Security Method and Protocols
Authors: Sanjukta Mohanta, Shriti Banerjee, Shivani Awasthi, Shivani Awasthi |
85-90 |
20. |
Intrusion Detection on Cyber Security Policy Issues and Challenges in India for Mobile Ad-Hoc Networks
Authors: Chilakalapudi Meher Babu, Dr.Ashish B.Sasankar, Nuthakki Praveena |
91-95 |
21. |
Culturally based User Resistance to New Technologies in the Age of IoT in Developing Countries: Perspectives from Ethiopia
Authors: Joseph Kofi Wireko, Kamal Kant Hiran, Ruchi Doshi |
96-105 |
22. |
Scheduling Techniques On Real Time
Authors: Utsav Sinha, Deepak Swami, Shaina Arora, Naveen Tiwari |
106-111 |
23. |
Encryption Safe Guarded RDH for Secret Communication
Authors: Shweta Joshi, Dr. Rekha Mehra |
112-116 |