IITM Journal of Management and IT
Listed in:
Google Scholar, EBSCO Discovery, indianjournals.com & CNKI Scholar
(China National Knowledge Infrastructure Scholar)
ISSN(PRINT):0976-8629
ISSN(ONLINE):2349-9826
www.iitmipujournal.org
Published Issues
Submission
Please sent your full manuscript to [email protected]
Author Guidelines

Volume 5 issue 1 January- June 2014

Research Paper & Articles


Study on Cross Site Scripting Attack 1
Jasvinder Singh
Comparative Analysis of Anomaly Detection Approaches for IDS 16
Ruby Dahiya
Lightweight Cyber Security in Pervasive Computing Environment26
Shukun Tokas and Vanita Kareer
Analysis of Cyber Criminology and Intruder: An Attempt to Explore Cyber Menace 30
Kanika Jethwani and Supriya Jolly
A Statistical Dimensional Reduction Approach for Face Recognition35
Suman Misra, Deepak Gaur and Yaduvir Singh
Internet Based User Profiling is a Threat to Privacy: Proactive Safe User Profiling Mechanism 42
Monika Pathak and Sukhdev Singh
Analysis of SQL Injection Attack48
Jasvinder Singh
Panoramic View of Cyber Ethics57
Rama Srivastava
Study on Agents Based Meta-Heuristic Approach for Cyber Security Defense Mechanism 63
Suruchi Sinha and Shukun Tokas
Access Control in Multi Tenant and Diverse Cloud Computing Environment67
Anjali Chhabra, Vanita Kareer and D. Santha Devi
Review on Cryptographic Measures for Information Security in Cloud72
D. Santha Devi , Anjali Chhabra and Suruchi Sinha
A Study of Security Threats and Issues in Cloud Computing 78
Nidhi Grover
Issues and Challenges in Securing the Cloud Environment: A Literature Review87
Surbhi Gaur and Savleen Kaur
Study of Securing in Cloud, Virtual and Big Data Infrastructure 98
Harsh Arora
A Study on Data Mining and Knowledge Discovery in Cyber Security 105
Ashish Kumar Nayyar
A Study of Cyber Security in Web Environment114
Leena Chopra and Tripti Lamba


copyright @ www.iitmjanakpuri.com