Accredited Grade "A" By NAAC &
Approved By AICTE
IITM Journal of Management and IT
Listed in:
Google Scholar, EBSCO Discovery, indianjournals.com & CNKI Scholar
(China National Knowledge Infrastructure Scholar)
ISSN(PRINT):0976-8629
ISSN(ONLINE):2349-9826
www.iitmipujournal.org
HOME
ABOUT US
ARCHIVE
CALL FOR PAPER
EDITORIAL BOARD
REVIEW POLICY
PUBLICATION ETHICS
CONTACT US
Published Issues
Current Issue
Archive
Submission
Please sent your full manuscript to
[email protected]
Author Guidelines
Useful Documents
Paper Template
Copyright Form
Subscription-Form
Feedback Form
Volume 5 issue 1 January- June 2014
Research Paper & Articles
Study on Cross Site Scripting Attack
1
Jasvinder Singh
View/Download-PDF
Comparative Analysis of Anomaly Detection Approaches for IDS
16
Ruby Dahiya
View/Download-PDF
Lightweight Cyber Security in Pervasive Computing Environment
26
Shukun Tokas and Vanita Kareer
View/Download-PDF
Analysis of Cyber Criminology and Intruder: An Attempt to Explore Cyber Menace
30
Kanika Jethwani and Supriya Jolly
View/Download-PDF
A Statistical Dimensional Reduction Approach for Face Recognition
35
Suman Misra, Deepak Gaur and Yaduvir Singh
View/Download-PDF
Internet Based User Profiling is a Threat to Privacy: Proactive Safe User Profiling Mechanism
42
Monika Pathak and Sukhdev Singh
View/Download-PDF
Analysis of SQL Injection Attack
48
Jasvinder Singh
View/Download-PDF
Panoramic View of Cyber Ethics
57
Rama Srivastava
View/Download-PDF
Study on Agents Based Meta-Heuristic Approach for Cyber Security Defense Mechanism
63
Suruchi Sinha and Shukun Tokas
View/Download-PDF
Access Control in Multi Tenant and Diverse Cloud Computing Environment
67
Anjali Chhabra, Vanita Kareer and D. Santha Devi
View/Download-PDF
Review on Cryptographic Measures for Information Security in Cloud
72
D. Santha Devi , Anjali Chhabra and Suruchi Sinha
View/Download-PDF
A Study of Security Threats and Issues in Cloud Computing
78
Nidhi Grover
View/Download-PDF
Issues and Challenges in Securing the Cloud Environment: A Literature Review
87
Surbhi Gaur and Savleen Kaur
View/Download-PDF
Study of Securing in Cloud, Virtual and Big Data Infrastructure
98
Harsh Arora
View/Download-PDF
A Study on Data Mining and Knowledge Discovery in Cyber Security
105
Ashish Kumar Nayyar
View/Download-PDF
A Study of Cyber Security in Web Environment
114
Leena Chopra and Tripti Lamba
View/Download-PDF
copyright @ www.iitmjanakpuri.com