Accredited Grade "A" By NAAC &
Approved By AICTE
IITM Journal of Management and IT
Listed in:
Google Scholar, EBSCO Discovery, indianjournals.com & CNKI Scholar
(China National Knowledge Infrastructure Scholar)
ISSN(PRINT):0976-8629
ISSN(ONLINE):2349-9826
www.iitmipujournal.org
HOME
ABOUT US
ARCHIVE
CALL FOR PAPER
EDITORIAL BOARD
REVIEW POLICY
PUBLICATION ETHICS
CONTACT US
Published Issues
Current Issue
Archive
Submission
Please sent your full manuscript to
[email protected]
Author Guidelines
Useful Documents
Paper Template
Copyright Form
Subscription-Form
Feedback Form
Volume 7 issue 1 January - June 2016
Research Paper & Articles
Security Enhancement in Wireless Menu Card with Network Attached Storage
1
Stuti Saxena, Nargish Gupta, Sumit Gupta
View/Download-PDF
The Approach for the Prevention of Black Hole Attack in MANET using DSR Protocol and Ant Colony Optimization Technique: A Review
6
Hashneet Kaur, Hardeep Kaur
View/Download-PDF
E-Commerce Frauds Using Parallel Imports
12
Kartik Durga, Prachi Aggarwal, Anil Kumar
View/Download-PDF
Big Data and Cloud Security
16
Sakshi Dewangan, Rajesh Singh Negi
View/Download-PDF
Cloud Computing: Security Issues and Challenges
26
Sheetal Mavi
View/Download-PDF
An Effective Approach towards Encryption of Limited Data
30
Ruchi Kawatra, Sapna Arora Saini
View/Download-PDF
Vulnerabilities of Data Storage Security in Big Data
37
Govind Murari Upadhyay, Harsh Arora
View/Download-PDF
Cyber Security and Big Data Analytics
42
Priya Bhardwaj, Nidhi
View/Download-PDF
Compartive Analysis of Visual Crptography Schemes
46
Pramod Kumar Soni, Madhu Chauhan
View/Download-PDF
Securing Database using SQL Injection: A Review
52
Isha Shingari, Priti Sharma
View/Download-PDF
Survey on Cloud Computing Security Issues
57
Amanpreet Kaur Sara
View/Download-PDF
Survey Paper on Cyber Crime: A Threat to National Security
62
Priyanka Khosla, Praveer Dubey
View/Download-PDF
Survey of Cyber Security in Smart Grid
66
Nidhi Srivastava, Vivek Vikram Singh
View/Download-PDF
Cyber Crime – A Threat to Mankind
74
Charul Nigam, Vaishali Singhal
View/Download-PDF
Enhancing ATM Security Using Fusion of Biometric Techniques
80
Sakshi Singh, Simranjeet Kaur
View/Download-PDF
Comparative Analysis of IDS Approaches and their Techniques
83
Osheen, Manpreet Singh, Raj Kumar Singh
View/Download-PDF
Big Data Security
89
Dr. Prerna Mahajan, Geetika Gaba, Nagendra Singh Chauhan
View/Download-PDF
Biometrics: Human Body as a Password
95
Shriya Jain, Ruby Dhaiya, Ashi Chauhan
View/Download-PDF
Artificial Intelligence Impact on Cyber Security
100
Eshita Madhok, Ashutosh Gupta, Nidhi Grover
View/Download-PDF
A Comprehensive Study of Contemporary Tools and Techniques in the Realm of Cyber Security
108
Dhananjay, Aishwarya Raman, Sheetal Kaushik
View/Download-PDF
Comparative Analysis of Intrusion Detection System Schemes for MANETs
121
Ruby Dahiya, Manpreet Singh, Mohit Jalan
View/Download-PDF
Scientific Research and Development of Mobile Application for Android Platform
125
Dimple Chawla, Rahul Aggarwal, Akansha Aggarwal
View/Download-PDF
Cyber Security: A Brief Encounter
132
Anil Kumar Pandey
View/Download-PDF
copyright @ www.iitmjanakpuri.com