IITM Journal of Management and IT
Listed in:
Google Scholar, EBSCO Discovery, indianjournals.com & CNKI Scholar
(China National Knowledge Infrastructure Scholar)
ISSN(PRINT):0976-8629
ISSN(ONLINE):2349-9826
www.iitmipujournal.org
Published Issues
Submission
Please sent your full manuscript to [email protected]
Author Guidelines

Volume 7 issue 1 January - June 2016

Research Paper & Articles


Security Enhancement in Wireless Menu Card with Network Attached Storage 1
Stuti Saxena, Nargish Gupta, Sumit Gupta
The Approach for the Prevention of Black Hole Attack in MANET using DSR Protocol and Ant Colony Optimization Technique: A Review 6
Hashneet Kaur, Hardeep Kaur
E-Commerce Frauds Using Parallel Imports 12
Kartik Durga, Prachi Aggarwal, Anil Kumar
Big Data and Cloud Security 16
Sakshi Dewangan, Rajesh Singh Negi
Cloud Computing: Security Issues and Challenges 26
Sheetal Mavi
An Effective Approach towards Encryption of Limited Data 30
Ruchi Kawatra, Sapna Arora Saini
Vulnerabilities of Data Storage Security in Big Data 37
Govind Murari Upadhyay, Harsh Arora
Cyber Security and Big Data Analytics 42
Priya Bhardwaj, Nidhi
Compartive Analysis of Visual Crptography Schemes 46
Pramod Kumar Soni, Madhu Chauhan
Securing Database using SQL Injection: A Review 52
Isha Shingari, Priti Sharma
Survey on Cloud Computing Security Issues 57
Amanpreet Kaur Sara
Survey Paper on Cyber Crime: A Threat to National Security 62
Priyanka Khosla, Praveer Dubey
Survey of Cyber Security in Smart Grid 66
Nidhi Srivastava, Vivek Vikram Singh
Cyber Crime – A Threat to Mankind 74
Charul Nigam, Vaishali Singhal
Enhancing ATM Security Using Fusion of Biometric Techniques 80
Sakshi Singh, Simranjeet Kaur
Comparative Analysis of IDS Approaches and their Techniques 83
Osheen, Manpreet Singh, Raj Kumar Singh
Big Data Security 89
Dr. Prerna Mahajan, Geetika Gaba, Nagendra Singh Chauhan
Biometrics: Human Body as a Password 95
Shriya Jain, Ruby Dhaiya, Ashi Chauhan
Artificial Intelligence Impact on Cyber Security 100
Eshita Madhok, Ashutosh Gupta, Nidhi Grover
A Comprehensive Study of Contemporary Tools and Techniques in the Realm of Cyber Security 108
Dhananjay, Aishwarya Raman, Sheetal Kaushik
Comparative Analysis of Intrusion Detection System Schemes for MANETs 121
Ruby Dahiya, Manpreet Singh, Mohit Jalan
Scientific Research and Development of Mobile Application for Android Platform 125
Dimple Chawla, Rahul Aggarwal, Akansha Aggarwal
Cyber Security: A Brief Encounter 132
Anil Kumar Pandey


copyright @ www.iitmjanakpuri.com