IITM Journal of Management and IT
Listed in:
Google Scholar, EBSCO Discovery, indianjournals.com & CNKI Scholar
(China National Knowledge Infrastructure Scholar)
ISSN(PRINT):0976-8629
ISSN(ONLINE):2349-9826
www.iitmipujournal.org
Published Issues
Submission
Please sent your full manuscript to [email protected]
Author Guidelines

Volume 8 issue 1 January - June 2017

Research Paper & Articles


Intelligent Cyber Security Solutions through High Performance Computing and Data Sciences: An Integrated Approach 1
Sandhya Maitra, Dr. Sushila Madan
Applications of Machine Learning and Data Mining for Cyber Security 8
Ruby Dahiya, Anamika
Fingerprint Image Enhancement Using Different Enhancement Techniques 17
Upender Kumar Agrawal, PragatiPatharia, Swati Kumari, Mini Priya
Data Mining in Credit Card Frauds: An Overview 21
Vidhi Khurana, Ramandeep Kaur
Review of Text Mining Techniques 25
Priya Bhardwaj, Priyanka Khosla
Security Vulnerabilities of Websites and Challenges in Combating these Threats 32
Dhananjay, Priya Khandelwal, Kavita Srivastava
Security Analytics: Challenges and Future Directions 35
Ganga Sharma, Bhawana Tyagi
A Survey of Multicast Routing Protocols in MANET 42
Ganesh Kumar Wadhwani, Neeraj Mishra
Relevance of Cloud Computing in Academic Libraries 51
Dr. Prerna Mahajan, Dr. Dipti Gulati
A brief survey on metaheuritic based techniques for optimization problems 56
Kumar Dilip, Suruchi Kaushik
Cross-Language Information Retrieval on Indian Languages: A Review 63
Nitin Verma, Suket Arora, Preeti Verma
Enhancing the Efficiency of Web Data Mining using Cloud Computing 67
Tripti Lamba, Leena Chopra
Role of Cloud computing in the Era of cyber security 71
Shilpa Taneja, Vivek Vikram Singh, Dr. Jyoti Arora
Cryptography and its Desirable Properties in terms of different algorithm 75
Mukta Sharma, Dr. Jyoti Batra Arora
A Review: RSA and AES Algorithm 82
Ashutosh Gupta, Sheetal Kaushik
Evolution of new version of internet protocol (IPv6): Replacement of IPv4 86
Nargish Gupta, Sumit Gupta, Munna Pandey
Social Engineering – Threats & Prevention 91
Amanpreet Kaur Sara, Nidhi Srivastava


copyright @ www.iitmjanakpuri.com