Accredited Grade "A" By NAAC &
Approved By AICTE
IITM Journal of Management and IT
Listed in:
Google Scholar, EBSCO Discovery, indianjournals.com & CNKI Scholar
(China National Knowledge Infrastructure Scholar)
ISSN(PRINT):0976-8629
ISSN(ONLINE):2349-9826
www.iitmipujournal.org
HOME
ABOUT US
ARCHIVE
CALL FOR PAPER
EDITORIAL BOARD
REVIEW POLICY
PUBLICATION ETHICS
CONTACT US
Published Issues
Current Issue
Archive
Submission
Please sent your full manuscript to
[email protected]
Author Guidelines
Useful Documents
Paper Template
Copyright Form
Subscription-Form
Feedback Form
Volume 8 issue 1 January - June 2017
Research Paper & Articles
Intelligent Cyber Security Solutions through High Performance Computing and Data Sciences: An Integrated Approach
1
Sandhya Maitra, Dr. Sushila Madan
View/Download-PDF
Applications of Machine Learning and Data Mining for Cyber Security
8
Ruby Dahiya, Anamika
View/Download-PDF
Fingerprint Image Enhancement Using Different Enhancement Techniques
17
Upender Kumar Agrawal, PragatiPatharia, Swati Kumari, Mini Priya
View/Download-PDF
Data Mining in Credit Card Frauds: An Overview
21
Vidhi Khurana, Ramandeep Kaur
View/Download-PDF
Review of Text Mining Techniques
25
Priya Bhardwaj, Priyanka Khosla
View/Download-PDF
Security Vulnerabilities of Websites and Challenges in Combating these Threats
32
Dhananjay, Priya Khandelwal, Kavita Srivastava
View/Download-PDF
Security Analytics: Challenges and Future Directions
35
Ganga Sharma, Bhawana Tyagi
View/Download-PDF
A Survey of Multicast Routing Protocols in MANET
42
Ganesh Kumar Wadhwani, Neeraj Mishra
View/Download-PDF
Relevance of Cloud Computing in Academic Libraries
51
Dr. Prerna Mahajan, Dr. Dipti Gulati
View/Download-PDF
A brief survey on metaheuritic based techniques for optimization problems
56
Kumar Dilip, Suruchi Kaushik
View/Download-PDF
Cross-Language Information Retrieval on Indian Languages: A Review
63
Nitin Verma, Suket Arora, Preeti Verma
View/Download-PDF
Enhancing the Efficiency of Web Data Mining using Cloud Computing
67
Tripti Lamba, Leena Chopra
View/Download-PDF
Role of Cloud computing in the Era of cyber security
71
Shilpa Taneja, Vivek Vikram Singh, Dr. Jyoti Arora
View/Download-PDF
Cryptography and its Desirable Properties in terms of different algorithm
75
Mukta Sharma, Dr. Jyoti Batra Arora
View/Download-PDF
A Review: RSA and AES Algorithm
82
Ashutosh Gupta, Sheetal Kaushik
View/Download-PDF
Evolution of new version of internet protocol (IPv6): Replacement of IPv4
86
Nargish Gupta, Sumit Gupta, Munna Pandey
View/Download-PDF
Social Engineering – Threats & Prevention
91
Amanpreet Kaur Sara, Nidhi Srivastava
View/Download-PDF
copyright @ www.iitmjanakpuri.com