Document Selection Using Mapreduce [Pdf]
Yenumula B Reddy and Desmond Hill, Grambling State University, USA |
A New Framework for Securing Personal Data Using the Multi-Cloud [Pdf]
Hassan Saad Alqahtani1, Paul Sant1 and hita Kouadri-Mostefaoui2, 1University Campus Milton Keynes, UK and 2University College London, UK |
"Context, Content, Process" Approach to Align Information Security Investments with Overall Organizational Strategy [Pdf]
Pankaj Pandey, Gjovik University College, Norway |
A Novel DNA Encryption System Using Cellular Automata[Pdf]
G.Shanmugasundaram1, P.Thiyagarajan2 and S.Pavithra1, 1Sri Manakula Vinayagar Engineering College, India and 2Mahindra Ecole Centrale, College of Engineering, India |
Measuring Privacy in Online Social Networks[Pdf]
Swathi Ananthula, Omar Abuzaghleh, Navya Bharathi Alla, Swetha Prabha Chaganti, Pragna chowdary kaja and Deepthi Mogilineedi, University Of Bridgeport, USA |
Automated Verification Of Role-Based Access Control Policies Constraints Using Prover9 [Pdf]
Khair Eddin Sabri, The University of Jordan, Jordan |
A Novel Hash Based Least Significant Bit (2-3-3) Image Steganography In Spatial Domain [Pdf]
G.R.Manjula and Ajit Danti, JNN College of Engg, India |
SQLAS: Tool To Detect And Prevent Attacks In Php Web Applications [Pdf]
Vandana Dwivedi, Himanshu Yadav and Anurag Jain, RITS, Bhopal, India |
Intrusion Detection System – A Study [Pdf]
S.Vijayarani1 and Ms. Maria Sylviaa.S, Bharathiar University, India |
Environment Based Secure Transfer of Data In Wireless Sensor Networks [Pdf]
B. Vidhya, Mary Joseph, D. Rajini Girinath and A. Malathi, Anand Institute of Higher Technology, India |
|