Title and Author | Area |
---|---|
Financial Malware Analysis - Secrets of ZeuS
- Rushita Dave |
Digital Forensic |
Comparative Analysis of Routing Protocols in Mobile Ad-hoc Networks
- Jay Kumar Tiwari |
Information Technology |
File Carving From PCAP
- Nikunj Chavda |
Network Forensics |
Enhanced SecurityIn Multicloud Using Visual Cryptography And Secret Sharing
- Navya Atmakuri |
Cloud Security |
Instant Notification From Patient To Doctor Using Xmpp Protocol
- Mayur Bharti |
Health Monitoraing Area |
Image Quality Assessment for Fake Biometric Detection: Application To Face and Fingerprint Recognition
- Prof.R.A.Jamadar |
Information Technology |
Integrated Development Environment for Human Machine Interface
- Heera Dhebe |
Information Technology |
Data Analysis of Phone Calls in Cloud Computing
- Priyanka Khatal |
Cloud Computing |
Customer’s Order Management Application in Restaurants using Salesforce1 Platform
- Priyanka Shinde |
Information Technology |