Revise Search
Issue | Title | |
Vol 1, No 5 (2013): August -September | DATA OUTSOURCING BASED SIMILARITY FUSION | Abstract PDF |
S. Pradeep Kumar Reddy, M. Raghavendra Rao | ||
Proceedings of Cloud based International Workshop 25th July, 2020 Organized by sbytetechnologies.com | Reference Based Study On Impact Of Covid-19 On Sustainable Computing | Abstract PDF |
SHUBHAM JOSHI | ||
Vol 2, No 1 (2014): December - January 2014 | INTEGRATION OF AUDIO IN IMAGE PASSWORD PROTECTION SYSTEM | Abstract PDF |
Sangeetha Govindan, J.R. Thresphine | ||
Proceedings of International Web Conference “Cyber Security” 30th November 2022, Organized by Sbyte Technologies | A Literature based study on Cyber Security and Climate Changes | Abstract PDF |
ROSHINI SOWRIRAJAN, BADRI NARAYANAN | ||
Vol 1, No 4 (2013): JUNE - JULY | AN INNOVATIVE ANGLE IN THE APPLICATION OF CRYPTOGRAPHY TO NETWORK SECURITY | Abstract PDF |
H. Mohammed Khan, Dr.J.George Chellin Chandran, C.Sahaya Kingsly | ||
Vol 4, No 5 (2016): August - September 2016 | AN AUTOMATED SOLUTION FOR AVOIDING ENVIRONMENTAL POLLUTION ON ROADS | Abstract PDF |
Teepireddy Yellareddy, M. Govind Raj, P. Suresh Kumar | ||
Vol 5, No 3 (2017): April - May 2017 | A SECURE MULTI-VARIATE ROUTING FRAMEWORK FOR WIRELESS SENSOR NETWORK | Abstract PDF |
G.Venkata. Monika Miss., P. Sunitha, B. Swathi | ||
Vol 5, No 3 (2017): April - May 2017 | RECOGNITION AND RECTIFICATION OF WEB APPLICATION OBLIGATION WITH FIXED ANALYSIS AND TEXT MINING | Abstract PDF |
Medisetti Vidyabharathi, T.Geetha Lakshmi | ||
Proceedings of Cloud based International Conference Organized by Sybe Technologies on 5th June 2020 | Literature Based Study On Cloud Computing For Health And Sustainability In View Of Covid19 | Abstract PDF |
PRAMOD KUMAR | ||
Vol 4, No 5 (2016): August - September 2016 | INVENTING AN EFFECTIVE WAY OF DISSOLUTE THE MIDST OF THE SPOOFERS LOCATIONS | Abstract PDF |
D. Rajani Bai, C. Nagesh | ||
Vol 5, No 3 (2017): April - May 2017 | ADVANCES OF MODERN SECURE COMMUNICATION TECHNIQUE AND ITS OPTIMIZATION IN WIRELESS SENSOR NETWORK | Abstract PDF |
K Jayavenkataram, Ms. M. Padmaja | ||
2016: Special Issue -2016 | SURVEY OF ANDROID MOBILE BASED HOME AUTOMATION USING BLUETOOTH TECHNOLOGY ENABLED REMOTE CONTROL | Abstract PDF |
Takkallapally Ashwini, Gajje Tejashwini, Bashaboina Prashanth, A Dinesh Kumar, G. Purnchandar Rao | ||
Proceedings of International Web Conference “Cyber Security” 30th November 2022, Organized by Sbyte Technologies | Some Cyber Security Topics: Review Study | Abstract PDF |
PRAMOD KUMAR | ||
Vol 4, No 6 (2016): October - November 2016 | AN EXPLOSIVE EXPANSION TOWARDS MUTUAL DATA UTILIZING ROUTINE USING DATA ASSEMBLY | Abstract PDF |
Rajesh Kumar Bhavani, P Ravindra Kumar | ||
Vol 6, No 3 (2018): April - May 2018 | A REVIEW ON SHARED MUTUAL AND INDEPENDENT APPROACH TO CONVERT CLOUD DATA | Abstract PDF |
B. Swathi, P. Bikshapathy | ||
Vol 4, No 5 (2016): August - September 2016 | ELEVATING THE PROBLEMS OF LINEAR SEARCHABLE CIPHERTEXT ON LARGE-SCALE DATABASE | Abstract PDF |
Mukta Varsha, K. Ramana Reddy | ||
Vol 5, No 3 (2017): April - May 2017 | A MEASUREMENTS INSERTION WITH LARGE DATA | Abstract PDF |
Puli Madhavi, M.V.Pavan Kumar, Dr. S. Gopi Krishna | ||
Vol 3, No 6 (2015): October - November 2015 | SECURING CLOUD COMPUTING SERVICES USING STRONG USER AUTHENTICATION WITH LOCAL CERTIFICATION AUTHORITY | Abstract PDF |
My Abdelkader Youssefi | ||
Proceedings of International Web Conference “Cyber Security” 30th November 2022, Organized by Sbyte Technologies | Cybercrime Related Topics : Review Study | Abstract PDF |
S. SAISARAN | ||
Vol 4, No 6 (2016): October - November 2016 | INACTIVE IP DROP BACK: RELEASING THE SETTINGS OF IP SPOOFERS OF APOSTASY PATH | Abstract PDF |
B.Suvarna Lakshmi, N Venkatadri | ||
Vol 1, No 6 (2013): October-November | WORKFLOW SIGNATURES FOR SECURE E-BUSINESS PROCESS | Abstract PDF |
Kirankumar Pulivarthi, A.Sudarsan Reddy | ||
Vol 5, No 6 (2017): October - November 2017 | IDENTIFICATION OF FACE AND SPOOFING FOR IMPAIRED PEOPLE IN THE VISUALIZATION | Abstract PDF |
P Padma, R Shivaji | ||
Vol 4, No 4 (2016): June - July 2016 | SCHEMATIC IMPLEMENTATION OF HIGH DATA TRUSTWORTHINESS IN DECISIONS IN UNWIRED BEAM NETS | Abstract PDF |
Tanniru Anusha, Dr R China Appala Naidu | ||
Vol 5, No 3 (2017): April - May 2017 | A NON-ISOLATION ARRANGEMENT OF DATA FOR DIGGING | Abstract PDF |
G.D. Marykeerthana, K. Narsimhulu | ||
Vol 3, No 4 (2015): June - July 2015 | IMPLEMENTATION OF SOCIAL COMMUNITY CLOUD VIA SOCIAL NETWORKS | Abstract PDF |
S. Vishnu Vardhan, Thota Neha | ||
Vol 4, No 6 (2016): October - November 2016 | MALICIOUS ADVERSARY DECISION MAKING FOR COMPLEX INFRASTRUCTURES | Abstract PDF |
Jabilli Sowjanya, P. Pandarinath | ||
Vol 5, No 5 (2017): August - September 2017 | A SERVICE PROTOTYPE TO VALIDATE RESULT REVELATION OF OUTSOURCED REGULAR ITEMSET PROSPECTED | Abstract PDF |
Fouzia Sultana, Humera Shahab | ||
Vol 4, No 4 (2016): June - July 2016 | SECURE AND PRIVACY PRESERVING SMARTPHONE BASED TRAFFIC INFORMATION SYSTEM | Abstract PDF |
Kalluri Anil Kumar, K. Divya | ||
Vol 5, No 3 (2017): April - May 2017 | A TRIVIAL PROTECTED PLAN FOR DETECT ATTRIBUTION FAKE AND CONTAINER PLUNGE ATTACKS IN WIRELESS SENSOR NETWORKS | Abstract PDF |
Mummadi Sarada | ||
Vol 3, No 3 (2015): April - May 2015 | INTRUSION TOLERANCE IN HETEROGENEOUS WIRELESS SENSOR NETWORKS USING VOTING BASED ALGORITHM WITH DYNAMIC REDUNDANCY MANAGEMENT OF MULTIPATH ROUTING | Abstract PDF |
Choudhari Raghuraj, Prof.Chandrasekhar S | ||
Vol 10, No 5 (2022): August - September 2022 | Literature based Cyber Security Topics: Handbook | Abstract PDF |
Dr SRIDHAR SESHADRI | ||
Vol 4, No 5 (2016): August - September 2016 | INVENTING MISCHIEVOUS INTRUSIONS IN SOCIAL MEDIA NETS | Abstract PDF |
Harsha Raj, B.M.G. Prasad | ||
Vol 5, No 5 (2017): August - September 2017 | ACTIVE DISSECTION BASED ON PUBLIC ASSESSMENT FOR PROTECTED CLOUD STORAGE | Abstract PDF |
B. Sowjanya, Dr. M. Laxmaiah | ||
Vol 4, No 4 (2016): June - July 2016 | A ROBUST PRIMITIVE FOR AVOIDING DATA ATTACKS USING CRYPTOGRAPHY | Abstract PDF |
Nagaram Pradeep Kumar Goud, P. Ramesh Reddy | ||
Vol 5, No 2 (2017): February - March 2017 | MEASURED SECURITY FEATURES IMPLEMENTATION IN CLOUD ENVIRONMENT | Abstract PDF |
Chandhini K | ||
Vol 2, No 6 (2014): October - November 2014 | AN EFFECTIVE CACHING SCHEME FOR AMES | Abstract |
Eesub Mohammad, Dr.Y. Venkateswarlu | ||
Vol 10, No 5 (2022): August - September 2022 | Cloud Security Measures Using Machine Learning | Abstract PDF |
ADABALA P V D L KUMAR, CHILLA SANTHI | ||
Vol 4, No 5 (2016): August - September 2016 | DATA ACQUISITION SYSTEM USING IN MOBILE APPLICATION | Abstract PDF |
N. Sai Bhavani, S. Mahesh Reddy, P. Suresh Kumar | ||
Vol 5, No 4 (2017): June - July 2017 | A DISCOVERY OF DESPITEFUL FB APPS | Abstract PDF |
Pathakamuri Nagaveni, Venkata Ramaiah Kavuri | ||
Vol 4, No 4 (2016): June - July 2016 | A SECURE FRAMEWORK TO BUILD FREQUENT AUTHENTICATION CHECKING SYSTEM FOR LONGER SESSIONS | Abstract PDF |
Siramdas Narmada Devi, E. Ravi | ||
Vol 4, No 6 (2016): October - November 2016 | A VERSATILE ALARMING METHOD TO GET INSTANT HELP DURING EMERGENCY | Abstract PDF |
Rosy Gehlaut, G.S.S. Prasad | ||
Vol 2, No 6 (2014): October - November 2014 | FINDING FRAUD DETECTION IN ATM CARD TRANSACTION WITH THE HELP OF HIDDEN MARKOV MODEL | Abstract PDF |
Dhamalenamrata ., Holsayali ., Rajemansi ., Lambepragati ., Prof. Gajanandeokate | ||
Vol 9, No 6 (2021): October - November 2021 | Secure Access control Technology towards Data Sharing and Storage in Cloud Computing | Abstract PDF |
PICHIKA MOOLESWARA RAO, V G L NARASAMBA | ||
Vol 4, No 5 (2016): August - September 2016 | AN INNOVATIVE PERIODIC RELIABILITY AUTHENTICATION SYSTEM WITHOUT THE LOCAL REPLICA | Abstract PDF |
T. Anitha, G. Spandana | ||
Vol 5, No 4 (2017): June - July 2017 | PROFICIENT LICENSE LESS ENTRANCE ORGANIZE FOR WIRELESS BODY AREA NETWORKS | Abstract PDF |
A. Sravani, Dr. R.China Appala Naidu | ||
Vol 4, No 4 (2016): June - July 2016 | A MECHANISM OF CLOUDS FAITH CONTROLLING SERVICE FOR REAL-TIME READINESS | Abstract PDF |
B. Ramakrishna Teja, B.V. Srinivasulu | ||
Proceedings of International Web Conference on “Sustainable Solutions using AI and ML for Society” | A Review Study On Sustainable Solutions In Special Domains Using AI And ML | Abstract PDF |
ROSHINI SOWRIRAJAN | ||
Vol 4, No 6 (2016): October - November 2016 | MINING AND KNOWLEDGE DISCOVERY FROM LARGE DATABASE | Abstract PDF |
Dr.A. Nagesh, Bojja Nishanth Reddy, Pravallika Reddy Thappeta | ||
Vol 2, No 6 (2014): October - November 2014 | TECHNOLOGY ADOPTION IN SOCIALIZING APPLIED SCIENCES FOR EXPLOITATION OF RENEWABLE NATURAL RESOURCES SUSTAINABLY | Abstract PDF |
NG’ANG’A S.I | ||
Vol 9, No 5 (2021): August - September 2021 | Secure Searching Mechanism for Cloud Computing Based Cloud Storage System | Abstract PDF |
M.PRIYANKA REDDY, YEDIDA RAMA KRISHNA | ||
Vol 4, No 5 (2016): August - September 2016 | A VIBRANT STRUCTURE FOR IDENTIFYING MALICIOUS NODES IN UNWIRED NETS | Abstract PDF |
N. Sainath, Challa Mounika | ||
Vol 5, No 4 (2017): June - July 2017 | AN APPROACH WITH CAPABLE SECURITY RANKED KEYWORD SEARCH TECHNIQUE | Abstract PDF |
S. Komali, M. Karuna | ||
Vol 4, No 4 (2016): June - July 2016 | AN EFFECTIVE APPROACH FOR SUPPORTING CLOUD SERVICE PROVIDER SELECTION | Abstract PDF |
M.Giri Prasad, N. Sujatha | ||
Proceedings of International Web Conference on “Sustainable Solutions using AI and ML for Society” | Literature Based Study On Sustainable Solutions Using AI And ML In Some Societal Applications | Abstract PDF |
S. SAISARAN | ||
Vol 4, No 6 (2016): October - November 2016 | DATA SHARING WITH FORWARD SECURITY | Abstract PDF |
Gorikapudi Mahesh, B.V. Srinivasulu | ||
Vol 2, No 5 (2014): August - September 2014 | A SECURE KEY OPTIMIZING FOR EFFICIENT AND BROAD CAST TO REMOTE GROUPS | Abstract |
V.Veera Prasad, D.Laxmi Prasanna | ||
Vol 9, No 5 (2021): August - September 2021 | Multi - owner Secure Data Sharing in Cloud Computing Environment | Abstract PDF |
PATHIVADA ESTHERU RANI, POTHULA SRI RAMAKRISHNA | ||
Vol 4, No 3 (2016): April - May 2016 | NOVEL SCHEME FOR DETECTING IP SPOOFERS USING PASSIVE IP TRACEBACK | Abstract PDF |
Anil Kulkarni, Swaroopa . | ||
Proceedings of International Web Conference on “Sustainable Solutions using AI and ML for Society” | Literature Based Note On Sustainable Solutions In Special Domains Using AI And ML | Abstract PDF |
Dr SRIDHAR SESHADRI | ||
Vol 4, No 6 (2016): October - November 2016 | A WIDE RANGE OF CELLULAR INFRASTRUCTURE TO ALLEVIATE TRAFFIC CONGESTION | Abstract PDF |
B. Sai Krishna, P. Gangadhar | ||
Vol 2, No 5 (2014): August - September 2014 | FOP: FIREWALL OPTIMIZATION PROTOCOL FOR CROSS-DOMAIN PRIVACY PRESERVING | Abstract |
Venkata Varma Vegiraju, M. S. V. V. Ramesh, D. D. D. Suribabu | ||
Vol 9, No 5 (2021): August - September 2021 | A Novel Data Engineering Process Which Integrates Alert Information, Security Logs, And SOC Analysts | Abstract PDF |
R. SATYA MADHURI, K V V RAMANA | ||
Vol 4, No 5 (2016): August - September 2016 | A UNIQUE SCHEME FOR SECURITY AUTHENTICATION SYSTEM | Abstract PDF |
Donikena Prashanth, S. Srikanth Reddy, P. Suresh Kumar | ||
Vol 5, No 3 (2017): April - May 2017 | AN CAPABLE DOCUMENTATION LESS ENTRÉE MANAGE FOR WBANS | Abstract PDF |
T. Vanitha, A. Chethana | ||
2016: Special Issue -2016 | ANALYSIS OF FIRE DETECTION MODULE FOR AUTOMATIC SECURITY SYSTEM AND EXTINGUISHING ROBOT | Abstract PDF |
Veeraveni Rani, Manupati Harisha, Talla Dileep Kumar, Kanneboina Kumara Swamy, G. Santosh Reddy | ||
Vol 11, No 3 (2023): April - May 2023 | Cloud Storage System Towards Dynamic Encrypted Cloud Data With Symmetric-Key Based Verification | Abstract PDF |
KAKARA MADHUSUDHANA RAJU, B. MAHA LAKSHMI RAO | ||
Vol 4, No 6 (2016): October - November 2016 | RELIABLE FRAMEWORK FOR ERROR-DETECTION POLICY USING HASH CODINGS | Abstract PDF |
Kalicheti Mounika, V. Ramesh | ||
Vol 2, No 5 (2014): August - September 2014 | PRIVACY PRESERVING IN ACCESS POLICY CONSOLIDATION FOR LARGE-SCALE EVENT PROCESSING SYSTEMS | Abstract |
V.S.B.E. Prasad Tamarapalli, Rajesh Ghanta | ||
Vol 4, No 5 (2016): August - September 2016 | A REPORT ON WIRELESS LOCAL AREA NETWORKS AND TECHNOLOGIES USED | Abstract PDF |
A. Narender, K. Rajyalaxmi | ||
2016: Special Issue -2016 | DETECTING THE CRACKS ON RAILWAYS BASED ON WIRELESS SENSOR NETWORK | Abstract PDF |
Polaboina Sairam, Aroori Sukumari, Ganesh Challa, Galabu Shivakumar, Ch Kalyani | ||
Proceedings of International Web Conference “Cyber Security” 30th November 2022, Organized by Sbyte Technologies | Focus On Some Cyber Security Topics: Literature Based Study | Abstract PDF |
DESAM SUDHAKAR REDDY, D. DEEPSHIKA | ||
Vol 4, No 6 (2016): October - November 2016 | A FROTHY ENDANGERED SYSTEM FOR IDENTIFYING ATTRIBUTION FAKE AND PACK DRIP ROUNDS IN WIRELESS SENSOR NETWORKS | Abstract PDF |
Sahithya Ponnuru, Y Srineevasulu | ||
Vol 2, No 1 (2014): December - January 2014 | A ROBUST MECHANISM TO MITIGATE DDOS ATTACK USING ENTROPY VARIATION | Abstract PDF |
Reddybathini Durga Siva Prasad, P.R.Krishna Prasad | ||
0 - 0 of 73 Items |
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only articles containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.