Search Results


Revise Search
 
Issue Title
 
Vol 1, No 5 (2013): August -September DATA OUTSOURCING BASED SIMILARITY FUSION Abstract PDF
S. Pradeep Kumar Reddy, M. Raghavendra Rao
 
Proceedings of Cloud based International Workshop 25th July, 2020 Organized by sbytetechnologies.com Reference Based Study On Impact Of Covid-19 On Sustainable Computing Abstract PDF
SHUBHAM JOSHI
 
Vol 2, No 1 (2014): December - January 2014 INTEGRATION OF AUDIO IN IMAGE PASSWORD PROTECTION SYSTEM Abstract PDF
Sangeetha Govindan, J.R. Thresphine
 
Proceedings of International Web Conference “Cyber Security” 30th November 2022, Organized by Sbyte Technologies A Literature based study on Cyber Security and Climate Changes Abstract PDF
ROSHINI SOWRIRAJAN, BADRI NARAYANAN
 
Vol 1, No 4 (2013): JUNE - JULY AN INNOVATIVE ANGLE IN THE APPLICATION OF CRYPTOGRAPHY TO NETWORK SECURITY Abstract PDF
H. Mohammed Khan, Dr.J.George Chellin Chandran, C.Sahaya Kingsly
 
Vol 4, No 5 (2016): August - September 2016 AN AUTOMATED SOLUTION FOR AVOIDING ENVIRONMENTAL POLLUTION ON ROADS Abstract PDF
Teepireddy Yellareddy, M. Govind Raj, P. Suresh Kumar
 
Vol 5, No 3 (2017): April - May 2017 A SECURE MULTI-VARIATE ROUTING FRAMEWORK FOR WIRELESS SENSOR NETWORK Abstract PDF
G.Venkata. Monika Miss., P. Sunitha, B. Swathi
 
Vol 5, No 3 (2017): April - May 2017 RECOGNITION AND RECTIFICATION OF WEB APPLICATION OBLIGATION WITH FIXED ANALYSIS AND TEXT MINING Abstract PDF
Medisetti Vidyabharathi, T.Geetha Lakshmi
 
Proceedings of Cloud based International Conference Organized by Sybe Technologies on 5th June 2020 Literature Based Study On Cloud Computing For Health And Sustainability In View Of Covid19 Abstract PDF
PRAMOD KUMAR
 
Vol 4, No 5 (2016): August - September 2016 INVENTING AN EFFECTIVE WAY OF DISSOLUTE THE MIDST OF THE SPOOFERS LOCATIONS Abstract PDF
D. Rajani Bai, C. Nagesh
 
Vol 5, No 3 (2017): April - May 2017 ADVANCES OF MODERN SECURE COMMUNICATION TECHNIQUE AND ITS OPTIMIZATION IN WIRELESS SENSOR NETWORK Abstract PDF
K Jayavenkataram, Ms. M. Padmaja
 
2016: Special Issue -2016 SURVEY OF ANDROID MOBILE BASED HOME AUTOMATION USING BLUETOOTH TECHNOLOGY ENABLED REMOTE CONTROL Abstract PDF
Takkallapally Ashwini, Gajje Tejashwini, Bashaboina Prashanth, A Dinesh Kumar, G. Purnchandar Rao
 
Proceedings of International Web Conference “Cyber Security” 30th November 2022, Organized by Sbyte Technologies Some Cyber Security Topics: Review Study Abstract PDF
PRAMOD KUMAR
 
Vol 4, No 6 (2016): October - November 2016 AN EXPLOSIVE EXPANSION TOWARDS MUTUAL DATA UTILIZING ROUTINE USING DATA ASSEMBLY Abstract PDF
Rajesh Kumar Bhavani, P Ravindra Kumar
 
Vol 6, No 3 (2018): April - May 2018 A REVIEW ON SHARED MUTUAL AND INDEPENDENT APPROACH TO CONVERT CLOUD DATA Abstract PDF
B. Swathi, P. Bikshapathy
 
Vol 4, No 5 (2016): August - September 2016 ELEVATING THE PROBLEMS OF LINEAR SEARCHABLE CIPHERTEXT ON LARGE-SCALE DATABASE Abstract PDF
Mukta Varsha, K. Ramana Reddy
 
Vol 5, No 3 (2017): April - May 2017 A MEASUREMENTS INSERTION WITH LARGE DATA Abstract PDF
Puli Madhavi, M.V.Pavan Kumar, Dr. S. Gopi Krishna
 
Vol 3, No 6 (2015): October - November 2015 SECURING CLOUD COMPUTING SERVICES USING STRONG USER AUTHENTICATION WITH LOCAL CERTIFICATION AUTHORITY Abstract PDF
My Abdelkader Youssefi
 
Proceedings of International Web Conference “Cyber Security” 30th November 2022, Organized by Sbyte Technologies Cybercrime Related Topics : Review Study Abstract PDF
S. SAISARAN
 
Vol 4, No 6 (2016): October - November 2016 INACTIVE IP DROP BACK: RELEASING THE SETTINGS OF IP SPOOFERS OF APOSTASY PATH Abstract PDF
B.Suvarna Lakshmi, N Venkatadri
 
Vol 1, No 6 (2013): October-November WORKFLOW SIGNATURES FOR SECURE E-BUSINESS PROCESS Abstract PDF
Kirankumar Pulivarthi, A.Sudarsan Reddy
 
Vol 5, No 6 (2017): October - November 2017 IDENTIFICATION OF FACE AND SPOOFING FOR IMPAIRED PEOPLE IN THE VISUALIZATION Abstract PDF
P Padma, R Shivaji
 
Vol 4, No 4 (2016): June - July 2016 SCHEMATIC IMPLEMENTATION OF HIGH DATA TRUSTWORTHINESS IN DECISIONS IN UNWIRED BEAM NETS Abstract PDF
Tanniru Anusha, Dr R China Appala Naidu
 
Vol 5, No 3 (2017): April - May 2017 A NON-ISOLATION ARRANGEMENT OF DATA FOR DIGGING Abstract PDF
G.D. Marykeerthana, K. Narsimhulu
 
Vol 3, No 4 (2015): June - July 2015 IMPLEMENTATION OF SOCIAL COMMUNITY CLOUD VIA SOCIAL NETWORKS Abstract PDF
S. Vishnu Vardhan, Thota Neha
 
Vol 4, No 6 (2016): October - November 2016 MALICIOUS ADVERSARY DECISION MAKING FOR COMPLEX INFRASTRUCTURES Abstract PDF
Jabilli Sowjanya, P. Pandarinath
 
Vol 5, No 5 (2017): August - September 2017 A SERVICE PROTOTYPE TO VALIDATE RESULT REVELATION OF OUTSOURCED REGULAR ITEMSET PROSPECTED Abstract PDF
Fouzia Sultana, Humera Shahab
 
Vol 4, No 4 (2016): June - July 2016 SECURE AND PRIVACY PRESERVING SMARTPHONE BASED TRAFFIC INFORMATION SYSTEM Abstract PDF
Kalluri Anil Kumar, K. Divya
 
Vol 5, No 3 (2017): April - May 2017 A TRIVIAL PROTECTED PLAN FOR DETECT ATTRIBUTION FAKE AND CONTAINER PLUNGE ATTACKS IN WIRELESS SENSOR NETWORKS Abstract PDF
Mummadi Sarada
 
Vol 3, No 3 (2015): April - May 2015 INTRUSION TOLERANCE IN HETEROGENEOUS WIRELESS SENSOR NETWORKS USING VOTING BASED ALGORITHM WITH DYNAMIC REDUNDANCY MANAGEMENT OF MULTIPATH ROUTING Abstract PDF
Choudhari Raghuraj, Prof.Chandrasekhar S
 
Vol 10, No 5 (2022): August - September 2022 Literature based Cyber Security Topics: Handbook Abstract PDF
Dr SRIDHAR SESHADRI
 
Vol 4, No 5 (2016): August - September 2016 INVENTING MISCHIEVOUS INTRUSIONS IN SOCIAL MEDIA NETS Abstract PDF
Harsha Raj, B.M.G. Prasad
 
Vol 5, No 5 (2017): August - September 2017 ACTIVE DISSECTION BASED ON PUBLIC ASSESSMENT FOR PROTECTED CLOUD STORAGE Abstract PDF
B. Sowjanya, Dr. M. Laxmaiah
 
Vol 4, No 4 (2016): June - July 2016 A ROBUST PRIMITIVE FOR AVOIDING DATA ATTACKS USING CRYPTOGRAPHY Abstract PDF
Nagaram Pradeep Kumar Goud, P. Ramesh Reddy
 
Vol 5, No 2 (2017): February - March 2017 MEASURED SECURITY FEATURES IMPLEMENTATION IN CLOUD ENVIRONMENT Abstract PDF
Chandhini K
 
Vol 2, No 6 (2014): October - November 2014 AN EFFECTIVE CACHING SCHEME FOR AMES Abstract
Eesub Mohammad, Dr.Y. Venkateswarlu
 
Vol 10, No 5 (2022): August - September 2022 Cloud Security Measures Using Machine Learning Abstract PDF
ADABALA P V D L KUMAR, CHILLA SANTHI
 
Vol 4, No 5 (2016): August - September 2016 DATA ACQUISITION SYSTEM USING IN MOBILE APPLICATION Abstract PDF
N. Sai Bhavani, S. Mahesh Reddy, P. Suresh Kumar
 
Vol 5, No 4 (2017): June - July 2017 A DISCOVERY OF DESPITEFUL FB APPS Abstract PDF
Pathakamuri Nagaveni, Venkata Ramaiah Kavuri
 
Vol 4, No 4 (2016): June - July 2016 A SECURE FRAMEWORK TO BUILD FREQUENT AUTHENTICATION CHECKING SYSTEM FOR LONGER SESSIONS Abstract PDF
Siramdas Narmada Devi, E. Ravi
 
Vol 4, No 6 (2016): October - November 2016 A VERSATILE ALARMING METHOD TO GET INSTANT HELP DURING EMERGENCY Abstract PDF
Rosy Gehlaut, G.S.S. Prasad
 
Vol 2, No 6 (2014): October - November 2014 FINDING FRAUD DETECTION IN ATM CARD TRANSACTION WITH THE HELP OF HIDDEN MARKOV MODEL Abstract PDF
Dhamalenamrata ., Holsayali ., Rajemansi ., Lambepragati ., Prof. Gajanandeokate
 
Vol 9, No 6 (2021): October - November 2021 Secure Access control Technology towards Data Sharing and Storage in Cloud Computing Abstract PDF
PICHIKA MOOLESWARA RAO, V G L NARASAMBA
 
Vol 4, No 5 (2016): August - September 2016 AN INNOVATIVE PERIODIC RELIABILITY AUTHENTICATION SYSTEM WITHOUT THE LOCAL REPLICA Abstract PDF
T. Anitha, G. Spandana
 
Vol 5, No 4 (2017): June - July 2017 PROFICIENT LICENSE LESS ENTRANCE ORGANIZE FOR WIRELESS BODY AREA NETWORKS Abstract PDF
A. Sravani, Dr. R.China Appala Naidu
 
Vol 4, No 4 (2016): June - July 2016 A MECHANISM OF CLOUDS FAITH CONTROLLING SERVICE FOR REAL-TIME READINESS Abstract PDF
B. Ramakrishna Teja, B.V. Srinivasulu
 
Proceedings of International Web Conference on “Sustainable Solutions using AI and ML for Society” A Review Study On Sustainable Solutions In Special Domains Using AI And ML Abstract PDF
ROSHINI SOWRIRAJAN
 
Vol 4, No 6 (2016): October - November 2016 MINING AND KNOWLEDGE DISCOVERY FROM LARGE DATABASE Abstract PDF
Dr.A. Nagesh, Bojja Nishanth Reddy, Pravallika Reddy Thappeta
 
Vol 2, No 6 (2014): October - November 2014 TECHNOLOGY ADOPTION IN SOCIALIZING APPLIED SCIENCES FOR EXPLOITATION OF RENEWABLE NATURAL RESOURCES SUSTAINABLY Abstract PDF
NG’ANG’A S.I
 
Vol 9, No 5 (2021): August - September 2021 Secure Searching Mechanism for Cloud Computing Based Cloud Storage System Abstract PDF
M.PRIYANKA REDDY, YEDIDA RAMA KRISHNA
 
Vol 4, No 5 (2016): August - September 2016 A VIBRANT STRUCTURE FOR IDENTIFYING MALICIOUS NODES IN UNWIRED NETS Abstract PDF
N. Sainath, Challa Mounika
 
Vol 5, No 4 (2017): June - July 2017 AN APPROACH WITH CAPABLE SECURITY RANKED KEYWORD SEARCH TECHNIQUE Abstract PDF
S. Komali, M. Karuna
 
Vol 4, No 4 (2016): June - July 2016 AN EFFECTIVE APPROACH FOR SUPPORTING CLOUD SERVICE PROVIDER SELECTION Abstract PDF
M.Giri Prasad, N. Sujatha
 
Proceedings of International Web Conference on “Sustainable Solutions using AI and ML for Society” Literature Based Study On Sustainable Solutions Using AI And ML In Some Societal Applications Abstract PDF
S. SAISARAN
 
Vol 4, No 6 (2016): October - November 2016 DATA SHARING WITH FORWARD SECURITY Abstract PDF
Gorikapudi Mahesh, B.V. Srinivasulu
 
Vol 2, No 5 (2014): August - September 2014 A SECURE KEY OPTIMIZING FOR EFFICIENT AND BROAD CAST TO REMOTE GROUPS Abstract
V.Veera Prasad, D.Laxmi Prasanna
 
Vol 9, No 5 (2021): August - September 2021 Multi - owner Secure Data Sharing in Cloud Computing Environment Abstract PDF
PATHIVADA ESTHERU RANI, POTHULA SRI RAMAKRISHNA
 
Vol 4, No 3 (2016): April - May 2016 NOVEL SCHEME FOR DETECTING IP SPOOFERS USING PASSIVE IP TRACEBACK Abstract PDF
Anil Kulkarni, Swaroopa .
 
Proceedings of International Web Conference on “Sustainable Solutions using AI and ML for Society” Literature Based Note On Sustainable Solutions In Special Domains Using AI And ML Abstract PDF
Dr SRIDHAR SESHADRI
 
Vol 4, No 6 (2016): October - November 2016 A WIDE RANGE OF CELLULAR INFRASTRUCTURE TO ALLEVIATE TRAFFIC CONGESTION Abstract PDF
B. Sai Krishna, P. Gangadhar
 
Vol 2, No 5 (2014): August - September 2014 FOP: FIREWALL OPTIMIZATION PROTOCOL FOR CROSS-DOMAIN PRIVACY PRESERVING Abstract
Venkata Varma Vegiraju, M. S. V. V. Ramesh, D. D. D. Suribabu
 
Vol 9, No 5 (2021): August - September 2021 A Novel Data Engineering Process Which Integrates Alert Information, Security Logs, And SOC Analysts Abstract PDF
R. SATYA MADHURI, K V V RAMANA
 
Vol 4, No 5 (2016): August - September 2016 A UNIQUE SCHEME FOR SECURITY AUTHENTICATION SYSTEM Abstract PDF
Donikena Prashanth, S. Srikanth Reddy, P. Suresh Kumar
 
Vol 5, No 3 (2017): April - May 2017 AN CAPABLE DOCUMENTATION LESS ENTRÉE MANAGE FOR WBANS Abstract PDF
T. Vanitha, A. Chethana
 
2016: Special Issue -2016 ANALYSIS OF FIRE DETECTION MODULE FOR AUTOMATIC SECURITY SYSTEM AND EXTINGUISHING ROBOT Abstract PDF
Veeraveni Rani, Manupati Harisha, Talla Dileep Kumar, Kanneboina Kumara Swamy, G. Santosh Reddy
 
Vol 11, No 3 (2023): April - May 2023 Cloud Storage System Towards Dynamic Encrypted Cloud Data With Symmetric-Key Based Verification Abstract PDF
KAKARA MADHUSUDHANA RAJU, B. MAHA LAKSHMI RAO
 
Vol 4, No 6 (2016): October - November 2016 RELIABLE FRAMEWORK FOR ERROR-DETECTION POLICY USING HASH CODINGS Abstract PDF
Kalicheti Mounika, V. Ramesh
 
Vol 2, No 5 (2014): August - September 2014 PRIVACY PRESERVING IN ACCESS POLICY CONSOLIDATION FOR LARGE-SCALE EVENT PROCESSING SYSTEMS Abstract
V.S.B.E. Prasad Tamarapalli, Rajesh Ghanta
 
Vol 4, No 5 (2016): August - September 2016 A REPORT ON WIRELESS LOCAL AREA NETWORKS AND TECHNOLOGIES USED Abstract PDF
A. Narender, K. Rajyalaxmi
 
2016: Special Issue -2016 DETECTING THE CRACKS ON RAILWAYS BASED ON WIRELESS SENSOR NETWORK Abstract PDF
Polaboina Sairam, Aroori Sukumari, Ganesh Challa, Galabu Shivakumar, Ch Kalyani
 
Proceedings of International Web Conference “Cyber Security” 30th November 2022, Organized by Sbyte Technologies Focus On Some Cyber Security Topics: Literature Based Study Abstract PDF
DESAM SUDHAKAR REDDY, D. DEEPSHIKA
 
Vol 4, No 6 (2016): October - November 2016 A FROTHY ENDANGERED SYSTEM FOR IDENTIFYING ATTRIBUTION FAKE AND PACK DRIP ROUNDS IN WIRELESS SENSOR NETWORKS Abstract PDF
Sahithya Ponnuru, Y Srineevasulu
 
Vol 2, No 1 (2014): December - January 2014 A ROBUST MECHANISM TO MITIGATE DDOS ATTACK USING ENTROPY VARIATION Abstract PDF
Reddybathini Durga Siva Prasad, P.R.Krishna Prasad
 
0 - 0 of 73 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"



Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.