S.No.
|
Title/Author Name
|
Paper ID
|
01
|
By Applying Data Allocation Strategies and Guilt Model Analysis to Find Data Leakage Detection
Authors: KomalSurandase, PriyankaJadhavPallaviJadhav , AaratiPatil
|
IJIRIS-SHP1
|
02
|
Authentication schemes for session password using color and special characters
authors: Rohit Jagtap1, Vaibhav Ahirrao2, Vinayak Kadam3, Nilesh Aher4
|
IJIRIS-SHP2
|
03
|
Preventing Private Information Leakage from Social Networks
Author: K.Nagendran
|
IJIRIS-SHP3
|
04
|
Velocity Estimation Of An Object Moving In UWSN Using Reverse Localization Scheme
Author: B.Mohanapriya
|
IJIRIS-SHP4
|
05
|
Robust Image Hashing Using NMF and Ring partition for Image Analysis
Author: P.V.Kavitha
|
IJIRIS-SHP5
|
06
|
Implementation of Least-Latency Routing over Time-Dependent Wireless Sensor Networks
Author: Manju Priya G
|
IJIRIS-SHP6
|
07
|
A Comparative Study of Network Bandwidth Allocation protocols for DataCenter Networks in cloud.
Authors: B Gayathri Kamath* , Dr.RameshBabu H S
|
IJIRIS-SHP7
|
08
|
EMAP: Expedite Message Authentication Protocol for VANETs
Author: Bhagyashree .R
|
IJIRIS-SHP8
|
09
|
RACISM Prevention in Data Mining
Author: S. P. Santhoshkumar
|
IJIRIS-SHP9
|
10
|
IDS alert analysis using clustering & Artificial Neural Network Authors: Nanaso S. Bansode* , Thaksen J. Parvat
|
IJIRIS-SHP10
|
11
|
Position Based Energy-Efficient Protocol for Mobile Ad-hoc Networks
Authors: Dr. S.K. Mahendran
|
ISJY10011
|
12
|
Location Privacy in Vehicular Ad Hoc Networks
Authors: N.K.Prema, Dr.A.Arul Lawrence S.K
|
ISJY10120
|
13
|
SECURITY STUDY OF FACTION COMMUNICATION IN WIRELESS NETWORKS Authors: Rajashekara H.G , Dr.A.Arul Lawrence S.K
|
ISJY10121
|