


default search action
Cyber Security, Cyber Crime and Cyber Forensics 2011
- Raghu Santanam, M. Sethumadhavan, Mohit Virendra:

Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives. IGI Global 2011, ISBN 978-1-60960-123-2 - Rajarshi Chakraborty, Haricharan Rengamani, Ponnurangam Kumaraguru, H. Raghav Rao:

The UID Project: Lessons Learned from the West and Challenges Identified for India. 1-23 - C. Warren Axelrod, Sukumar Haldar:

Combined Impact of Outsourcing and Hard Times on BPO Risk and Security. 24-32 - Himanshu Maheshwari, Harvey S. Hyman, Manish Agrawal:

A Comparison of Cyber-Crime Definitions in India and the United States. 33-45 - Divya Shankar, Manish Agrawal, H. Raghav Rao:

Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis. 46-58 - Charulata Chaudhary, Ishupal Singh Kang:

Pirates of the Copyright and Cyberspace: Issues Involved. 59-68 - Suja Ramachandran, R. S. Mundada, A. K. Bhattacharjee, C. S. R. C. Murthy, R. Sharma:

Classifying Host Anomalies: Using Ontology in Information Security Monitoring. 70-86 - Asoke K. Talukder:

Securing Next Generation Internet Services. 87-105 - Kenneth J. Giuliani, V. Kumar Murty:

An Examination of Identity Management Models in an Internet Setting. 106-114 - N. Harini, C. K. Shyamala, T. R. Padmanabhan:

Securing Cloud Environment. 115-123 - Rajbir Kaur, Manoj Singh Gaur, P. Lalith Suresh, Vijay Laxmi:

DoS Attacks in MANETs: Detection and Countermeasures. 124-145 - Mohit Virendra, Qi Duan, Shambhu J. Upadhyaya:

Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks. 146-167 - S. Sajan Kumar, M. Hari Krishna Prasad, Suresh Raju Pilli:

Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic. 168-177 - P. Vinod, Vijay Laxmi, Manoj Singh Gaur:

Metamorphic Malware Analysis and Detection Methods. 178-202 - N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar:

Towards Checking Tampering of Software. 204-219 - Chungath Srinivasan, K. V. Lakshmy, Madathil Sethumadhavan:

Complexity Measures of Cryptographically Secure Boolean Functions. 220-230 - Narayanankutty Karuppath, P. Achuthan:

Einstein-Podolsky-Rosen Paradox and Certain Aspects of Quantum Cryptology with Some Applications. 231-239 - M. Sindhu, S. Kumar Sajan, M. Sethumadhavan:

Error Linear Complexity Measures of Binary Multisequences. 240-249 - P. P. Amritha, T. Gireesh Kumar:

A Survey on Digital Image Steganographic Methods. 250-258

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














