default search action
Cyber Security, Cyber Crime and Cyber Forensics 2011
- Raghu Santanam, M. Sethumadhavan, Mohit Virendra:
Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives. IGI Global 2011, ISBN 978-1-60960-123-2 - Rajarshi Chakraborty, Haricharan Rengamani, Ponnurangam Kumaraguru, H. Raghav Rao:
The UID Project: Lessons Learned from the West and Challenges Identified for India. 1-23 - C. Warren Axelrod, Sukumar Haldar:
Combined Impact of Outsourcing and Hard Times on BPO Risk and Security. 24-32 - Himanshu Maheshwari, Harvey S. Hyman, Manish Agrawal:
A Comparison of Cyber-Crime Definitions in India and the United States. 33-45 - Divya Shankar, Manish Agrawal, H. Raghav Rao:
Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis. 46-58 - Charulata Chaudhary, Ishupal Singh Kang:
Pirates of the Copyright and Cyberspace: Issues Involved. 59-68 - Suja Ramachandran, R. S. Mundada, A. K. Bhattacharjee, C. S. R. C. Murthy, R. Sharma:
Classifying Host Anomalies: Using Ontology in Information Security Monitoring. 70-86 - Asoke K. Talukder:
Securing Next Generation Internet Services. 87-105 - Kenneth J. Giuliani, V. Kumar Murty:
An Examination of Identity Management Models in an Internet Setting. 106-114 - N. Harini, C. K. Shyamala, T. R. Padmanabhan:
Securing Cloud Environment. 115-123 - Rajbir Kaur, Manoj Singh Gaur, P. Lalith Suresh, Vijay Laxmi:
DoS Attacks in MANETs: Detection and Countermeasures. 124-145 - Mohit Virendra, Qi Duan, Shambhu J. Upadhyaya:
Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks. 146-167 - S. Sajan Kumar, M. Hari Krishna Prasad, Suresh Raju Pilli:
Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic. 168-177 - P. Vinod, Vijay Laxmi, Manoj Singh Gaur:
Metamorphic Malware Analysis and Detection Methods. 178-202 - N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar:
Towards Checking Tampering of Software. 204-219 - Chungath Srinivasan, K. V. Lakshmy, Madathil Sethumadhavan:
Complexity Measures of Cryptographically Secure Boolean Functions. 220-230 - Narayanankutty Karuppath, P. Achuthan:
Einstein-Podolsky-Rosen Paradox and Certain Aspects of Quantum Cryptology with Some Applications. 231-239 - M. Sindhu, S. Kumar Sajan, M. Sethumadhavan:
Error Linear Complexity Measures of Binary Multisequences. 240-249 - P. P. Amritha, T. Gireesh Kumar:
A Survey on Digital Image Steganographic Methods. 250-258
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.