Volume 1, Issue 1 July-2014

S.No.

Title/Author Name

Paper ID

01

By Applying Data Allocation Strategies and Guilt Model Analysis to Find Data Leakage Detection

Authors: KomalSurandase, PriyankaJadhavPallaviJadhav , AaratiPatil

 

IJIRIS-SHP1

02

Authentication schemes for session password using color and special characters

authors: Rohit Jagtap1, Vaibhav Ahirrao2, Vinayak Kadam3, Nilesh Aher4

 

IJIRIS-SHP2

03

Preventing Private Information Leakage from Social Networks

Author: K.Nagendran

 

IJIRIS-SHP3

04

Velocity Estimation Of An Object Moving In UWSN Using Reverse Localization Scheme

Author: B.Mohanapriya

 

IJIRIS-SHP4

05

Robust Image Hashing Using NMF and Ring partition for Image Analysis

Author: P.V.Kavitha

 

IJIRIS-SHP5

06

Implementation of Least-Latency Routing over Time-Dependent Wireless Sensor Networks

Author: Manju Priya G

 

IJIRIS-SHP6

07

A Comparative Study of Network Bandwidth Allocation protocols for DataCenter Networks in cloud.

Authors: B Gayathri Kamath* , Dr.RameshBabu H S

 

IJIRIS-SHP7

08

EMAP: Expedite Message Authentication Protocol for VANETs

Author: Bhagyashree .R

 

IJIRIS-SHP8

09

RACISM Prevention in Data Mining

Author: S. P. Santhoshkumar

 

IJIRIS-SHP9

10

IDS alert analysis using clustering & Artificial Neural Network
Authors: Nanaso S. Bansode* , Thaksen J. Parvat   

 

IJIRIS-SHP10

11

Position Based Energy-Efficient Protocol for Mobile Ad-hoc Networks

Authors: Dr. S.K. Mahendran

 

ISJY10011

12

Location Privacy in Vehicular Ad Hoc Networks 

Authors: N.K.Prema, Dr.A.Arul Lawrence S.K

 

ISJY10120

13

SECURITY STUDY OF FACTION COMMUNICATION IN WIRELESS NETWORKS
 
Authors: Rajashekara H.G , Dr.A.Arul Lawrence S.K

 

ISJY10121