Menu

Author: ijeebs

Cloud Computing Security using Multiple Cloud

Nikhil Shrivastva , Ajay Survase , Poorva Andurkar , Shubhada Bhandare Read Documents

Evidence Based Detection of Dos Attack in MANETs

Geetanjali Dhaygude , Shradha Ippakayal , Vinaya Kalyanshetty Mrs. M. P. Lokhande Read Documents

Sentiment analysis on news articles using Natural Language Processing and Machine Learning Approach

Pranali Chilekar , Swati Ubale , Pragati Sonkambale , Reema Panarkar , Gopal Upadhye Read Documents

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Sharddha Dangare , Swapnali Sakore , Rukmini Raut , Vaishali Shinde Read Documents

Design Information Security System Using Elgamal With Ann Encryption

Harshada Sawant , Revati Salvekar Aishwarya Pandey, Dipti Patil Read Documents

IP Spoofing and Stepping Stone Attacks in Wireless Networks: Detection, Localization and Prevention

Ashwini Kokate , Sneha Bhalerao , Sapana Dikonda , Kajol Ingawale , R. T. Umbare Read Documents

EAACK-An AttackDetection and Prevention SystemforMANETs

PoonamP.Joshi ,PoojaK.Nande , AshwiniS.Pawar , Pooja S.Shinde , RupaliT.Umbare Read Documents

Online Patient Health Monitoring System using WSN and Zigbee

Dipeeka M. Chavhan , Prof. N.A. Dawande Read Documents

History Visualization using Information Technology as a Tool

KiranChaudhari , VarshaThorat , Nikhil Mandlik , HarshadKedia Read Documents