S.No |
Articles |
Ref. No |
1 |
Stream Control Transmission Protocol Performance Analysis in Disk Local Area Network Services
- Lynet O. Sibiyia, Japheth O. Ondiek
|
IJCTT-V25P101 |
2 |
Performance Evaluation of Quadtree & Hough Transform Segmentation Techniques for Iris recognition using Artificial Neural Network (Ann)
- Falohun A.S, Ismaila W.O, Adeosun O.O
|
IJCTT-V25P103 |
3 |
Phishing Attacks and Counter Measures
- Sophia Kingsley Okore, Benisemeni Zakka
|
IJCTT-V25P104 |
4 |
Our Traditions and Facebook: Are we shifting off the track?
- Firas Omar, Ahmad Nabot
|
IJCTT-V25P105 |
5 |
A review on Face Detection and study of Viola Jones method
- Monali Chaudhari, Shanta sondur, Gauresh Vanjare
|
IJCTT-V25P110 |
6 |
An Efficient Guilt Detection Approach for Identifying Data Leakages
- Anand Kiran
|
IJCTT-V25P111 |
7 |
Avoiding Cross Site Request Forgery (CSRF) Attack Using TwoFish Security Approach
- Wasim Akram Shaik, Rajesh Pasupuleti
|
IJCTT-V25P112 |
8 |
Exploratory Secure Transmission of Data with Semantic CPDA Rule in Wireless Sensor Networks
- K.Bhagya Sri, A.Srinivasan
|
IJCTT-V25P116 |
9 |
An Overview of Identity Deception Approaches and Its Effects
- Ms. M. Preensta Ebenazer, Dr. P. Sumathi
|
IJCTT-V25P124 |
10 |
Fast Response Enhanced Multi-queue packet Scheduler scheme for Wireless Sensor Network
- Shital L. Bansod, Sonal Honale
|
IJCTT-V25P125 |
11 |
Machine Learning Techniques for Automatic Classification of Patients with Fibromyalgia and Arthritis
- Begoña Garcia-Zapirain, Yolanda Garcia-Chimeno, Heather Rogers
|
IJCTT-V25P129 |