Title |
Authors |
Year of Publication |
Category |
. “Tracking back IP packets to their sources”
|
Khan, M, Kumar, R, Kumar C., & Gupta A.K. |
2011 |
Abstract |
“Tracking back IP packets to their sources”
|
Khan, M, Kumar, R, Kumar C., & Gupta A.K. |
2011 |
Abstract |
An Overview of Steganography for the Computer Forensics Examiner
|
Pragya Rashmi, Nitu Pandey |
2011 |
Abstract |
An Overview of Steganography for the Computer Forensics Examiner
|
Pragya Rashmi, Nitu Pandey |
2011 |
Abstract |
Application of honey pots to trap hackers
|
Alam, M., Kesharwani, M., Mishra, M.K. |
2011 |
Abstract |
Application of honey pots to trap hackers
|
Alam, M., Kesharwani, M., Mishra, M.K. |
2011 |
Abstract |
Digital Forensics: The Need for Standardization and Certification
|
Priyanka Mishra* Ranjeet Kumar Nigam* Dr. N.P.Waghmare** and Prof.(Dr.)A.K. Gupta* |
2011 |
Abstract |
Digital Forensics: The Need for Standardization and Certification
|
Priyanka Mishra* Ranjeet Kumar Nigam* Dr. N.P.Waghmare** and Prof.(Dr.)A.K. Gupta* |
2011 |
Abstract |
Email tracing by using e-mail tracker pro
|
Khan, M., Saran V |
2011 |
Abstract |
Email tracing by using e-mail tracker pro
|
Khan, M., Saran V |
2011 |
Abstract |
Ethical hacking a countermeasure for hacking
|
Sarveshttam Kumar*, Dr. A. K. Gupta** |
2011 |
Abstract |
Ethical hacking a countermeasure for hacking
|
Sarveshttam Kumar*, Dr. A. K. Gupta** |
2011 |
Abstract |
Ethical hacking countermeasures for hacking
|
Kumar S., Gupta A.K. |
2011 |
Abstract |
Ethical hacking countermeasures for hacking
|
Kumar S., Gupta A.K. |
2011 |
Abstract |
Forensic analysis of skimming devices for credit card fraud detection
|
Gupta, S., Kushwaha, D., & Kesharwani L |
2011 |
Abstract |
Forensic analysis of skimming devices for credit card fraud detection
|
Gupta, S., Kushwaha, D., & Kesharwani L |
2011 |
Abstract |
Hacking to prevent Hacking: the need of Ethical Hackers
|
Rajeev Kumar*, Dr. A. K. Gupta **, Suneet Kumar * |
2011 |
Abstract |
Hacking to prevent Hacking: the need of Ethical Hackers
|
Rajeev Kumar*, Dr. A. K. Gupta **, Suneet Kumar * |
2011 |
Abstract |
Mobile device analysis: a tool for forensic investigation
|
Amarnath Mishra |
2011 |
Abstract |
Mobile device analysis: a tool for forensic investigation
|
Amarnath Mishra |
2011 |
Abstract |
Monitoring and Forensic analysis of Windows XP Registry
|
Vaibhav Saran*, Dr. Syeed Ahmed**, Er. Ankit Verma*** |
2011 |
Abstract |
Monitoring and Forensic analysis of Windows XP Registry
|
Vaibhav Saran*, Dr. Syeed Ahmed**, Er. Ankit Verma*** |
2011 |
Abstract |
New Era of Biometrics,
|
Saran Vaibhav, Pandey R., Kumar S., & Kumar R. |
2010 |
Research Paper |
New Era of Biometrics,
|
Saran Vaibhav, Pandey R., Kumar S., & Kumar R. |
2010 |
Research Paper |
Patch and Vulnerability Management: A key to prevention
|
Suneet Kumar1, Vaibhav Saran2, Dr. A. K. Gupta3 |
2011 |
Abstract |
Patch and Vulnerability Management: A key to prevention
|
Suneet Kumar1, Vaibhav Saran2, Dr. A. K. Gupta3 |
2011 |
Abstract |
Phishing”
|
Kahnna, S., Purshottam A., Fatma, A, & Gupta A. K. |
2011 |
Abstract |
Phishing”
|
Kahnna, S., Purshottam A., Fatma, A, & Gupta A. K. |
2011 |
Abstract |
Risk associated with e-banking & Risk management
|
Richa Dwivedi, Vijayshree Singh |
2011 |
Abstract |
Risk associated with e-banking & Risk management
|
Richa Dwivedi, Vijayshree Singh |
2011 |
Abstract |
The effectiveness of tools for micro Secure Digital (SD) memory card forensics
|
Ashu Kumar Jha, Stalin Kumar Biswal and Vaibhav Saran |
2011 |
Abstract |
The effectiveness of tools for micro secure digital (SD) memory card forensics
|
Jha, A., Biswal, S., & Saran V |
2011 |
Abstract |
The effectiveness of tools for micro Secure Digital (SD) memory card forensics
|
Ashu Kumar Jha, Stalin Kumar Biswal and Vaibhav Saran |
2011 |
Abstract |
The effectiveness of tools for micro secure digital (SD) memory card forensics
|
Jha, A., Biswal, S., & Saran V |
2011 |
Abstract |
Tracing back IP packets to their sources
|
Md. Matloob Raza Khan, Chandan Kumar, Rajeev Kumar, Dr. A.K. |
2011 |
Abstract |
Tracing back IP packets to their sources
|
Md. Matloob Raza Khan, Chandan Kumar, Rajeev Kumar, Dr. A.K. |
2011 |
Abstract |