| Title | Authors | Year of Publication | Category |
| . “Tracking back IP packets to their sources” | Khan, M, Kumar, R, Kumar C., & Gupta A.K. | 2011 | Abstract |
| “Tracking back IP packets to their sources” | Khan, M, Kumar, R, Kumar C., & Gupta A.K. | 2011 | Abstract |
| An Overview of Steganography for the Computer Forensics Examiner | Pragya Rashmi, Nitu Pandey | 2011 | Abstract |
| An Overview of Steganography for the Computer Forensics Examiner | Pragya Rashmi, Nitu Pandey | 2011 | Abstract |
| Application of honey pots to trap hackers | Alam, M., Kesharwani, M., Mishra, M.K. | 2011 | Abstract |
| Application of honey pots to trap hackers | Alam, M., Kesharwani, M., Mishra, M.K. | 2011 | Abstract |
| Digital Forensics: The Need for Standardization and Certification | Priyanka Mishra* Ranjeet Kumar Nigam* Dr. N.P.Waghmare** and Prof.(Dr.)A.K. Gupta* | 2011 | Abstract |
| Digital Forensics: The Need for Standardization and Certification | Priyanka Mishra* Ranjeet Kumar Nigam* Dr. N.P.Waghmare** and Prof.(Dr.)A.K. Gupta* | 2011 | Abstract |
| Email tracing by using e-mail tracker pro | Khan, M., Saran V | 2011 | Abstract |
| Email tracing by using e-mail tracker pro | Khan, M., Saran V | 2011 | Abstract |
| Ethical hacking a countermeasure for hacking | Sarveshttam Kumar*, Dr. A. K. Gupta** | 2011 | Abstract |
| Ethical hacking a countermeasure for hacking | Sarveshttam Kumar*, Dr. A. K. Gupta** | 2011 | Abstract |
| Ethical hacking countermeasures for hacking | Kumar S., Gupta A.K. | 2011 | Abstract |
| Ethical hacking countermeasures for hacking | Kumar S., Gupta A.K. | 2011 | Abstract |
| Forensic analysis of skimming devices for credit card fraud detection | Gupta, S., Kushwaha, D., & Kesharwani L | 2011 | Abstract |
| Forensic analysis of skimming devices for credit card fraud detection | Gupta, S., Kushwaha, D., & Kesharwani L | 2011 | Abstract |
| Hacking to prevent Hacking: the need of Ethical Hackers | Rajeev Kumar*, Dr. A. K. Gupta **, Suneet Kumar * | 2011 | Abstract |
| Hacking to prevent Hacking: the need of Ethical Hackers | Rajeev Kumar*, Dr. A. K. Gupta **, Suneet Kumar * | 2011 | Abstract |
| Mobile device analysis: a tool for forensic investigation | Amarnath Mishra | 2011 | Abstract |
| Mobile device analysis: a tool for forensic investigation | Amarnath Mishra | 2011 | Abstract |
| Monitoring and Forensic analysis of Windows XP Registry | Vaibhav Saran*, Dr. Syeed Ahmed**, Er. Ankit Verma*** | 2011 | Abstract |
| Monitoring and Forensic analysis of Windows XP Registry | Vaibhav Saran*, Dr. Syeed Ahmed**, Er. Ankit Verma*** | 2011 | Abstract |
| New Era of Biometrics, | Saran Vaibhav, Pandey R., Kumar S., & Kumar R. | 2010 | Research Paper |
| New Era of Biometrics, | Saran Vaibhav, Pandey R., Kumar S., & Kumar R. | 2010 | Research Paper |
| Patch and Vulnerability Management: A key to prevention | Suneet Kumar1, Vaibhav Saran2, Dr. A. K. Gupta3 | 2011 | Abstract |
| Patch and Vulnerability Management: A key to prevention | Suneet Kumar1, Vaibhav Saran2, Dr. A. K. Gupta3 | 2011 | Abstract |
| Phishing” | Kahnna, S., Purshottam A., Fatma, A, & Gupta A. K. | 2011 | Abstract |
| Phishing” | Kahnna, S., Purshottam A., Fatma, A, & Gupta A. K. | 2011 | Abstract |
| Risk associated with e-banking & Risk management | Richa Dwivedi, Vijayshree Singh | 2011 | Abstract |
| Risk associated with e-banking & Risk management | Richa Dwivedi, Vijayshree Singh | 2011 | Abstract |
| The effectiveness of tools for micro Secure Digital (SD) memory card forensics | Ashu Kumar Jha, Stalin Kumar Biswal and Vaibhav Saran | 2011 | Abstract |
| The effectiveness of tools for micro secure digital (SD) memory card forensics | Jha, A., Biswal, S., & Saran V | 2011 | Abstract |
| The effectiveness of tools for micro Secure Digital (SD) memory card forensics | Ashu Kumar Jha, Stalin Kumar Biswal and Vaibhav Saran | 2011 | Abstract |
| The effectiveness of tools for micro secure digital (SD) memory card forensics | Jha, A., Biswal, S., & Saran V | 2011 | Abstract |
| Tracing back IP packets to their sources | Md. Matloob Raza Khan, Chandan Kumar, Rajeev Kumar, Dr. A.K. | 2011 | Abstract |
| Tracing back IP packets to their sources | Md. Matloob Raza Khan, Chandan Kumar, Rajeev Kumar, Dr. A.K. | 2011 | Abstract |