IJCOT - Volume 2 Issue 5 - 2012

S.No
Title/Author Name
Paper Id
1
IJCOT-V2I5P301
 2

Robust Data Clustering Algorithms for Network Intrusion Detection 

- Gunja Ambica , Mrs.N.Rajeswari

IJCOT-V2I5P302
 3

Fingerprint Validation and Outlier Detection Using Minutiae Approach in Network Security

-Prathima Devi Sirivella, Mrs D.Raaga Vamsi 

 IJCOT-V2I5P303
 4

Security requirements in Software Requirements Engineering 

- Mahizharuvi,Dr.K.Alagarsamy  

 IJCOT-V2I5P304