IJCOT - Volume 2 Issue 5 - 2012
S.No
|
Title/Author Name
|
Paper Id
|
1
|
IJCOT-V2I5P301
|
|
2 |
Robust Data Clustering Algorithms for Network Intrusion Detection - Gunja Ambica , Mrs.N.Rajeswari |
IJCOT-V2I5P302 |
3 |
Fingerprint Validation and Outlier Detection Using Minutiae Approach in Network Security -Prathima Devi Sirivella, Mrs D.Raaga Vamsi |
IJCOT-V2I5P303 |
4 |
Security requirements in Software Requirements Engineering - Mahizharuvi,Dr.K.Alagarsamy. |
IJCOT-V2I5P304 |