S.No Articles Ref. No
 1

Stream Control Transmission Protocol Performance Analysis in Disk Local Area Network Services

- Lynet O. Sibiyia, Japheth O. Ondiek

 IJCTT-V25P101
 2

Performance Evaluation of Quadtree & Hough Transform Segmentation Techniques for Iris recognition using Artificial Neural Network (Ann)

- Falohun A.S, Ismaila W.O, Adeosun O.O

 IJCTT-V25P103
 3

Phishing Attacks and Counter Measures

- Sophia Kingsley Okore, Benisemeni Zakka

 IJCTT-V25P104
 4

Our Traditions and Facebook: Are we shifting off the track?

- Firas Omar, Ahmad Nabot

 IJCTT-V25P105
 5

A review on Face Detection and study of Viola Jones method

- Monali Chaudhari, Shanta sondur, Gauresh Vanjare

 IJCTT-V25P110
 6

An Efficient Guilt Detection Approach for Identifying Data Leakages

- Anand Kiran

 IJCTT-V25P111
 7

Avoiding Cross Site Request Forgery (CSRF) Attack Using TwoFish Security Approach

- Wasim Akram Shaik, Rajesh Pasupuleti

 IJCTT-V25P112
 8

Exploratory Secure Transmission of Data with Semantic CPDA Rule in Wireless Sensor Networks

- K.Bhagya Sri, A.Srinivasan

 IJCTT-V25P116
 9

An Overview of Identity Deception Approaches and Its Effects

- Ms. M. Preensta Ebenazer, Dr. P. Sumathi

 IJCTT-V25P124
 10

Fast Response Enhanced Multi-queue packet Scheduler scheme for Wireless Sensor Network

- Shital L. Bansod, Sonal Honale

 IJCTT-V25P125
 11

Machine Learning Techniques for Automatic Classification of Patients with Fibromyalgia and Arthritis

- Begoña Garcia-Zapirain, Yolanda Garcia-Chimeno, Heather Rogers

 IJCTT-V25P129