S.No |
Articles |
Paper Id |
1 | IJCTT-V2I1P101 |
|
2 | A Routing-Driven Public-Key Cryptosystem Based Key Management Scheme for a Sensor Network - Satya Venkatesh Kadali, O.Srinivasa Rao, Dr MHM Krishna Prasad. |
IJCTT-V2I1P103 |
3 |
- Ismail O. Muraina,Imran A.Adeleke, Mukaila A.Rahman |
IJCTT-V2I1P104 |
4 | Credit Card Fraud Detection Analysis - J. Keziya Rani,S.Prem Kumar,U.Ram Mohan, C.Uma Shankar. |
IJCTT-V2I1P106 |
5 | A Study on Conduct of Teams in an It and a BPO Company - S.Nirmala, S.Deborah Sharon . |
IJCTT-V2I1P112 |
6 | An IP Trace back System to Find the Real Source of Attacks - A.Parvathi and G.L.N.JayaPradha. |
IJCTT-V2I1P113 |
7 | Dependency grammar feature based noun phrase extraction for text summarization. - Mrs. Dipti Sakhare,Dr. Rajkumar. |
IJCTT-V2I1P114 |
8 | Low Power testing by don’t care bit filling technique - Chetan Sharma . |
IJCTT-V2I1P115 |
9 | Design and Development of a Secured Routing Scheme for Mobile Ad hoc Networks (MANETs) - Payal Kansal, Viksit Kumar Sharma, Shashiraj Teotia, Dr. Sohan Garg. |
IJCTT-V2I1P118 |
10 | A QOS-Aware Software Selection Method Based On Service Credibility Evaluation - U.Sadhana Reddy, M.Y.Babu. |
IJCTT-V2I1P121 |
11 |
- Dodda Shekar, Rangu Srikanth. |
IJCTT-V2I1P122 |