International Journal of Computer
Trends and Technology
Volume 25 Number 1
Research Article IJCTT-V25P101
Stream Control Transmission Protocol Performance Analysis in Disk Local Area Network Services
Lynet O. Sibiyia, Japheth O. Ondiek
Research Article IJCTT-V25P103
Performance Evaluation of Quadtree & Hough Transform Segmentation Techniques for Iris recognition using Artificial Neural Network (Ann)
Falohun A.S, Ismaila W.O, Adeosun O.O
Research Article IJCTT-V25P104
Phishing Attacks and Counter Measures
Sophia Kingsley Okore, Benisemeni Zakka
Research Article IJCTT-V25P105
Our Traditions and Facebook: Are we shifting off the track?
Firas Omar, Ahmad Nabot
Research Article IJCTT-V25P110
A review on Face Detection and study of Viola Jones method
Monali Chaudhari, Shanta sondur, Gauresh Vanjare
Research Article IJCTT-V25P111
An Efficient Guilt Detection Approach for Identifying Data Leakages
Anand Kiran
Research Article IJCTT-V25P112
Avoiding Cross Site Request Forgery (CSRF) Attack Using TwoFish Security Approach
Wasim Akram Shaik, Rajesh Pasupuleti
Research Article IJCTT-V25P116
Exploratory Secure Transmission of Data with Semantic CPDA Rule in Wireless Sensor Networks
K.Bhagya Sri, A.Srinivasan
Research Article IJCTT-V25P124
An Overview of Identity Deception Approaches and Its Effects
Ms. M. Preensta Ebenazer, Dr. P. Sumathi
Research Article IJCTT-V25P125
Fast Response Enhanced Multi-queue packet Scheduler scheme for Wireless Sensor Network
Shital L. Bansod, Sonal Honale
Research Article IJCTT-V25P129
Machine Learning Techniques for Automatic Classification of Patients with Fibromyalgia and Arthritis
Begoña Garcia-Zapirain, Yolanda Garcia-Chimeno, Heather Rogers