S.No Articles Ref. No
 1

Reducing Network Intrusion Detection using Association rule and Classification algorithms

- K.Keerthi, P.Sreenivas

IJCTT-V3I6P102
 2

A Modular and Extendable Approach to Database Encryption at Multi-granularity Level

- Ramesh Pabboju, S.Krishna Mohan Rao.

 IJCTT-V3I6P104
 3

 Simulation of File Arrivals and Departures on Buffer sizing in Access Routers

- Sivasubramanyam Mopidevi, S Narayana.

IJCTT-V3I6P106
 4

 A Novel Tree Based Security Approach for Smart Phones

- R.Surendiran, Dr.K.Alagarsamy

IJCTT-V3I6P108