Sl. No. | Paper Title | Authors | Download Paper |
1 | A Deliberation of Ethical Concern in E-Commerce | Dr.V Narayana Rao | Download Paper |
2 | A Detailed survey on Malware and Vulnerability Scanners | Battula Trivikrama Rao | Download Paper |
3 | A NOVEL APPROACH ON IMAGE RETRIEVAL WITH LBP OPERATOR | A. Srinivasa Rao, Y.K.Sundara Krishna, V.Venkata Krishna | Download Paper |
4 | A Review on Clustering Techniques | Sk.Mahaboob Basha, P. Madhavil Latha, Dr.D.Naga Raju | Download Paper |
5 | AN IOT BASED SECURED SMART LIBRARY SYSTEM WITH NFC BASED BOOK TRACKING | A. Larsan Aro Brian, L. Arockiam, P. D. Sheba Kezia Malarchelvi | Download Paper |
6 | BASIC PRINCILPLES TO IMPROVE IT SECURITY OF AN ORGANISATION | T. Narsimhappadu, R.SeethaRam | Download Paper |
7 | Behavioral Biometrics for Human Computer Interaction | P. L. Ramesh, Shamim, Bharathi Devi Patnala | Download Paper |
8 | Bitcoin: A Peer-to-Peer Online Virtual Currency, Better Alternative to Real Money | G.Baleswari | Download Paper |
9 | Bring in Knowledge through a Routine Framework in an Electronic Process Bundle | Dr. R. Satya Prasad, K.B.S. Sastry | Download Paper |
10 | Chemistry Learning and Practicing through Virtual Laboratory | Dr.D.Bala Karuna Kumar, Dr.Y.Hanumantha Rao | Download Paper |
11 | Ethical Hacking and Countermeasures | Dr. P.B.SandhyaSri | Download Paper |
12 | Ethical Hacking and its Vulnerabilities | Ch. Suhasini | Download Paper |
13 | A ETHICAL ISSUES IN e-BANKING – ITS ROLE & IMPACT | G.DAVID RAJU | Download Paper |
14 | Hacking Restrictions in IO Port | S N L SRIHARI YENDURI, P SAI GANESH | Download Paper |
15 | Network Security and Business Protection through Ethical Hacking | Dama Anand, Akki Suresh Babu | Download Paper |
16 | Next Generation Mobile ID for Generalized Mobility | S. Sai Kumar, Dr. Y. K. Sundara Krishna | Download Paper |
17 | SECURITY AND TRUST IN E-BUSINESS: PROBLEMS AND FEATURES | Dr. M.S. Chakravarthy | Download Paper |
18 | SOCIAL AND ETHICAL ISSUES IN BANKING INDUSTRY | Narasimha Swamy Lavudiya | Download Paper |
19 | THE HUMAN INFRASTRUCTURE AND SOCIAL ENGINEERING: SOME IMPLICATIONS | Dr. D.V.Ramana Murthy | Download Paper |
20 | TOPSIS METHOD FOR HANDOVER DECISION IN NEXT GENERATION NETWORKS | P. Ravi Kiran, Y. K. Sundara Krishna | Download Paper |
21 | TRACKING THE HACKER WITH CYBER FORENSICS | R.P.S.P.Veerraju, B.V.S.T.Sai | Download Paper |
22 | A Study on Recognition Methods of Telugu Numerals and Characters | Ch. N. Manisha, E. Sreenivasa Reddy, Y.K. Sundara Krishna | Download Paper |