S.No | Title | Page No | Download |
IJIT 1 | CONSTANT INCREASE RATE DDOS ATTACKS DETECTION USING IP TRACE BACK AND INFORMATION DISTANCE METRICS Authors:VEMULA GANESH, B. VAMSI KRISHNA |
0001-0006 |
Download |
IJIT 2 | PROGRESSIVE MINING FRAME WORK USING REGULAR EXPRESSIONS Authors:CHERUKU SAKSHITH KUMAR, MALGIREDDY. SAIDI REDDY |
0007-0012 |
Download |
IJIT 3 | MIST OPERATION OF COMPUTERS: DETECTING INSIDE INFORMATION STEALING ATTACKS WITH IN THE CLOUD Authors:T.SHYAM KUMAR, M.PAVAN KUMAR |
0013-0018 |
Download |
IJIT 4 | REGRESSION TESTING OF MUTATION BASED UNIT TEST CASES IN OOP Authors:T.SHYAM KUMAR, M.PRIYANKA |
0019-022 |
Download |
IJIT 5 | AN EFFICIENT SYSTEM FOR HUNTING REGULAR EXPRESSION Authors:TATIREDDY HARATHI, G.S. PRAVEEN KUMAR |
0023-0029 |
Download |
IJIT 6 | LIVE STREAMING FOR PEER-TO-PEER SYSTEM USING PEER-DIVISION MULTIPLEXING Authors:Mr.YOGESH B. AMANE, Mr. RAHUL S. KADAM |
0030-0035 |
Download |
IJIT 6 | PROTECTED DATA FORWARDING BY ERASURE CODING TO CLOUD STORAGE SYSTEM Authors:Mr.YOGESH B. AMANE, Mr. RAHUL S. KADAM |
0030-0035 |
Download |
IJIT 7 | PROTECTED DATA FORWARDING BY ERASURE CODING TO CLOUD STORAGE SYSTEM Authors:P. CHANDU, DNVSLS INDIRA |
0036-0041 |
Download |
IJIT 8 | A NOVEL APPROACH TO REDUCE FALSE POSITIVES IN SPAM ZOMBIE DETECTION SYSTEMS Authors:MADHUBABU NALLURI, M.VAZRALU |
0042-0047 |
Download |
IJIT 9 | LOW BANDWIDTH DDOS ATTACK DETECTION IN THE NETWORK Authors:L. SHIVAKUMAR, 2G. ANIL KUMAR |
0054-0059 |
Download |
IJIT 10 | POWER FLOW CONTROL OF UPFC IN A POWER SYSTEMS Authors:BHUPESH DESHMUKH, DHANESHWARI SAHU |
0060-0065 |
Download |
IJIT 11 | Compressive Sensing Detection method for Frequency Hopping Signals Authors:P.DEVA, M. SHIVAPRASAD |
0066-0069 |
Download |
IJIT 12 | Enhanced ACO on Demand Routing Protocol for MANET’s Authors:B. SUKUMAR BABU, R. R. TEWARI, NUPOOR GOEL |
0070-0072 |
Download |
IJIT 13 | Optimum Solution for Weighted Sum Rate Maximization in Gaussian Broadcast Authors:PRAGADA MOHAN RAO, K.KISHAN RAO |
0073-0077 |
Download |
IJIT 14 | PROACTIVE PENETRATION TESTING FRAMEWORK FOR FINDING UNKNOWN VULNERABILITIES Authors:KUDIKALA SATHYANARAYANA, MADDURU SAMBASIVUDU |
0078-0082 |
Download |
IJIT 15 | ANOMALY INTRUSION DETECTION SYSTEM USING ACCESS METRICS Authors:A. NAVEEN KUMAR, K. KAILASA RAO |
0083-0088 |
Download |
IJIT 1 | Comparative Study on Finger Print Matching Algorithms Authors:ANKAMMA RAO PAMULAPATI, R. JEYA |
0054-0059 |
Download |
IJIT 2 | Analysis of Queue management Techniques in Ad-hoc networks Authors:V. Bala Murali, R. Mynuddin Sulthani |
0060-0065 |
Download |
IJIT 3 | AN IMPROVISED SECURITY FOR CLOUD COMPUTING Authors:K.VENKATA NARASA RAJU, Dr.D.MALATHI |
0066-0070 |
Download |
IJIT 4 | AN ON- CHIP DELAY MEASUREMENT TECHNIQUE USING SIGNATURE REGISTERS FOR SMALL- DELAY DEFECT DETECTION Authors:LAVANYA.MADDUKURI, PADMAJA |
0071-0075 |
Download |