Legacy Authentication Methods Preventing Key logging Attacks Journal title: International Journal of Science Engineering and Advance Technology Authors: M.Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India, K.... Subject(s): Engineering, Medicine, Social Sciences, Pharmacy
Novel Visual Authentication Protocols to Defend Key Logging Issues Journal title: International Journal of Science Engineering and Advance Technology Authors: Chava Niharika| M.Tech (CSE), MVR College of Engineering and Technology, A.P., India, N. Madhu Bindu... Subject(s): Engineering, Medicine, Social Sciences, Pharmacy
Key logging Prevention by QR code with Visual Authentication Journal title: International Journal of Science Engineering and Advance Technology Authors: Kodiyala Devi Sireesha| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: siree... Subject(s): Engineering, Medicine, Social Sciences, Pharmacy
Spyware Detection Using Data Mining Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Karishma Pandey, Madhura Naik, Junaid Qamar, Mahendra Patil Subject(s): Engineering, Applied Linguistics
Secure Internet Banking With Visual Authentication Protocols Journal title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) Authors: Vishrut Sharma, C Jawahar Sandeep, Nikhil Katariya, Aruna. P Subject(s): Engineering, Applied Linguistics
An Improved Security Approach For User authentication Journal title: International Journal of Research in Computer and Communication Technology Authors: B. Suresh, R. Sailaja Subject(s): Computer and Information Science, Telecommunications
Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems Journal title: International Journal of Computer & organization Trends(IJCOT) Authors: Subject(s):
Detection of Malicious Obfuscated Code in Websites Using its Characteristics. Journal title: Jaunųjų mokslininkų darbai Authors: Linas Ladyga, Jonas Juknius Subject(s):
Securing Server System from Buffer Overflow vulnerability using Vel-Alagar Algorithm Journal title: INTERNATIONAL JOURNAL OF MATHEMATICS TRENDS AND TECHNOLOGY Authors: *P.VADIVELMURUGAN #K.ALAGARSAMY Subject(s):
Data Mining Techniques for Computer Virus Detection Journal title: International Journal of Engineering Sciences & Research Technology Authors: Ankur Singh Bist Subject(s):
Efficient Prediction of Cross-Site Scripting Web Pages using Extreme Learning Machine Journal title: International Journal of Computer Science & Engineering Technology Authors: S.Krishnaveni , K.Sathiyakumari Subject(s):
Malicious Code Detection through Data Mining Techniques Journal title: International Journal of Computer Science & Engineering Technology Authors: Ms. Milan Jain , Ms. Punam Bajaj Subject(s):
Spyware Detection Using Data Mining Journal title: International Journal of Engineering and Techniques Authors: Subject(s):
QR-Based OTP Authentication to Prevent Keylogging Journal title: IJAR-Indian Journal of Applied Research Authors: R .Divya, T. Sennila Subject(s):