International Journal of Advance and Innovative Research Volume 6, Issue 1 (XXXIV): January – March 2019 Conference Special (NCCFI) |
||
---|---|---|
Sr. No | Contents | Page No |
1 | CYBERCITY AS MILITARY ARENA Dr. Anjum A.Tadvi |
1 – 3 |
2 | CYBER TERRORISM: INDIAN PERSPECTIVE PROBLEMS, ISSUES AND STRATEGIES Adv. Arun Ramchandra Gaikwad |
4 – 9 |
3 | BLUETOOTH TECHNOLOGY & HACKING THREATS! Ramesh Ogania and Dr. Leena Sarkar |
10 – 13 |
4 | Forensic Investigation of Drone Needa Ashraf Petkar |
14 – 18 |
5 | SOCIAL MEDIA FORENSICS WITH MOBILE FORENSICS Manali Dhanawade |
19 – 27 |
6 | TECHNIQUES USED FOR DATABASE SECURITY Anindita Ghosh |
28 – 33 |
7 | SOCIAL MEDIA Intelligence AND INVESTIGATION Mamta Deepak Pandey |
34 – 36 |
8 | FIGHTING DATA GLUT WITH FILE SYSTEM ANALYSIS Puneet Gawali |
37 – 43 |
9 | SOCIAL MEDIA FORENSIC AND INVESTIGATION Vallari Pramod Tawade |
44 – 46 |
10 | SOCIAL MEDIA INTELLIGENCE AND INVESTIGATION Amit Jaynath Upadhyay |
47 – 50 |
11 | A SURVEY ON COMPUTER FORENSIC ANALYSIS AND INVESTIGATION ON COMPUTER EVIDENCES Renukadevi C and Jagadevi Gudda |
51 – 53 |
12 | PROTECTING WEB APPLICATION’S VULNERABILITIES FROM SQL INJECTION ATTACK Sadaf Shaikh and Ujwala Sav |
54 – 60 |
13 | A perspective on mass surveillence of a smart city in india based on INTERNET OF THINGS (IoT) Arti Gavas |
61 – 64 |
14 | IOT BASED SMART AUTOMATION USING DRONES & HOME MONITORING OWL Pinki Pandey |
65 – 70 |
15 | THE NEED OF RESPONSIBLE AND ETHICAL FRAMEWORK IN ORDER TO USE SOCIALMEDIA INTELLIGENCE FOR BETTERMENT OF MANKIND Amey Patankar |
71 – 73 |
16 | GDPR IMPACT ON INDIA Saili Parab, Aditi Mestry and Sanika More |
74 – 76 |
17 | DIVING INTO DARK WEB Mustufa Nullwala and Dr. Leena Sarkar |
77 – 79 |
18 | DARKWEB FORENSICS INVESTIGATION Tushar P. Jadhav |
80 – 83 |
19 | DARKWEB: THE DARKER SIDE OF INTERNET Nivedita Tiwari |
84 – 87 |
20 | CYBER SECURITY AND ITS impact AT THE WORKPLACE Dr. B. Jyoti |
88 – 89 |
21 | REVIEW OF E-GOVERNANCE POLICIES AND ITS SECURITY ISSUES Dr. Swati Vitkar and Dhanraj Jadhav |
90 – 95 |
22 | CYBER SECURITY SHOWCASE: AN APPLICATION APPROACH Rupali Phatak |
96 – 99 |
23 | HUMAN RIGHTS IN CYBER WORLD Prajakta Amit Patil |
100 – 103 |
24 | INTELLECTUAL PROTECTION IN DATABASE MANAGEMENT SYSTEMS Varsha Kshirsagar |
104 – 106 |
25 | ISSUES OF DEEP AND DARKWEB -REVIEW Nilesh Prajapati |
107 – 110 |
26 | OVERCOMING THE ISSUES IN DIGITAL FORENSIC AND INTERNET OF THINGS Sharayu Mahesh Kadam |
111 – 115 |
27 | Review Study on CYBER Intelligence AND CYBER FORENSIC INVESGATION Raj M. Kittur |
116 – 120 |
28 | MALWARE INVESTIGATION AND ANALYSIS Sunitha Joshi |
121 – 126 |
29 | MALWARE ANALYSIS & SECURITY Ashwini Deshpande |
127 – 130 |
30 | STUDY AND ANALYSIS OF SECURITY FEATURES IN MALWARE Ashwini Bhatkar |
131 – 134 |
31 | CRYPTO CURRENCIES FORENSICS INVESTIGATION Mustufa Nullwala |
135 – 139 |
32 | FILE STRUCTURE FORENSIC PLUS INVESTIGATION Archana Ravindra Sanap |
140 – 142 |
33 | CLOUD FORENSIC INVESTIGATION: NEW INVESTIGATION TREND Shweta Pawar |
143 – 146 |
34 | IOT AND DRONE FORENSICS INVESTIGATIONS Priyadarshini Chettiar |
147 – 150 |
35 | DRONE FORENSICS INVESTIGATION: A SENSOR DEVICE Pallavi Raut |
151 – 155 |
36 | AI IN CYBER FORENSICS AND INVESTIGATION Sarita Sarang |
156 – 158 |
36 | CYBER FORENSICS AND INVESTIGATION Sameer More and Purvesh Mokashi |
159 – 161 |
37 | A STUDY ON CYBER LAW’S AND CYBER CRIME W.R.T INFORMATION TECHNOLOGY Shraddha Prasad Kokate and Dr. Pradhnya M Wankhade |
162 – 166 |
38 | CYBER CRIME & CRIMINAL LAW Chinmayi S. Vaidya | 167 – 169 |
39 | CYBER THREAT FOR SMARTPHONE’S Avanish Vishwakarma |
170 – 172 |
40 | CYBER LAWS AND CRIMES IN INTERNET TODAY Pooja R. Dhumal |
173 – 176 |
41 | CYBER LAW Anjali R. Prajapati and Sonal S. Pophale |
177 – 179 |
42 | IPR IN CYBER WORLD Smritigandha M. Bidkar |
180 – 181 |
43 | AN ANALYSIS OF CYBER & TECHNOLOGY RELATED BANKING FRAUDS AND CRIMES Sneha Anil Kumar and Purba Ganguly |
182 – 186 |
44 | AN INTRODUCTION OF SOCIAL NETWORKING PLATFORMS AND RELATED CRIMES Rekha Madhukar Jagtap |
187 – 191 |
45 | CYBER TERRORISM & CYBER WARFARE Jayesh S. Patil |
192 – 195 |
46 | CYBER TERRORISM: A GLOBAL THREAT Dhanraj Jadhav and Dr. Swati Vitkar |
196 – 200 |
47 | SECURITY ISSUES AND CHALLENGES IN WIRELESS SENSOR NETWORK Janhavi Kshirsagar |
201 – 206 |
48 | HUMAN RIGHTS UNAWARENESS AND VIOLATION IN CYBERSPACE IN INDIA UNDER HUMAN RIGHTS IN CYBER WORLD Satanuka Sinha |
207 – 208 |
49 | CYBER LAW – “REVIEW OF IPR IN CYBER WORLD” Ashwini Amit Gangal |
209 – 213 |
50 | Cyber Terrorism, Cyber Warfare and its Security Measures Gaurav Sanjay Ghadge |
214 – 219 |
51 | USER PERCEPTION ON MOBILE DEVICE SECURITY AWARENESS WITH SPECIAL REFERENCE TO THANE DISTRICT (MUMBAI) Divya J. Gautam |
220 – 224 |
52 | DATABASE SECURITY AND PROTECTION METHODS AGAINST ATTACKS Anuradha Chaukate |
225 – 227 |
53 | DATABASE SECURITY USING BLOCK CHAIN Bhagyashri Kulkarni |
228 – 230 |
54 | MOBILE DEVICE SECURITY Sunita B. Rai |
231 – 234 |
55 | TO STUDY THE CYBER SECURITY AND SOLUTIONS Manjushree Yewale |
235 – 239 |
56 | SECURITY ASPECTS IN MOBILE DEVICES Monica V. Parad |
240 – 242 |
57 | MOBILE DEVICE SECURITY Madhuri D. Gabhane | 243 – 248 |
58 | NEED OF CYBER SECURITY IN TODAY’S MODERN AGE Yogita Y. Sawant |
249 – 251 |
59 | ISSUES IN DATABASE SECURITY Nitin N. Kawle and Vinay D. Jadhav |
252 – 255 |
60 | CYBER SECURITY Sayli Rajaram, Kadam and Mansi Ajit Madhavi |
256 – 258 |
61 | SECURITY APPROACHES APPLICABLE FOR MOBILE DEVICES Sanjivani Nalkar |
259 – 262 |
62 | SECURITY MEASURES IN MOBILE DEVICES Tanvi Bhatkar |
263 – 265 |
63 | USAGE OF SMART PHONES AND ITS SECURITY ISSUES IN TODAY’S WORLD Rajshree N. Pisal |
266 – 268 |
64 | CYBER SECURITY WITH WIRELESS SECURITY Karishma S. Bhosale |
269 – 272 |
65 | SECURITY TECHNIQUE TO SECURE WIRELESS NETWORK Kajal M. Singh |
273 – 276 |
66 | A Brief Study on Mobile Device Security Deepali Gupta |
277 – 279 |
67 | NETWORK SECURITY Prashant Khot |
280 – 282 |
68 | IMPLICATIONS OF SOCIAL MEDIA ON DATA SECURITY IN THE AGE OF INTERNET Nrupura R. Dixit |
283 – 286 |
69 | APPROACHES APPLICABLE FOR WIRELESS SECURITY Swapna Thakare |
287 – 288 |
70 | A TOUR ON WIRELESS SECURITY TECHNIQUES Meghal Murkute |
289 – 293 |
71 | DATABASE SECURITY –ATTACKS AND THREATS Khushi B. Patel & Preeti G. Verma |
294 – 298 |
72 | A BRIEF STUDY ON CYBER CRIME AND SECURITY Pournima Raut | 299 – 303 |
73 | BASIC CYBER FORENSIC ANALYSIS AND INVESTIGATION TECHNIQUES Roopa Rajkumar Kulkarni |
304 – 305 |
74 | INTERNET BANKING AND SAFETY ISSUES Veena M. Nirgudkar |
306 – 307 |
75 |
CYBER INTELLIGENCE, CYBER FORENSICS AND INVESTIGATION Pranita Ingale |
308 – 311 |
76 | NECESSITY OF CYBER SECURITY AWARENESS AMONG GRADUATE STUDENTS: A CASE STUDY OF BHARATI VIDYAPEETH NAVI MUMBAI Prof. Abhijit S Desai and Prof. Manish Kumar Dubey |
312 – 315 |
77 | REVIEW OF IOT FORENSIC INVESTIGATION Amit Gangal |
316 – 318 |
78 | ADVANCE FORENSIC INVESTIGATION Pallavi V. Deshmukh and Shakuntala P. Kulkarni |
319 - 321 |