Information Sharing of Cyber Threat Intelligence with their Issue and Challenges ijtsrd
Today threat landscape growing at the rapid rate with much organization continuously face complex and malicious cyber threats. In today’s Internet connected world where technologies support almost every feature of our society, cyber security and forensic specialists are increasingly distributing with wide ranging cyber threats in almost. real time conditions. The capability to detect, analyze, […]
Review Paper on LSB Based Stegnography to Enhance Image Security IJTSRD
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the […]
Provocations Open Problems Encountered By Digital Forensics Ensuing Trends in Near Future IJTSRD
There has been a substantial and extensive use of Internet and technology in present day life which relatively has made the digital devices apropos to criminal investigations or legal prosecutions. Investigating huge amount of digital evidence consisting of data in various formats requires a digital forensic analysis (or cyber forensics). As the number of cases […]
Review on Improved Method for Supporting Privacy Protection in Personalized Web Search IJTSRD
Customized web inquiry has meant its achievement in enhancing the evaluation of distinctive pursuit administrations on the web. The verification uncovers that client’s unwillingness to tell their own data amid hunt has turns into a noteworthy blockade for the wide develop of PWS. In this we think about private security in PWS applications that representation […]
Review on Various Security Attacks in Ad-Hoc Networks IJTSRD
Importance of security in ad-hoc networks is increasing due to a tremendous boon in mobile equipment usage. Due to the characteristic of ad hoc network being decentralized, wireless and infrastructure-less makes it vulnerable to various attacks that cause disruption in the network. In order to provide possible security measures to handle the malicious activity in […]