A Comparison Study of Open Source Penetration Testing Tools IJTSRD
Penetration testing also known as Pen Test is a series of activities which is performed by authorized simulated attack on computer system, network or web application to find vulnerabilities that an attacker could exploit. It helps confirm the efficiency and effectiveness of the various security measures that have been implemented. In the world of Open […]
Li-Fi Security Issues and its Measures IJTSRD
As we see in today’s world, all institutes as well as organizations are planning to shrink the size hardware and are even trying to make it portable, olden days we had local area network wires to transmit data over devices then came in Wi-Fi which didn’t have wires but was able to transmit data over […]
Coexistence of Zigbee and Wi Fi Networks in Machine to Machine Home System IJTSRD
The possibility for the home to be networked wirelessly has greatly improved because of emerging technologies. Home networking is very much possible now with the different technologies that are available. This project is an application of two wireless technologies to machine to machine M2M home networking coexisting together. The networking technologies used and evaluated in […]
Implementing the Structural Hole Theory to Analyze Academic Networks in Tertiary Institutions IJTSRD
Social network analysis (SNA) is the technique of performing analytics on data found in social environmental circles to understand the relationships and structures of underlying network. With the alarming rise of social media, many different concepts have been brought about through the behavior of people within these network. Of great confusion was how to identify […]
Rumour Source Identification in Network IJTSRD
Identification of rumour sources in a network plays a critical role in limiting the damage caused by them through the timely quarantine of the sources. However, the temporal variation in the topology of networks and the ongoing dynamic processes challenge our traditional source identification techniques that are considered in static networks. Reduction of the time-varying […]