Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trust worth entity in an electronic communication there are several different techniques to control phishing, including legislation and technology created specifically to protect against phishing. This project provides...
 In WSN network there is Cyber Attack occurs are one of the most common and most dangerous attacks among cybercrimes. The aim of these attacks is to steal the information used by individuals and organizations to conduct transactions. Phishing websites contain various hints among their contents and web browser-based information. The purpose of this s...
 Film theft has such a profound impact on a wide range of economy that it is a crime in almost all countries. One major source of the movie piracy is camcorder piracy i.e., movies are recorded by portable devices inside theaters and then sold on internet and grey markets. Different techniques and strategies are explored to overcome the problem and s...
 This paper presents a technique for secret communication using Cryptography and Steganography. In this paper, the secret message of different size is hidden into an image for making the system more secure. The only authorized users can hide and extract the secret message. The secret messages of different size are used to test the system and the sys...
 A united and automated fault management platform for heterogeneous optical networks is quite important for telecom operators to monitor and respond to various levels of network events. In this demo, we are demonstrating the details of the design, implementation and evaluation of the proposed Optical router platform while targeting to manage the und...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp