Institutional Online Repository
Discipline : Cyber Forensic

Title Authors Year of Publication  Category
. “Tracking back IP packets to their sources” Khan, M, Kumar, R, Kumar C., & Gupta A.K. 2011 Abstract
“Tracking back IP packets to their sources” Khan, M, Kumar, R, Kumar C., & Gupta A.K. 2011 Abstract
An Overview of Steganography for the Computer Forensics Examiner Pragya Rashmi, Nitu Pandey 2011 Abstract
An Overview of Steganography for the Computer Forensics Examiner Pragya Rashmi, Nitu Pandey 2011 Abstract
Application of honey pots to trap hackers Alam, M., Kesharwani, M., Mishra, M.K. 2011 Abstract
Application of honey pots to trap hackers Alam, M., Kesharwani, M., Mishra, M.K. 2011 Abstract
Digital Forensics: The Need for Standardization and Certification Priyanka Mishra* Ranjeet Kumar Nigam* Dr. N.P.Waghmare** and Prof.(Dr.)A.K. Gupta* 2011 Abstract
Digital Forensics: The Need for Standardization and Certification Priyanka Mishra* Ranjeet Kumar Nigam* Dr. N.P.Waghmare** and Prof.(Dr.)A.K. Gupta* 2011 Abstract
Email tracing by using e-mail tracker pro Khan, M., Saran V 2011 Abstract
Email tracing by using e-mail tracker pro Khan, M., Saran V 2011 Abstract
Ethical hacking a countermeasure for hacking Sarveshttam Kumar*, Dr. A. K. Gupta** 2011 Abstract
Ethical hacking a countermeasure for hacking Sarveshttam Kumar*, Dr. A. K. Gupta** 2011 Abstract
Ethical hacking countermeasures for hacking Kumar S., Gupta A.K. 2011 Abstract
Ethical hacking countermeasures for hacking Kumar S., Gupta A.K. 2011 Abstract
Forensic analysis of skimming devices for credit card fraud detection Gupta, S., Kushwaha, D., & Kesharwani L 2011 Abstract
Forensic analysis of skimming devices for credit card fraud detection Gupta, S., Kushwaha, D., & Kesharwani L 2011 Abstract
Hacking to prevent Hacking: the need of Ethical Hackers Rajeev Kumar*, Dr. A. K. Gupta **, Suneet Kumar * 2011 Abstract
Hacking to prevent Hacking: the need of Ethical Hackers Rajeev Kumar*, Dr. A. K. Gupta **, Suneet Kumar * 2011 Abstract
Mobile device analysis: a tool for forensic investigation Amarnath Mishra 2011 Abstract
Mobile device analysis: a tool for forensic investigation Amarnath Mishra 2011 Abstract
Monitoring and Forensic analysis of Windows XP Registry Vaibhav Saran*, Dr. Syeed Ahmed**, Er. Ankit Verma*** 2011 Abstract
Monitoring and Forensic analysis of Windows XP Registry Vaibhav Saran*, Dr. Syeed Ahmed**, Er. Ankit Verma*** 2011 Abstract
New Era of Biometrics, Saran Vaibhav, Pandey R., Kumar S., & Kumar R. 2010 Research Paper
New Era of Biometrics, Saran Vaibhav, Pandey R., Kumar S., & Kumar R. 2010 Research Paper
Patch and Vulnerability Management: A key to prevention Suneet Kumar1, Vaibhav Saran2, Dr. A. K. Gupta3 2011 Abstract
Patch and Vulnerability Management: A key to prevention Suneet Kumar1, Vaibhav Saran2, Dr. A. K. Gupta3 2011 Abstract
Phishing” Kahnna, S., Purshottam A., Fatma, A, & Gupta A. K. 2011 Abstract
Phishing” Kahnna, S., Purshottam A., Fatma, A, & Gupta A. K. 2011 Abstract
Risk associated with e-banking & Risk management Richa Dwivedi, Vijayshree Singh 2011 Abstract
Risk associated with e-banking & Risk management Richa Dwivedi, Vijayshree Singh 2011 Abstract
The effectiveness of tools for micro Secure Digital (SD) memory card forensics Ashu Kumar Jha, Stalin Kumar Biswal and Vaibhav Saran 2011 Abstract
The effectiveness of tools for micro secure digital (SD) memory card forensics Jha, A., Biswal, S., & Saran V 2011 Abstract
The effectiveness of tools for micro Secure Digital (SD) memory card forensics Ashu Kumar Jha, Stalin Kumar Biswal and Vaibhav Saran 2011 Abstract
The effectiveness of tools for micro secure digital (SD) memory card forensics Jha, A., Biswal, S., & Saran V 2011 Abstract
Tracing back IP packets to their sources Md. Matloob Raza Khan, Chandan Kumar, Rajeev Kumar, Dr. A.K. 2011 Abstract
Tracing back IP packets to their sources Md. Matloob Raza Khan, Chandan Kumar, Rajeev Kumar, Dr. A.K. 2011 Abstract