

Table of Contents
Articles
Threat Modeling- A Survey |
PDF
![]() |
Pooja Lahoti, Pragya Shukla | 63-65 |
A Unique Solution for Clickjacking Attack Using Regex Based Code Crawler |
PDF
![]() |
Dr. B. V. Ramaraju, S. Suganya | 66-69 |
Privacy Preserving Firewall Optimization Over Cross Domains |
PDF
![]() |
J. Dhyaneshwaran, S. Saravanakumar, N. Selvaraj, S. Arulbalamurugan | 70-73 |
Reduction of Test Data Volume Based On Viterbi Compression Algorithm |
PDF
![]() |
K.S. Neelukumari, A. Pavithra, N. Saranya, S. Vanitha | 74-79 |
High Speed Floating Point Multiplier |
PDF
![]() |
P. Karthika Rani, S. Ramya, V. Saranya, N. Priya | 80-83 |
Efficient Layout of Fredkin Gate with Minimized Area Methodologies |
PDF
![]() |
P. Anusuya, M. Arunmozhi Devi | 84-88 |
BITSTREAMS Compression of RLE with Bitstuffing |
PDF
![]() |
J. Satheesh Kumar, G. Saravana Kumar, R.S. Madhunica, K. Prakash, E. Deepa, K. Rajesh | 89-91 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9632