[1] A.Sankara Narayanan, M.Syed Khaja Mohideen, and M. Chithik Raja: IPv6 Tunneling Over IPv4,International
Journal of Computer Science Issues (IJCSI), Vol. 9, Issue 2, No 2, March 2012,
pp. 599-604, ISSN (Online): 1694-0814, Mauritius.
(Impact Factor 0.242)
[2] A.Sankara Narayanan, and M.Mohamed
Ashik: Malware Incident Handling,
UACEE International Journal of Advances in Computer Networks and Security
(UACEE-IJCNS), Vol.2, Issue 1, 25 April 2012, pp. 7-12, ISSN (Online):
2250-3757, India.
[3] A.Sankara
Narayanan, M.Syed Khaja Mohideen, and M.Mohamed Ashik: Patch Management and
Analysing Strategy for Microsoft Bulletin Security, International
Journal of Computer Engineering &Technology (IJCET), Vol.3,Issue 1, Jan-Jun
2012, pp. 250-257, ISSN (Online): 0976-6375, India. (Impact Factor
1.0425)
[4] A.Sankara Narayanan, and M.Mohamed Ashik, Remote File Inclusion and Countermeasures: International Journal of
Computer Science and Information Security (IJCSIS), Vol. 10, No.4, April 2012,
pp. 46-49, ISSN (Online): 1947-5500, U.S.
[5] A.Sankara Narayanan, M.Mohamed Ashik.,
and N. Mohamed Yasin, Homograph Attack
and Confusability: Research Journal of Computer System Engineering (RJCSE),
Vol. 03, Issue 01, Jan-Apr 2012, pp. 333-336, ISSN (Online): 2230-8563, India.
[6] A.Sankara
Narayanan, and M.Mohamed Ashik, Open
Source Tools for Security Assessment: International Journal of Advanced
Research in Computer Science and Electronics Engineering (IJARCSEE), Vol. 01,
No.3, May 2012, pp. 21-26, ISSN (Online): 2277-9043, India.
[7] A.Sankara Narayanan, Bypassing Antivirus with
Crypters: International Journal of Computational Intelligence and
Information Security (IJCIIS), Vol. 03, No.5, May 2012, pp. 18-24, ISSN
(Online): 1837-7823, Australia. http://www.scribd.com/doc/95379416/Paper-3-Bypassing-Antivirus-With-Crypters
[8] A.Sankara Narayanan, A
Study on Overview of Steganography with Specific Tools: International
Journal of Advanced Research in Computer Engineering & Technology (IJARCET),
Vol.01, Issue 04, June 2012, pp. 16-21, ISSN (Online): 2278-1323, India. http://ijarcet.org/index.php/ijarcet/article/view/93
[9] A.Sankara Narayanan,
Chrome RLZ and Unknown Features: International Journal of Computer
Applications (IJCA), Vol.48, No.16, June 2012, pp. 49-52, ISBN (Online): 973-93-80869-10-5, U.S. (Impact Factor 0.814) http://research.ijcaonline.org/volume48/number16/pxc3880510.pdf
[10] A.Sankara Narayanan, QR
Codes and Security Solutions: International Journal of Computer Science and
Telecommunications (IJCST), Vol.03, Issue 07, July 2012, pp. 69-72, ISSN
(Online): 2047-3338,U.K. http://www.ijcst.org/Volume3/Issue7/p13_3_7.pdf
[11] A.Sankara
Narayanan, and M.Mohamed Ashik, Computer Forensic First Responder Tools:
IEEE’s Xplore Digital Library .
[12] A.Sankara Narayanan, Clickjacking
Vulnerability and Countermeasures: International Journal of Applied Information
Systems (IJAIS), Vol.04, No.07, Dec 2012, pp. 07-10, ISSN
(Online): 2249-0868, U.S. http://www.ijais.org/archives/volume4/number7/368-0793
your blog gives information security blog
ReplyDeleteRF Post processing