S. K. Shrivastav

Learn More
Web application has various input functions which are susceptible to SQL-Injection attack. SQL-Injection occurs by injecting suspicious code or data fragments in a web application.Personal information disclosure ,loss of authenticity, data theft and site fishing falls under this attack category. It is impossible to check original data code and suspicious(More)
The International Commission on Radiation Units and Measurements (ICRU), in its Report-38, has given certain recommendations regarding the specifications of bladder and rectal reference points in the intracavitary treatment of carcinoma of the cervix. Conforming to this report, 182 intracavitary applications performed in stage I and II cervix cases were(More)
Wi-Fi is an emerging and low cost technology in the present scenario for finding the location inside the buildings, shops, malls, organizations, airports, etc. In this paper we develop location based network surveillance system inside organizations. The experimental results show that the RF Finger-printing method is more accurate as compared to the(More)
  • 1