• Publications
  • Influence
Intrusion Detection and Data Recovery using Log Mining
Number of resources are invested by organizations in securing information from intruders. In case of an intrusion, without a reliable data recovery system the company will face losses. The existingExpand
A Multimedia Interactive System
In today’s world communication devices reduce distance between people . Everyone needs devices for easy interaction with world. There are lots of multimedia devices such as mobile phones, web cam,Expand