Sr. NoTitleAuthorDownload
1Web Log Analysis Using Web Usage MiningMiss. Monica B. Shinde.
2Web Log Analysis Using Web Usage MiningMiss. Monica B. Shinde
3Detection of SQL Injection Attacks in WebapplicationsMiss. Prerana B. Shewale
4Detection of SQL Injection Attacks in WebapplicationsMiss. Prerana B. Shewale
5Techniques of Removing Rough Access Points From WLANMiss. Priya M. Khairnar