Sr. NoTitleAuthorDownload
1Web Log Analysis Using Web Usage MiningMiss. Monica B. Shinde.
2Detection of SQL Injection Attacks in WebapplicationsMiss. Prerana B. Shewale
3Techniques of Removing Rough Access Points From WLANMiss. Priya M. Khairnar