1. Cognitive analytics and comparison of symmetric and asymmetric cryptography algorithms;joseph;International Journal of Advanced Research in Computer Science,2015
2. Understanding the OSI 7-layer model;neil;PC Network Advisor,2000
3. A survey of man in the middle attacks;mauro;IEEE Communications Surveys & Tutorials,2016
4. Development Authentication and Authorization Systems of Multi Information Systems Based REst API and Auth Token
5. Hybrid IDS using SVM classifier for detecting DoS attack in MANET application;vijin;2017 International Conference on I-SMAC (IoT in Social Mobile Analytics and Cloud) (I-SMAC) I-SMAC,2017