| Issue | Title | |
| Vol 10, No 3 (2022) | A Comparative Study About Cyberattacks and Cybersecurity in Real World | Abstract |
| Dhaval Chudasama, Ruchika Dungarani | ||
| Vol 11, No 1 (2023) | A Decrease in the Encryption Latency Utilizing Transport Layer Protocols for Software Defined Networks | Abstract |
| Muhammad Saddheer, Waqas Ahmad, Muhammad Nadeem, Syeda Wajiha Zahra, Ali Arshad, Saman Riaz | ||
| Vol 9, No 2 (2021) | A General Understanding using Facts, Case Studies, and a Survey on Distributed Denial-of-Service Attacks | Abstract |
| Aditi Neema, Aditi Thakur | ||
| Vol 11, No 2 (2023) | A Latest Approach for Crime Rate Prediction and Analysis by Using the Clustering and Machine Learning Algorithm | Abstract |
| A. Ananda Kumar, K. Ramanan, M. Santhosh Prakash, P. M. Sivaraja | ||
| Vol 5, No 3 (2017) | A Review on AODV Protocol and Various Attacks in Mobile Ad Hoc Network | Abstract |
| Saurabh Garg, Krishna Kumar Joshi | ||
| Vol 9, No 1 (2021) | A Review on CAPTCHAs in Use with Focus on Their Existing Vulnerabilities Concerning Web Security | Abstract |
| Dayanand *, Wilson Jeberson | ||
| Vol 9, No 3 (2021) | A Review Paper on Cyber Security with Data Security in Cloud Computing | Abstract |
| Gopal Krishn Tholambia, Neeraj Bhardwaj | ||
| Vol 6, No 3 (2018) | A Study on Energy Efficient Coverage Aware Clustering Protocols in Wireless Sensor Networks | Abstract |
| Amandeep Kaur Sohal, A. K. Sharma, N. Sood | ||
| Vol 6, No 1 (2018) | A Survey on Congestion Control in Mobile in Mobile Ad Hoc Network | Abstract |
| Pooja Tripathi, Krishna Kumar Joshi | ||
| Vol 10, No 1 (2022) | Advanced Signature Verification Techniques: A Review | Abstract |
| Shivam Sharma, Yash Jain, Yagya Bharadwaj, Deepak Moud | ||
| Vol 6, No 2 (2018) | AN ACTIVE SPOOF MANAGEMENT IN AN EMAIL APPLICATION | Abstract |
| Sijimol k | ||
| Vol 10, No 3 (2022) | An Experimental Approach of Machine Learning Algorithms to Detect Botnet DDoS Attacks | Abstract |
| Voore Subrahmanyam, Vinnakota Shivani, Siraboina Prasunanju, Akula Pranay, Sanikommu Shreya Reddy | ||
| Vol 8, No 1 (2020) | An Optimal Bidding Strategy for Social Welfare Maximization of Microgrid | Abstract |
| Ankit Kumar Singh, Rajesh Panda, Prashant Kumar Tiwari | ||
| Vol 9, No 3 (2021) | Analysis of Ethical Hacking Methodology to Protect the Computer Networks | Abstract |
| E. N. Ganesh | ||
| Vol 10, No 1 (2022) | Analytical Review on Cyber Risk Management | Abstract |
| Mansora Farahmand, Bi Bi Parwana Zazai, Mohammad Salem Hamidi | ||
| Vol 10, No 2 (2022) | Anomaly Based Intrusion Detection Using Machine Learning Techniques | Abstract |
| M. Ahana Aslin, A. Meena Kowshalya | ||
| Vol 7, No 3 (2019) | APFC Unit for Industrial Power Consumption to Minimize Penalty | Abstract |
| Piyush Agrawal, Roushan Kumar Patel, Raghuraj Kumar | ||
| Vol 10, No 3 (2022) | Application of Constraint Satisfaction framework to zero trust security Model | Abstract |
| Manas Kumar Yogi, Dwarampudi Aiswarya | ||
| Vol 7, No 2 (2019) | Automated Headlight Intensity Controller and Speed Control in Vehicles | Abstract |
| S. Angeline Jenipher, P. Aswin, S. Gowsalya, C. Manjula Devi, D. Baskaran | ||
| Vol 7, No 2 (2019) | Automatic Identification of Obstacles and Crack Sensing Scheme in Rail Tracking System | Abstract |
| S. Ramachandran, G. Kaviya, S. Keerthana, S. Sivaranjani | ||
| Vol 6, No 3 (2018) | Blockchain for Cryptocurrencies – A Literature Survey | Abstract |
| Heenal Sapovadia, Adarsh Sutariya | ||
| Vol 7, No 1 (2019) | Blockchain Technology: Systematic Review of Security and Privacy Problems and Its Scope with Internet of Things (IoT) | Abstract |
| Vishal Kumar Verma | ||
| Vol 7, No 1 (2019) | Blockchain Technology: Systematic Review of Security and Privacy Problems and Its Scope with Cloud Computing | Abstract |
| Vishal Kumar Verma | ||
| Vol 5, No 3 (2017) | CBIR using Feature Extraction approaches and Application: A survey | Abstract |
| Shailja Rawat, Rajendra Kumar | ||
| Vol 6, No 1 (2018) | CHMOD LEACH: INNOVATIVE TECHNIQUE FOR CLUSTER HEAD SELECTION | Abstract |
| Abhilash Shokeen | ||
| 1 - 25 of 97 Items | 1 2 3 4 > >> | |


