|
Issue |
Title |
|
Vol 10, No 3 (2022) |
A Comparative Study About Cyberattacks and Cybersecurity in Real World |
Abstract
|
Dhaval Chudasama, Ruchika Dungarani |
|
Vol 11, No 1 (2023) |
A Decrease in the Encryption Latency Utilizing Transport Layer Protocols for Software Defined Networks |
Abstract
|
Muhammad Saddheer, Waqas Ahmad, Muhammad Nadeem, Syeda Wajiha Zahra, Ali Arshad, Saman Riaz |
|
Vol 9, No 2 (2021) |
A General Understanding using Facts, Case Studies, and a Survey on Distributed Denial-of-Service Attacks |
Abstract
|
Aditi Neema, Aditi Thakur |
|
Vol 11, No 2 (2023) |
A Latest Approach for Crime Rate Prediction and Analysis by Using the Clustering and Machine Learning Algorithm |
Abstract
|
A. Ananda Kumar, K. Ramanan, M. Santhosh Prakash, P. M. Sivaraja |
|
Vol 5, No 3 (2017) |
A Review on AODV Protocol and Various Attacks in Mobile Ad Hoc Network |
Abstract
|
Saurabh Garg, Krishna Kumar Joshi |
|
Vol 9, No 1 (2021) |
A Review on CAPTCHAs in Use with Focus on Their Existing Vulnerabilities Concerning Web Security |
Abstract
|
Dayanand *, Wilson Jeberson |
|
Vol 9, No 3 (2021) |
A Review Paper on Cyber Security with Data Security in Cloud Computing |
Abstract
|
Gopal Krishn Tholambia, Neeraj Bhardwaj |
|
Vol 6, No 3 (2018) |
A Study on Energy Efficient Coverage Aware Clustering Protocols in Wireless Sensor Networks |
Abstract
|
Amandeep Kaur Sohal, A. K. Sharma, N. Sood |
|
Vol 6, No 1 (2018) |
A Survey on Congestion Control in Mobile in Mobile Ad Hoc Network |
Abstract
|
Pooja Tripathi, Krishna Kumar Joshi |
|
Vol 10, No 1 (2022) |
Advanced Signature Verification Techniques: A Review |
Abstract
|
Shivam Sharma, Yash Jain, Yagya Bharadwaj, Deepak Moud |
|
Vol 6, No 2 (2018) |
AN ACTIVE SPOOF MANAGEMENT IN AN EMAIL APPLICATION |
Abstract
|
Sijimol k |
|
Vol 10, No 3 (2022) |
An Experimental Approach of Machine Learning Algorithms to Detect Botnet DDoS Attacks |
Abstract
|
Voore Subrahmanyam, Vinnakota Shivani, Siraboina Prasunanju, Akula Pranay, Sanikommu Shreya Reddy |
|
Vol 8, No 1 (2020) |
An Optimal Bidding Strategy for Social Welfare Maximization of Microgrid |
Abstract
|
Ankit Kumar Singh, Rajesh Panda, Prashant Kumar Tiwari |
|
Vol 9, No 3 (2021) |
Analysis of Ethical Hacking Methodology to Protect the Computer Networks |
Abstract
|
E. N. Ganesh |
|
Vol 10, No 1 (2022) |
Analytical Review on Cyber Risk Management |
Abstract
|
Mansora Farahmand, Bi Bi Parwana Zazai, Mohammad Salem Hamidi |
|
Vol 10, No 2 (2022) |
Anomaly Based Intrusion Detection Using Machine Learning Techniques |
Abstract
|
M. Ahana Aslin, A. Meena Kowshalya |
|
Vol 7, No 3 (2019) |
APFC Unit for Industrial Power Consumption to Minimize Penalty |
Abstract
|
Piyush Agrawal, Roushan Kumar Patel, Raghuraj Kumar |
|
Vol 10, No 3 (2022) |
Application of Constraint Satisfaction framework to zero trust security Model |
Abstract
|
Manas Kumar Yogi, Dwarampudi Aiswarya |
|
Vol 7, No 2 (2019) |
Automated Headlight Intensity Controller and Speed Control in Vehicles |
Abstract
|
S. Angeline Jenipher, P. Aswin, S. Gowsalya, C. Manjula Devi, D. Baskaran |
|
Vol 7, No 2 (2019) |
Automatic Identification of Obstacles and Crack Sensing Scheme in Rail Tracking System |
Abstract
|
S. Ramachandran, G. Kaviya, S. Keerthana, S. Sivaranjani |
|
Vol 6, No 3 (2018) |
Blockchain for Cryptocurrencies – A Literature Survey |
Abstract
|
Heenal Sapovadia, Adarsh Sutariya |
|
Vol 7, No 1 (2019) |
Blockchain Technology: Systematic Review of Security and Privacy Problems and Its Scope with Internet of Things (IoT) |
Abstract
|
Vishal Kumar Verma |
|
Vol 7, No 1 (2019) |
Blockchain Technology: Systematic Review of Security and Privacy Problems and Its Scope with Cloud Computing |
Abstract
|
Vishal Kumar Verma |
|
Vol 5, No 3 (2017) |
CBIR using Feature Extraction approaches and Application: A survey |
Abstract
|
Shailja Rawat, Rajendra Kumar |
|
Vol 6, No 1 (2018) |
CHMOD LEACH: INNOVATIVE TECHNIQUE FOR CLUSTER HEAD SELECTION |
Abstract
|
Abhilash Shokeen |
|
1 - 25 of 92 Items |
1 2 3 4 > >> |