Browse Title Index

Issue Title
Vol 10, No 3 (2022) A Comparative Study About Cyberattacks and Cybersecurity in Real World Abstract
Dhaval Chudasama, Ruchika Dungarani
Vol 11, No 1 (2023) A Decrease in the Encryption Latency Utilizing Transport Layer Protocols for Software Defined Networks Abstract
Muhammad Saddheer, Waqas Ahmad, Muhammad Nadeem, Syeda Wajiha Zahra, Ali Arshad, Saman Riaz
Vol 9, No 2 (2021) A General Understanding using Facts, Case Studies, and a Survey on Distributed Denial-of-Service Attacks Abstract
Aditi Neema, Aditi Thakur
Vol 11, No 2 (2023) A Latest Approach for Crime Rate Prediction and Analysis by Using the Clustering and Machine Learning Algorithm Abstract
A. Ananda Kumar, K. Ramanan, M. Santhosh Prakash, P. M. Sivaraja
Vol 5, No 3 (2017) A Review on AODV Protocol and Various Attacks in Mobile Ad Hoc Network Abstract
Saurabh Garg, Krishna Kumar Joshi
Vol 9, No 1 (2021) A Review on CAPTCHAs in Use with Focus on Their Existing Vulnerabilities Concerning Web Security Abstract
Dayanand *, Wilson Jeberson
Vol 9, No 3 (2021) A Review Paper on Cyber Security with Data Security in Cloud Computing Abstract
Gopal Krishn Tholambia, Neeraj Bhardwaj
Vol 6, No 3 (2018) A Study on Energy Efficient Coverage Aware Clustering Protocols in Wireless Sensor Networks Abstract
Amandeep Kaur Sohal, A. K. Sharma, N. Sood
Vol 6, No 1 (2018) A Survey on Congestion Control in Mobile in Mobile Ad Hoc Network Abstract
Pooja Tripathi, Krishna Kumar Joshi
Vol 10, No 1 (2022) Advanced Signature Verification Techniques: A Review Abstract
Shivam Sharma, Yash Jain, Yagya Bharadwaj, Deepak Moud
Sijimol k
Vol 10, No 3 (2022) An Experimental Approach of Machine Learning Algorithms to Detect Botnet DDoS Attacks Abstract
Voore Subrahmanyam, Vinnakota Shivani, Siraboina Prasunanju, Akula Pranay, Sanikommu Shreya Reddy
Vol 8, No 1 (2020) An Optimal Bidding Strategy for Social Welfare Maximization of Microgrid Abstract
Ankit Kumar Singh, Rajesh Panda, Prashant Kumar Tiwari
Vol 9, No 3 (2021) Analysis of Ethical Hacking Methodology to Protect the Computer Networks Abstract
E. N. Ganesh
Vol 10, No 1 (2022) Analytical Review on Cyber Risk Management Abstract
Mansora Farahmand, Bi Bi Parwana Zazai, Mohammad Salem Hamidi
Vol 10, No 2 (2022) Anomaly Based Intrusion Detection Using Machine Learning Techniques Abstract
M. Ahana Aslin, A. Meena Kowshalya
Vol 7, No 3 (2019) APFC Unit for Industrial Power Consumption to Minimize Penalty Abstract
Piyush Agrawal, Roushan Kumar Patel, Raghuraj Kumar
Vol 10, No 3 (2022) Application of Constraint Satisfaction framework to zero trust security Model Abstract
Manas Kumar Yogi, Dwarampudi Aiswarya
Vol 7, No 2 (2019) Automated Headlight Intensity Controller and Speed Control in Vehicles Abstract
S. Angeline Jenipher, P. Aswin, S. Gowsalya, C. Manjula Devi, D. Baskaran
Vol 7, No 2 (2019) Automatic Identification of Obstacles and Crack Sensing Scheme in Rail Tracking System Abstract
S. Ramachandran, G. Kaviya, S. Keerthana, S. Sivaranjani
Vol 6, No 3 (2018) Blockchain for Cryptocurrencies – A Literature Survey Abstract
Heenal Sapovadia, Adarsh Sutariya
Vol 7, No 1 (2019) Blockchain Technology: Systematic Review of Security and Privacy Problems and Its Scope with Internet of Things (IoT) Abstract
Vishal Kumar Verma
Vol 7, No 1 (2019) Blockchain Technology: Systematic Review of Security and Privacy Problems and Its Scope with Cloud Computing Abstract
Vishal Kumar Verma
Vol 5, No 3 (2017) CBIR using Feature Extraction approaches and Application: A survey Abstract
Shailja Rawat, Rajendra Kumar
Abhilash Shokeen
1 - 25 of 97 Items 1 2 3 4 > >>