Browse Title Index


 
Issue Title
 
Vol 10, No 3 (2022) A Comparative Study About Cyberattacks and Cybersecurity in Real World Abstract
Dhaval Chudasama, Ruchika Dungarani
 
Vol 11, No 1 (2023) A Decrease in the Encryption Latency Utilizing Transport Layer Protocols for Software Defined Networks Abstract
Muhammad Saddheer, Waqas Ahmad, Muhammad Nadeem, Syeda Wajiha Zahra, Ali Arshad, Saman Riaz
 
Vol 9, No 2 (2021) A General Understanding using Facts, Case Studies, and a Survey on Distributed Denial-of-Service Attacks Abstract
Aditi Neema, Aditi Thakur
 
Vol 11, No 2 (2023) A Latest Approach for Crime Rate Prediction and Analysis by Using the Clustering and Machine Learning Algorithm Abstract
A. Ananda Kumar, K. Ramanan, M. Santhosh Prakash, P. M. Sivaraja
 
Vol 5, No 3 (2017) A Review on AODV Protocol and Various Attacks in Mobile Ad Hoc Network Abstract
Saurabh Garg, Krishna Kumar Joshi
 
Vol 9, No 1 (2021) A Review on CAPTCHAs in Use with Focus on Their Existing Vulnerabilities Concerning Web Security Abstract
Dayanand *, Wilson Jeberson
 
Vol 9, No 3 (2021) A Review Paper on Cyber Security with Data Security in Cloud Computing Abstract
Gopal Krishn Tholambia, Neeraj Bhardwaj
 
Vol 6, No 3 (2018) A Study on Energy Efficient Coverage Aware Clustering Protocols in Wireless Sensor Networks Abstract
Amandeep Kaur Sohal, A. K. Sharma, N. Sood
 
Vol 6, No 1 (2018) A Survey on Congestion Control in Mobile in Mobile Ad Hoc Network Abstract
Pooja Tripathi, Krishna Kumar Joshi
 
Vol 10, No 1 (2022) Advanced Signature Verification Techniques: A Review Abstract
Shivam Sharma, Yash Jain, Yagya Bharadwaj, Deepak Moud
 
Vol 6, No 2 (2018) AN ACTIVE SPOOF MANAGEMENT IN AN EMAIL APPLICATION Abstract
Sijimol k
 
Vol 10, No 3 (2022) An Experimental Approach of Machine Learning Algorithms to Detect Botnet DDoS Attacks Abstract
Voore Subrahmanyam, Vinnakota Shivani, Siraboina Prasunanju, Akula Pranay, Sanikommu Shreya Reddy
 
Vol 8, No 1 (2020) An Optimal Bidding Strategy for Social Welfare Maximization of Microgrid Abstract
Ankit Kumar Singh, Rajesh Panda, Prashant Kumar Tiwari
 
Vol 9, No 3 (2021) Analysis of Ethical Hacking Methodology to Protect the Computer Networks Abstract
E. N. Ganesh
 
Vol 10, No 1 (2022) Analytical Review on Cyber Risk Management Abstract
Mansora Farahmand, Bi Bi Parwana Zazai, Mohammad Salem Hamidi
 
Vol 10, No 2 (2022) Anomaly Based Intrusion Detection Using Machine Learning Techniques Abstract
M. Ahana Aslin, A. Meena Kowshalya
 
Vol 7, No 3 (2019) APFC Unit for Industrial Power Consumption to Minimize Penalty Abstract
Piyush Agrawal, Roushan Kumar Patel, Raghuraj Kumar
 
Vol 10, No 3 (2022) Application of Constraint Satisfaction framework to zero trust security Model Abstract
Manas Kumar Yogi, Dwarampudi Aiswarya
 
Vol 7, No 2 (2019) Automated Headlight Intensity Controller and Speed Control in Vehicles Abstract
S. Angeline Jenipher, P. Aswin, S. Gowsalya, C. Manjula Devi, D. Baskaran
 
Vol 7, No 2 (2019) Automatic Identification of Obstacles and Crack Sensing Scheme in Rail Tracking System Abstract
S. Ramachandran, G. Kaviya, S. Keerthana, S. Sivaranjani
 
Vol 6, No 3 (2018) Blockchain for Cryptocurrencies – A Literature Survey Abstract
Heenal Sapovadia, Adarsh Sutariya
 
Vol 7, No 1 (2019) Blockchain Technology: Systematic Review of Security and Privacy Problems and Its Scope with Internet of Things (IoT) Abstract
Vishal Kumar Verma
 
Vol 7, No 1 (2019) Blockchain Technology: Systematic Review of Security and Privacy Problems and Its Scope with Cloud Computing Abstract
Vishal Kumar Verma
 
Vol 5, No 3 (2017) CBIR using Feature Extraction approaches and Application: A survey Abstract
Shailja Rawat, Rajendra Kumar
 
Vol 6, No 1 (2018) CHMOD LEACH: INNOVATIVE TECHNIQUE FOR CLUSTER HEAD SELECTION Abstract
Abhilash Shokeen
 
1 - 25 of 97 Items 1 2 3 4 > >>