| Issue | Title | |
| Vol 8, No 3 (2020) | CNN based Gesture Recognition for ISL | Abstract |
| Vaishnavi Mohan Ahire, A. A. Khaparde, V. V. Deshmukh | ||
| Vol 6, No 2 (2018) | Collision Avoidance Using Li-Fi Based Inter Vehicle Communication | Abstract |
| Preethi S | ||
| Vol 8, No 2 (2020) | Comparative Analysis of Distributed Energy Efficient Clustering Protocols in Heterogeneous Wireless Sensor Network | Abstract |
| Gurwinder Kaur, Diksha Rani | ||
| Vol 8, No 1 (2020) | Cyber Security for Rail Infrastructure eMaintenance: Threats and Implications | Abstract |
| Nalli Vinaya Kumari, G.S. Pradeep Ghantasala, Raja Suresh Kumar Pitla | ||
| Vol 9, No 3 (2021) | Cyber Security Purity in 2021 and Afar Tips for Businesses | Abstract |
| Hardik Dumada, Aashutosh Shukla, Dhaval Chudasama | ||
| Vol 8, No 2 (2020) | Cybersecurity and the World of Tomorrow | Abstract |
| James P. Embrey | ||
| Vol 5, No 3 (2017) | Data Mining Methods for Terrorist Activity | Abstract |
| Ezhilarasi R, P. Arumugam | ||
| Vol 8, No 2 (2020) | Deep Learning Based Plant Disease Detection | Abstract |
| Soumya Shetty, Palvi Sawant, Bhagyashree Singasane, Mahi Khemchandani | ||
| Vol 10, No 1 (2022) | Deepfake Detection Using Resnext50 | Abstract |
| Vaishali Jadhav, Taabish Sutriwala, Raunak Singh, Sohel Siraj Mukadam | ||
| Vol 9, No 1 (2021) | Design and Performance Assessment of Light Weight Data Security System for Secure Data Transmission in IoT | Abstract |
| Abha Jaduna, Satish Kumar Alaria | ||
| Vol 8, No 1 (2020) | Design of Folded Cascode Amplifier for SCL 180 nm Technology Node for Low Power Applications | Abstract |
| Rajiv Ranjan Thakur, Pragati Singh, Chaitali Koley | ||
| Vol 8, No 1 (2020) | Detection of Fake Request and Response using Certificates Information and IP Address of SDN | Abstract |
| Lal Babu Yadav, Vivek Srivastava, Ravi Shankar Pandey | ||
| Vol 7, No 2 (2019) | Digital Data Sharing Using Blockchain | Abstract |
| S. Monisha, V. Pavithra, R. Priyanya, N. Pooranam | ||
| Vol 7, No 3 (2019) | DNA Cryptography based Data transmission | Abstract |
| Yogendra Kumar Upadhyaya, Chetna Sinha | ||
| Vol 9, No 1 (2021) | DoS Attacks and Detection Schemes in Wireless Mesh Networks | Abstract |
| Amnah Abdulrhman AlAyidi, Randa Ahmed Jebeur | ||
| Vol 10, No 2 (2022) | Email Spam Classifications Based on Support Vector Machine and Recurrent Neural Network | Abstract |
| Satyendra Shukla, Pawanesh Singh | ||
| Vol 11, No 2 (2023) | Emerging Paradigms: Leveraging Artificial Intelligence and Machine Learning for Enhanced Wireless Network Security | Abstract |
| Ikvinderpal Singh, Sapandeep Kaur Dhillon | ||
| Vol 9, No 2 (2021) | Encryption Mechanism under Prevalent Invasion | Abstract |
| Yashika Tanwar, Himanshi Tanwar, Shailender Gupta | ||
| Vol 6, No 3 (2018) | Energy conserving Detection Model for cooperative region Attacks in Wireless detector Networks | Abstract |
| S. Gayathri | ||
| Vol 8, No 2 (2020) | Energy efficiency improvement in LEACH protocol for wireless sensor network | Abstract |
| Safiullah Noori, Nirav Raja | ||
| Vol 11, No 2 (2023) | Enhancing Cybercrime Detection Through Big Data Analytics: A Conceptual Framework | Abstract |
| Dharmraj Kumar Vitragi, Lalan Kumar Singh, Arif Mohammad Sattar, Mritunjay Kr. Ranjan | ||
| Vol 6, No 3 (2018) | Entropy of Network Analysis and Cluster Detection Using Markov Theory | Abstract |
| N Siranjeevi, P. Priya, S. Thangavelu | ||
| Vol 8, No 2 (2020) | Ethical Hacking: A Necessity | Abstract |
| Sagar Sharma, Ashish Rana, Rohit Prajapati | ||
| Vol 8, No 3 (2020) | Feature Selection and Weighted Based Optimized Weight based Multi-Tier Stacked Ensemble (WMTSE) Classification for Twitter Sentiment Analysis | Abstract |
| P. Padmapriya, A. Finny Belwin, A. Linda Sherin, Antony Selvadoss Thanamani | ||
| Vol 10, No 2 (2022) | Fingerprint Liveliness Detection in Biometric Authentication: A Survey | Abstract |
| Waseem U. Zaman | ||
| 26 - 50 of 97 Items | << < 1 2 3 4 > >> | |


