| Issue | Title | |
| Vol 6, No 1 (2018) | HIDDEN MARKOV MODEL FOR DETECTION AND PREVENTION OF SQL INJECTION ATTACKS | Abstract |
| SINCY ABRAHAM, GHILBY VARGESHE JAISON | ||
| Vol 7, No 1 (2019) | Home Automation and Security using Advanced Communication Technologies | Abstract |
| Manish Kumar Rai, Chitra Singh, Devansh Mohan Dwivedi | ||
| Vol 10, No 2 (2022) | Importance of Firewalls in the Security of Network | Abstract |
| Aman Jain, Neeraj . | ||
| Vol 9, No 1 (2021) | Indian Cybersecurity Turf: A 2020 Position Paper | Abstract |
| Vikram Singh, Varun Malik | ||
| Vol 8, No 2 (2020) | Intrusion Detection System Using Honeyword | Abstract |
| Hrushi Sawant, Komal Pandhare, Akshaykumar Yamgar, Bhagyashri Sonawale | ||
| Vol 10, No 1 (2022) | Intrusion Detection Using ANN Machine Learning for MIM, DOS, BO | Abstract |
| Shlok Gautam Gamare, Vedant Thaksen Gavhane, Vishal Namdeo Kamble, Pragati Pejlekar | ||
| Vol 9, No 2 (2021) | Investigating Various Approaches and Ways to Detect Cybercrime | Abstract |
| Abhishek Shah, Dhaval Chudasama | ||
| Vol 9, No 2 (2021) | License Plate Detection using CNN | Abstract |
| Prathamesh Sudhir Mestry, Majid Masoom Deshmukh, Harshal Ganesh Narkhede, Diksha G. Kumar | ||
| Vol 11, No 2 (2023) | Marketing and Advertisement Strategy Using Azure PaaS Services and Python Scripting | Abstract |
| Maheboob Patel, Vishal Pardeshi | ||
| Vol 10, No 3 (2022) | Minimization Technique of Pollution and Traffic Using IOT: A Review | Abstract |
| Kavish Vijay, Harshwardhan Rathore, Anirudh Singh Rathore, Ajay Sharma, Sonam Gour | ||
| Vol 6, No 1 (2018) | MODIFIED KEY GENERATION OF BLOWFISH ALGORITHM FOR TEXTUAL AND IMAGE DATA | Abstract |
| Aastha Sharma | ||
| Vol 8, No 3 (2020) | Multinomial classification Identification for Domestic Violence Virtual Posts Based on Improved Convolution Neural Network (ICNN) | Abstract |
| B. M. Rajesh, Dr. B. Chithra, A. Finny Belwin, A. Linda Sherin, Dr. Antony Selvadoss Thanamani | ||
| Vol 10, No 1 (2022) | Network Intrusion Detection System using Machine Learning and Deep Learning Approach | Abstract |
| Rohan Chauhan | ||
| Vol 9, No 3 (2021) | Network Security Attacks & Techniques to Make a Network Communication Secure | Abstract |
| Yashwant Kumar Choudhary, Anil Kumar | ||
| Vol 9, No 1 (2021) | Numerical Simulation of Energy Efficient Routing Protocol in Wireless Sensor Network Using Optimized LEACH | Abstract |
| Madhu Choudhary, Somya Agrawal | ||
| Vol 6, No 3 (2018) | OCL Fault Injection-Based Detection & Prevention of LDAP Query Injection Vulnerabilities | Abstract |
| Anjumol T Many, Ushus Maria Joseph | ||
| Vol 6, No 1 (2018) | Performance Analysis of Flying Ad-Hoc Network Over cloud with Variation of Protocal with Variation of Antenna of Flying Unmanned Air Vehicle (UAVs | Abstract |
| Akanksha Pandey, Laxmi Shrivastav | ||
| Vol 8, No 3 (2020) | Privacy Enhancement on Internet of Things Using Differential Privacy Strategies | Abstract |
| Sharmila S, Kanagaraj A., Finny Belwin A., Linda Sherin A., Antony Selvadoss Thanamani | ||
| Vol 5, No 3 (2017) | Public Services through Cloud Computing | Abstract |
| Priyanka Sengar, Nishit Gupta | ||
| Vol 11, No 1 (2023) | Real-time Criminal Detection Using Face Recognition | Abstract |
| Archana Augustine, Tanmay Choudhari, Soham Dharap, Yuvraj Jadhav | ||
| Vol 6, No 2 (2018) | Removing Duplication Data in Cloud with Secure Accessibility | Abstract |
| B. Shireesha | ||
| Vol 11, No 3 (2023) | Role and Efficacy of Artificial Intelligence in Cyber-security | Abstract |
| Megha Gupta, Mithlesh Ayra, Abha Jain | ||
| Vol 11, No 3 (2023) | Safeguarding Data and Networks from Cyberattacks with Advanced Technology and User Awareness | Abstract |
| B. M. Rajesh, Santhiya G., Archana C. | ||
| Vol 6, No 2 (2018) | Satellite Communication Challenges & Threats | Abstract |
| Fatma Abdulqadir Karkouri, Mabrouka Mohammed Algherinai Algherinai | ||
| Vol 6, No 2 (2018) | Secured Light Weight Methodology for Wireless Sensor Network | Abstract |
| Sonia Bhargava | ||
| 51 - 75 of 97 Items | << < 1 2 3 4 > >> | |


