|
Issue |
Title |
|
Vol 6, No 1 (2018) |
HIDDEN MARKOV MODEL FOR DETECTION AND PREVENTION OF SQL INJECTION ATTACKS |
Abstract
|
SINCY ABRAHAM, GHILBY VARGESHE JAISON |
|
Vol 7, No 1 (2019) |
Home Automation and Security using Advanced Communication Technologies |
Abstract
|
Manish Kumar Rai, Chitra Singh, Devansh Mohan Dwivedi |
|
Vol 10, No 2 (2022) |
Importance of Firewalls in the Security of Network |
Abstract
|
Aman Jain, Neeraj . |
|
Vol 9, No 1 (2021) |
Indian Cybersecurity Turf: A 2020 Position Paper |
Abstract
|
Vikram Singh, Varun Malik |
|
Vol 8, No 2 (2020) |
Intrusion Detection System Using Honeyword |
Abstract
|
Hrushi Sawant, Komal Pandhare, Akshaykumar Yamgar, Bhagyashri Sonawale |
|
Vol 10, No 1 (2022) |
Intrusion Detection Using ANN Machine Learning for MIM, DOS, BO |
Abstract
|
Shlok Gautam Gamare, Vedant Thaksen Gavhane, Vishal Namdeo Kamble, Pragati Pejlekar |
|
Vol 9, No 2 (2021) |
Investigating Various Approaches and Ways to Detect Cybercrime |
Abstract
|
Abhishek Shah, Dhaval Chudasama |
|
Vol 9, No 2 (2021) |
License Plate Detection using CNN |
Abstract
|
Prathamesh Sudhir Mestry, Majid Masoom Deshmukh, Harshal Ganesh Narkhede, Diksha G. Kumar |
|
Vol 11, No 2 (2023) |
Marketing and Advertisement Strategy Using Azure PaaS Services and Python Scripting |
Abstract
|
Maheboob Patel, Vishal Pardeshi |
|
Vol 10, No 3 (2022) |
Minimization Technique of Pollution and Traffic Using IOT: A Review |
Abstract
|
Kavish Vijay, Harshwardhan Rathore, Anirudh Singh Rathore, Ajay Sharma, Sonam Gour |
|
Vol 6, No 1 (2018) |
MODIFIED KEY GENERATION OF BLOWFISH ALGORITHM FOR TEXTUAL AND IMAGE DATA |
Abstract
|
Aastha Sharma |
|
Vol 8, No 3 (2020) |
Multinomial classification Identification for Domestic Violence Virtual Posts Based on Improved Convolution Neural Network (ICNN) |
Abstract
|
B. M. Rajesh, Dr. B. Chithra, A. Finny Belwin, A. Linda Sherin, Dr. Antony Selvadoss Thanamani |
|
Vol 10, No 1 (2022) |
Network Intrusion Detection System using Machine Learning and Deep Learning Approach |
Abstract
|
Rohan Chauhan |
|
Vol 9, No 3 (2021) |
Network Security Attacks & Techniques to Make a Network Communication Secure |
Abstract
|
Yashwant Kumar Choudhary, Anil Kumar |
|
Vol 9, No 1 (2021) |
Numerical Simulation of Energy Efficient Routing Protocol in Wireless Sensor Network Using Optimized LEACH |
Abstract
|
Madhu Choudhary, Somya Agrawal |
|
Vol 6, No 3 (2018) |
OCL Fault Injection-Based Detection & Prevention of LDAP Query Injection Vulnerabilities |
Abstract
|
Anjumol T Many, Ushus Maria Joseph |
|
Vol 6, No 1 (2018) |
Performance Analysis of Flying Ad-Hoc Network Over cloud with Variation of Protocal with Variation of Antenna of Flying Unmanned Air Vehicle (UAVs |
Abstract
|
Akanksha Pandey, Laxmi Shrivastav |
|
Vol 8, No 3 (2020) |
Privacy Enhancement on Internet of Things Using Differential Privacy Strategies |
Abstract
|
Sharmila S, Kanagaraj A., Finny Belwin A., Linda Sherin A., Antony Selvadoss Thanamani |
|
Vol 5, No 3 (2017) |
Public Services through Cloud Computing |
Abstract
|
Priyanka Sengar, Nishit Gupta |
|
Vol 11, No 1 (2023) |
Real-time Criminal Detection Using Face Recognition |
Abstract
|
Archana Augustine, Tanmay Choudhari, Soham Dharap, Yuvraj Jadhav |
|
Vol 6, No 2 (2018) |
Removing Duplication Data in Cloud with Secure Accessibility |
Abstract
|
B. Shireesha |
|
Vol 11, No 3 (2023) |
Role and Efficacy of Artificial Intelligence in Cyber-security |
Abstract
|
Megha Gupta, Mithlesh Ayra, Abha Jain |
|
Vol 11, No 3 (2023) |
Safeguarding Data and Networks from Cyberattacks with Advanced Technology and User Awareness |
Abstract
|
B. M. Rajesh, Santhiya G., Archana C. |
|
Vol 6, No 2 (2018) |
Satellite Communication Challenges & Threats |
Abstract
|
Fatma Abdulqadir Karkouri, Mabrouka Mohammed Algherinai Algherinai |
|
Vol 6, No 2 (2018) |
Secured Light Weight Methodology for Wireless Sensor Network |
Abstract
|
Sonia Bhargava |
|
51 - 75 of 97 Items |
<< < 1 2 3 4 > >> |