|
Issue |
Title |
|
Vol 8, No 1 (2020) |
Secured Privacy Framework |
Abstract
|
Lavanya Bakshi, Harkirat Singh |
|
Vol 11, No 2 (2023) |
Securing The Internet of Things: Threats, Safeguards, and Future Directions |
Abstract
|
Ushaa Eswaran, Vishal Eswaran |
|
Vol 10, No 2 (2022) |
Securities Control in Ad Hoc Network on Scatternet |
Abstract
|
Shubham Patel, Rajendra Singh |
|
Vol 9, No 3 (2021) |
Security Agents for Information Retrieval in an IOT World |
Abstract
|
Meena Sachdeva |
|
Vol 10, No 3 (2022) |
Security Improvisation Technique for Internet of Things (IoT) Devices by Using Group Secure Key Generation Based on IIC Metrics |
Abstract
|
M. Hima Bindu, P. Trinatha Rao |
|
Vol 7, No 1 (2019) |
Security of AES-128 in Front of Brute Force Attack |
Abstract
|
Rikita Gohil |
|
Vol 11, No 1 (2023) |
Security Solutions for Common QR Code Hacking Attempts in a Mobile App |
Abstract
|
Poornima G. Naik, Vaishali P. Bhosale, Sudhir B. Desai, Prashik Patekar |
|
Vol 9, No 2 (2021) |
Security through Firewall to Prevent Unauthorized Access on Networks |
Abstract
|
Kapil Garg, Rekha Jain |
|
Vol 11, No 1 (2023) |
Smart CCTV for Daycare |
Abstract
|
Shubham Shinde, Dayal Thakur, Yash Warke, Snehal Shinde |
|
Vol 7, No 2 (2019) |
Technological Shield for Women by an Innovative Approach |
Abstract
|
S. Lakshmi, K. Venkatachalam |
|
Vol 11, No 3 (2023) |
The Adoption of Artificial Intelligence in Different Network Security Concepts |
Abstract
|
Qutaiba I. Ali, Mamoon A. Al Jbaar, Adel Jalal Yousif |
|
Vol 11, No 3 (2023) |
The Critical Role of Cyber Threat Intelligence in Countering Terrorism: Challenges, Successes and Policy Recommendations |
Abstract
|
Ushaa Eswaran, Vivek Eswaran, Keerthna Murali, Vishal Eswaran |
|
Vol 9, No 1 (2021) |
The Evolution of Cloud Computing |
Abstract
|
Babita Bhagat, Shrutika Khobragade, Archana Arudkar |
|
Vol 11, No 1 (2023) |
The Significance of an Open and Fair Internet |
Abstract
|
Bablu Gupta, Hitesh Gupta |
|
Vol 8, No 3 (2020) |
Towards a Machine Learning Oriented Expert System for Intrusion Detection Model |
Abstract
|
Alebachew Chiche |
|
Vol 7, No 3 (2019) |
True Request–Fake Response: A New Trend of Spear Phishing Attack |
Abstract
|
Franklin Tchakounté, Virgile Simé Nyassi, Kalum Priyanath Udagepola |
|
Vol 7, No 1 (2019) |
Trust Based Deep Learning Model for Women Information Security Improvement in LBS |
Abstract
|
Shrina Patel, Bijal Talati |
|
Vol 11, No 3 (2023) |
Uncovering the Elusive Threat: An Investigative Study on Polymorphic Viruses |
Abstract
|
Chintagunta Eswari Naga Sai Priya, Satyamanikanta Patnala, Manas Kumar Yogi |
|
Vol 7, No 3 (2019) |
Wireless Electrical Power Transmission |
Abstract
|
Vipul Kumar Singh, Garvit Gupta |
|
Vol 7, No 3 (2019) |
Wireless Power System: Its Challenges and Issues |
Abstract
|
Shrawan Suthar, Pragati Sharma, Udit Mamodiya |
|
Vol 7, No 2 (2019) |
Wireless Sensor Network Based Road Traffic Monitoring in Hilly Terrains |
Abstract
|
Nivetha S., Nivetha V., Ranjith Kumar P, Kalavathi Devi T |
|
Vol 5, No 3 (2017) |
Wireless Sensor Network: A Review |
Abstract
|
Bhavin Suthar, Deepti Singh |
|
76 - 97 of 97 Items |
<< < 1 2 3 4 |