| Issue | Title | |
| Vol 8, No 1 (2020) | Secured Privacy Framework | Abstract |
| Lavanya Bakshi, Harkirat Singh | ||
| Vol 11, No 2 (2023) | Securing The Internet of Things: Threats, Safeguards, and Future Directions | Abstract |
| Ushaa Eswaran, Vishal Eswaran | ||
| Vol 10, No 2 (2022) | Securities Control in Ad Hoc Network on Scatternet | Abstract |
| Shubham Patel, Rajendra Singh | ||
| Vol 9, No 3 (2021) | Security Agents for Information Retrieval in an IOT World | Abstract |
| Meena Sachdeva | ||
| Vol 10, No 3 (2022) | Security Improvisation Technique for Internet of Things (IoT) Devices by Using Group Secure Key Generation Based on IIC Metrics | Abstract |
| M. Hima Bindu, P. Trinatha Rao | ||
| Vol 7, No 1 (2019) | Security of AES-128 in Front of Brute Force Attack | Abstract |
| Rikita Gohil | ||
| Vol 11, No 1 (2023) | Security Solutions for Common QR Code Hacking Attempts in a Mobile App | Abstract |
| Poornima G. Naik, Vaishali P. Bhosale, Sudhir B. Desai, Prashik Patekar | ||
| Vol 9, No 2 (2021) | Security through Firewall to Prevent Unauthorized Access on Networks | Abstract |
| Kapil Garg, Rekha Jain | ||
| Vol 11, No 1 (2023) | Smart CCTV for Daycare | Abstract |
| Shubham Shinde, Dayal Thakur, Yash Warke, Snehal Shinde | ||
| Vol 7, No 2 (2019) | Technological Shield for Women by an Innovative Approach | Abstract |
| S. Lakshmi, K. Venkatachalam | ||
| Vol 11, No 3 (2023) | The Adoption of Artificial Intelligence in Different Network Security Concepts | Abstract |
| Qutaiba I. Ali, Mamoon A. Al Jbaar, Adel Jalal Yousif | ||
| Vol 11, No 3 (2023) | The Critical Role of Cyber Threat Intelligence in Countering Terrorism: Challenges, Successes and Policy Recommendations | Abstract |
| Ushaa Eswaran, Vivek Eswaran, Keerthna Murali, Vishal Eswaran | ||
| Vol 9, No 1 (2021) | The Evolution of Cloud Computing | Abstract |
| Babita Bhagat, Shrutika Khobragade, Archana Arudkar | ||
| Vol 11, No 1 (2023) | The Significance of an Open and Fair Internet | Abstract |
| Bablu Gupta, Hitesh Gupta | ||
| Vol 8, No 3 (2020) | Towards a Machine Learning Oriented Expert System for Intrusion Detection Model | Abstract |
| Alebachew Chiche | ||
| Vol 7, No 3 (2019) | True Request–Fake Response: A New Trend of Spear Phishing Attack | Abstract |
| Franklin Tchakounté, Virgile Simé Nyassi, Kalum Priyanath Udagepola | ||
| Vol 7, No 1 (2019) | Trust Based Deep Learning Model for Women Information Security Improvement in LBS | Abstract |
| Shrina Patel, Bijal Talati | ||
| Vol 11, No 3 (2023) | Uncovering the Elusive Threat: An Investigative Study on Polymorphic Viruses | Abstract |
| Chintagunta Eswari Naga Sai Priya, Satyamanikanta Patnala, Manas Kumar Yogi | ||
| Vol 7, No 3 (2019) | Wireless Electrical Power Transmission | Abstract |
| Vipul Kumar Singh, Garvit Gupta | ||
| Vol 7, No 3 (2019) | Wireless Power System: Its Challenges and Issues | Abstract |
| Shrawan Suthar, Pragati Sharma, Udit Mamodiya | ||
| Vol 7, No 2 (2019) | Wireless Sensor Network Based Road Traffic Monitoring in Hilly Terrains | Abstract |
| Nivetha S., Nivetha V., Ranjith Kumar P, Kalavathi Devi T | ||
| Vol 5, No 3 (2017) | Wireless Sensor Network: A Review | Abstract |
| Bhavin Suthar, Deepti Singh | ||
| 76 - 97 of 97 Items | << < 1 2 3 4 | |


