| Issue | Title | |
| Vol 8, No 2 (2022) | A Comparative Study on Cyber Crime, Security, and Law | Abstract |
| Dhaval Chudasama | ||
| Vol 3, No 1 (2017) | A Decentralized Cloud Firewall Framework for Cloud Security | Abstract |
| E Rameez Hassan, M.E.V. Eswaramoorthi | ||
| Vol 4, No 2 (2018) | A Review on Cyber Security with Vulnerability Assessment | Abstract |
| Ishan Pandita | ||
| Vol 4, No 1 (2018) | A Secure- Search- Scheme over encrypted data By Attaining a close grained query result verification techniques | Abstract |
| P. Nikshiptha, M. Ranadheer, J. Tejaswi, N. Sindhuja, N. Premalatha, P. Pradeep Kumar | ||
| Vol 4, No 1 (2018) | A Sementic Enhanced Technique For Cyberbulling Detection | Abstract |
| D. Madhumitha, E. Srikanth Reddy | ||
| Vol 4, No 1 (2018) | A Study on DRIMUX(Dynamic Rumor Influence Minimization with User Experience) | Abstract |
| M. Sangeetha, V. Priyanka, V. Priyanka, V. Saranya, V. Saranya, M. Sharanya, M. Sharanya, Sateesh Reddy, Sateesh Reddy | ||
| Vol 8, No 2 (2022) | A Study on Network Breaching, Detection, and Solutions in Cyber Forensics | Abstract |
| Chaitanya S. Shivalkar, Vaishnavi Gowda | ||
| Vol 8, No 2 (2022) | A Writing Survey of Network Safety | Abstract |
| Soumen Chakraborty | ||
| Vol 3, No 2 (2017) | Access Control and Related Models | Abstract |
| Anuj Gupta, Ashish Sharma | ||
| Vol 5, No 2 (2019) | Accident Alert System Using Raspberry Pi | Abstract |
| Dinesh U V, Jijo Johnson, Sreesankar S, Vipin Augustine, Priya Thomas, Eugene Peter | ||
| Vol 6, No 2 (2020) | Agricultural Soil Analysis Using Data Mining Techniques | Abstract |
| K. Mathanprasath, R. Nandhakumar | ||
| Vol 1, No 2 (2015) | An Intuitive Approach for Edge Detection of Images | Abstract |
| Sasmita Mishra | ||
| Vol 8, No 1 (2022) | Artificial Intelligence as a Tool for Scheduling and Optimization: Novel Perspectives | Abstract |
| Manas Kumar Yogi, Geetha Usha Sri Bade, Pynni Srujana | ||
| Vol 1, No 1 (2015) | Attack of SQL Injection on Web Application: Types, Problems, Solution | Abstract |
| V. Harini, B. M. Alaudeen, G. Tholkappia Arasu | ||
| Vol 3, No 1 (2017) | Attack Resistant Fingerprint Recognition System Using Biocryptography | Abstract |
| P Janani, K Ramakrishnan | ||
| Vol 3, No 2 (2017) | Augmented Reality | Abstract |
| Pooja Lohchab, Mahesh Kumar | ||
| Vol 8, No 1 (2022) | Augmented Reality Mouse (AR Mouse) | Abstract |
| Baviskar Ashwinikumar R, Sarwade Vikrant A, Bhosale Priyanka H, Margaje Nikita S | ||
| Vol 4, No 2 (2018) | Automated Testing: Planning, Design, Development & Tools | Abstract |
| Sonia Bhargava, Priyanka Bhatewara Jain | ||
| Vol 4, No 2 (2018) | Automatic Summary Generator Using Nlp Based Harvested Metadata From Digital Content | Abstract |
| Rushabh D. Doshi, Vijay K. Vyas, D. P. Upadhyay, Huvaran S. Naidu | ||
| Vol 1, No 1 (2015) | Awareness and Utilization of Social Networking Sites (SNS) Among Faculty of K. S. Rangasamy College of Technology in Tiruchengode: A Study | Abstract |
| T. Indrani, S. Ally Sornam, K. Rajaram | ||
| Vol 1, No 1 (2015) | Behaviors Observations Beliefs Model for Security Enhancement Using Cognitive Reasoning | Abstract |
| P. Singaravel, B. M. Alaudeen, G. Tholkappia Arasu | ||
| Vol 3, No 2 (2017) | Big Data! How Big It Is? | Abstract |
| Sanju Gupta, Mahesh Kumar | ||
| Vol 1, No 2 (2015) | BioIDS – A Security Guaranteed System | Abstract |
| N. Siranjeevi, B. M. Alaudeen | ||
| Vol 6, No 1 (2020) | Change the Way of Living: Smart City | Abstract |
| Afsha A. Pathan, Megha D. Jagdale, Tejaswi P. Karne | ||
| Vol 1, No 1 (2015) | Changing Trends and Development in Digital Environment: User Education | Abstract |
| K. Rajaram, S. Jeyachitra, B. S. Swaroop Rani | ||
| 1 - 25 of 81 Items | 1 2 3 4 > >> | |