|
Issue |
Title |
|
Vol 8, No 2 (2022) |
A Comparative Study on Cyber Crime, Security, and Law |
Abstract
|
Dhaval Chudasama |
|
Vol 3, No 1 (2017) |
A Decentralized Cloud Firewall Framework for Cloud Security |
Abstract
|
E Rameez Hassan, M.E.V. Eswaramoorthi |
|
Vol 4, No 2 (2018) |
A Review on Cyber Security with Vulnerability Assessment |
Abstract
|
Ishan Pandita |
|
Vol 4, No 1 (2018) |
A Secure- Search- Scheme over encrypted data By Attaining a close grained query result verification techniques |
Abstract
|
P. Nikshiptha, M. Ranadheer, J. Tejaswi, N. Sindhuja, N. Premalatha, P. Pradeep Kumar |
|
Vol 4, No 1 (2018) |
A Sementic Enhanced Technique For Cyberbulling Detection |
Abstract
|
D. Madhumitha, E. Srikanth Reddy |
|
Vol 4, No 1 (2018) |
A Study on DRIMUX(Dynamic Rumor Influence Minimization with User Experience) |
Abstract
|
M. Sangeetha, V. Priyanka, V. Priyanka, V. Saranya, V. Saranya, M. Sharanya, M. Sharanya, Sateesh Reddy, Sateesh Reddy |
|
Vol 8, No 2 (2022) |
A Study on Network Breaching, Detection, and Solutions in Cyber Forensics |
Abstract
|
Chaitanya S. Shivalkar, Vaishnavi Gowda |
|
Vol 8, No 2 (2022) |
A Writing Survey of Network Safety |
Abstract
|
Soumen Chakraborty |
|
Vol 3, No 2 (2017) |
Access Control and Related Models |
Abstract
|
Anuj Gupta, Ashish Sharma |
|
Vol 5, No 2 (2019) |
Accident Alert System Using Raspberry Pi |
Abstract
|
Dinesh U V, Jijo Johnson, Sreesankar S, Vipin Augustine, Priya Thomas, Eugene Peter |
|
Vol 6, No 2 (2020) |
Agricultural Soil Analysis Using Data Mining Techniques |
Abstract
|
K. Mathanprasath, R. Nandhakumar |
|
Vol 1, No 2 (2015) |
An Intuitive Approach for Edge Detection of Images |
Abstract
|
Sasmita Mishra |
|
Vol 8, No 1 (2022) |
Artificial Intelligence as a Tool for Scheduling and Optimization: Novel Perspectives |
Abstract
|
Manas Kumar Yogi, Geetha Usha Sri Bade, Pynni Srujana |
|
Vol 1, No 1 (2015) |
Attack of SQL Injection on Web Application: Types, Problems, Solution |
Abstract
|
V. Harini, B. M. Alaudeen, G. Tholkappia Arasu |
|
Vol 3, No 1 (2017) |
Attack Resistant Fingerprint Recognition System Using Biocryptography |
Abstract
|
P Janani, K Ramakrishnan |
|
Vol 3, No 2 (2017) |
Augmented Reality |
Abstract
|
Pooja Lohchab, Mahesh Kumar |
|
Vol 8, No 1 (2022) |
Augmented Reality Mouse (AR Mouse) |
Abstract
|
Baviskar Ashwinikumar R, Sarwade Vikrant A, Bhosale Priyanka H, Margaje Nikita S |
|
Vol 4, No 2 (2018) |
Automated Testing: Planning, Design, Development & Tools |
Abstract
|
Sonia Bhargava, Priyanka Bhatewara Jain |
|
Vol 4, No 2 (2018) |
Automatic Summary Generator Using Nlp Based Harvested Metadata From Digital Content |
Abstract
|
Rushabh D. Doshi, Vijay K. Vyas, D. P. Upadhyay, Huvaran S. Naidu |
|
Vol 1, No 1 (2015) |
Awareness and Utilization of Social Networking Sites (SNS) Among Faculty of K. S. Rangasamy College of Technology in Tiruchengode: A Study |
Abstract
|
T. Indrani, S. Ally Sornam, K. Rajaram |
|
Vol 1, No 1 (2015) |
Behaviors Observations Beliefs Model for Security Enhancement Using Cognitive Reasoning |
Abstract
|
P. Singaravel, B. M. Alaudeen, G. Tholkappia Arasu |
|
Vol 3, No 2 (2017) |
Big Data! How Big It Is? |
Abstract
|
Sanju Gupta, Mahesh Kumar |
|
Vol 1, No 2 (2015) |
BioIDS – A Security Guaranteed System |
Abstract
|
N. Siranjeevi, B. M. Alaudeen |
|
Vol 6, No 1 (2020) |
Change the Way of Living: Smart City |
Abstract
|
Afsha A. Pathan, Megha D. Jagdale, Tejaswi P. Karne |
|
Vol 1, No 1 (2015) |
Changing Trends and Development in Digital Environment: User Education |
Abstract
|
K. Rajaram, S. Jeyachitra, B. S. Swaroop Rani |
|
1 - 25 of 81 Items |
1 2 3 4 > >> |