| Issue | Title | |
| Vol 1, No 1 (2025): Jan-Apr | A Review of Password Attacks and Comparative Analysis of Secure Authentication Methods | Abstract | 
| Rajibhai Harish Dubey, Muskan Tarachand Karmani, Lekhraj Vilhekar | ||
| Vol 1, No 1 (2025): Jan-Apr | A Review: Brain Imaging For Neurological Disorder | Abstract | 
| Shilpa K C, Shilpa M I, Harshitha V, Priyanka V, Priyanka V, Nisarga M, Siri K S | ||
| Vol 1, No 2 (2025): May-Aug | Advances in Pneumonia Detection: A Comprehensive Review | Abstract | 
| Wilny Wilson P, Dr. J D Dorathi Jayaseeli | ||
| Vol 1, No 3 (2025): Sep-Dec 2025 | CRYPTOANALYZER: IDENTIFY AND EXPLOITING VULNERABLITY | Abstract | 
| Jeevaranjan V, Subasree S, Christ Michael Jeniston S, Harish M, Manikandan S | ||
| Vol 1, No 2 (2025): May-Aug | Hybrid Crypto: A Secure and User-Friendly Encryption System for Digital Communication | Abstract | 
| Erugadindla Sukumar, Khatravath Sai Pavan, Dr. Ch. Ramesh Babu, Dr. Meera Alphy, Dr. K. Sreekala, S. Vijaya Lakshmi | ||
| Vol 1, No 3 (2025): Sep-Dec 2025 | Mobile Application Security : Threats,Vulnerabilities, and Countermeasures | Abstract | 
| Mr. Gopal Khorwal, Mrs Ruchi Banarjee, Mr. Aman Kumar | ||
| Vol 1, No 1 (2025): Jan-Apr | Network Security and Data Mining : Comprehensive Review | Abstract | 
| Vipin Kumar, Mrs. DEEPTI SHARMA | ||
| Vol 1, No 2 (2025): May-Aug | Real-Time Data Processing in Cloud Computing: Challenges, Opportunities, and Performance Analysis | Abstract | 
| M R RAMESH | ||
| Vol 1, No 1 (2025): Jan-Apr | REDEFINING SECURITY- BIOMETRIC AUTHENTICATION SYSTEM | Abstract | 
| Tamirah Sharieff, Zoya Harmain, Sarah Smyrline, Shafiya Noorain | ||
| Vol 1, No 2 (2025): May-Aug | TEXT TO FACIAL SKECTH GENERATION USING GANS | Abstract | 
| Albin Sojan, Alekh J, Amegh C S, Cyriac P S, Rashma T V | ||
| Vol 1, No 1 (2025): Jan-Apr | The Security and Efficiency of 5G: Allocating Network Resources for Network Slicing | Abstract | 
| Ranjitha K, Shreya U, Supreetha R | ||
| Vol 1, No 2 (2025): May-Aug | ThreatHive: Honeypot and AI Powered Intrusion Detection System | Abstract | 
| Abhishek T A, Anupriya M A, Aswathy Nandan S, Aswathy Sudheer R, Sujarani M S | ||
| 1 - 12 of 12 Items | ||