| Issue | Title | |
| Vol 4, No 1 (2022) | Attendance System using RFID Technology | Abstract | 
| Smit Patel, Atharva Pawar, Rushil Shah, Santosh Rathod | ||
| Vol 5, No 2 (2023) | Automated Precautions for Fugitive Emission | Abstract | 
| Basavaraj Neelagund, Pooja ., Prajna ., Pooja R Shettigar, Muhammed Salman | ||
| Vol 6, No 3 (2024) | Autonomix: Empowering Network Security with DRLA for Anomaly Detection | Abstract | 
| Suma S.G | ||
| Vol 7, No 1 (2025) | “AI-Based Heart Disease Prediction System” | Abstract | 
| Pavan Narayan L, Rohan Reddy R, Punith Gowda K S, Sagar P V | ||
| Vol 7, No 3 (2025) | BALASURAKSHA: A web application with Reporting system and aims to spread awareness on child safety | Abstract | 
| Dr. Bollu Bhavya Sri, Dudala Amoolya, Dr.K. Sreekala, Mrs. K Sunitha, Mrs. G Naga Sujini, Dr. A. Nagesh | ||
| Vol 1, No 2 (2019) | BCT in the Agricultural Supply Chain | Abstract | 
| P. Jagtap | ||
| Vol 6, No 1 (2024) | CHRONIC KIDNEY DISEASE DETECTION SYSTEM USING DEEP LEARNING | Abstract | 
| Akshay Ramesh, Ashwin Babu, Binoy Pious, Rahul R S, Jasna K | ||
| Vol 2, No 1 (2020) | Classification of Network Cyberattacks for Efficient Cognitive Fog Computing | Abstract | 
| Prof. A. V. Deorankar, Shiwani S. Thakare | ||
| Vol 5, No 1 (2023) | CYBERTIVITY | Abstract | 
| I Pavan Kumar | ||
| Vol 7, No 1 (2025) | Decentralized Trust Management in Web 3.0: A Comprehensive Approach to Network Security | Abstract | 
| Vinod Veeramachaneni | ||
| Vol 7, No 2 (2025) | Defending Against Ransomware Attacks with DKIM and SPF | Abstract | 
| D.Suvarna Lakshmi Manikanteswari, N. Hiranmayee, M.N.V Surekha, S. Shanthi Rupa | ||
| Vol 4, No 2 (2022) | Design and Development of a Hybrid Intrusion Detection and Prevention System for Cloud Computing and Internet of Things Environment | Abstract | 
| Safayet Hossain, Sanzida Islam, Ahsan Ullah, Afzal Hossain | ||
| Vol 3, No 1 (2021) | Design and Development of a Hybrid Intrusion Detection and Prevention System for Cloud Computing and the Internet of Things Environment | Abstract | 
| Afzal Hossain | ||
| Vol 7, No 3 (2025) | Digital Classroom: A Learning Management Platform for Teachers and Students | Abstract | 
| Thammineni Medari Nikilesh Kumar, Samaleti Trishul Chakra, Dr. K. Sreekala, K. Sirisha, Mr. Sathya Shekar Varma | ||
| Vol 3, No 1 (2021) | Digital India Digital Governance using BCT | Abstract | 
| Madhuri Patil, Pratiksha Pednekar, Jyoti Sawant, Pratiksha Salunkhe, G.B. Yadav | ||
| Vol 3, No 1 (2021) | Digital India Digital Governance Using BCT | Abstract | 
| Jyoti Sawant | ||
| Vol 3, No 2 (2021) | Direction Age Based on Sensors Used in Driver Help | Abstract | 
| Akkriti Sharma | ||
| Vol 6, No 3 (2024) | E-Commerce Website for Online Book Sale | Abstract | 
| B. Deekshitha Prasanna, Chinthala Sweety, Dr. Meera Alphy, Ms. K. Shrisha | ||
| Vol 2, No 1 (2020) | ECSDA-based Security Approach to Blockchain for Online Transactions Using Cryptocurrency | Abstract | 
| Arifa . | ||
| Vol 1, No 2 (2019) | Efficient Noise Aware Level Based Routing Protocol for UWSNs | Abstract | 
| Md. Meraj Ali | ||
| Vol 3, No 2 (2021) | Efficient Noise-Aware Level-Based Routing Protocol for UWSN | Abstract | 
| Meraj Aslam | ||
| Vol 5, No 2 (2023) | Electricity Theft Detection | Abstract | 
| Sandali Patil, Vaishnavi Babar, Priyal Ingale, Chandrakant Kokane | ||
| Vol 5, No 3 (2023) | Email classification system using ontology-base binary tree | Abstract | 
| Aruna Kumara B, Sanjana V, Sumukha B G, Vishal S Hiremath, Naveen S Narayanan | ||
| Vol 5, No 3 (2023) | Enforced Security Technologies with Utilities | Abstract | 
| Arunachalam K | ||
| Vol 3, No 1 (2021) | Enhanced Authentication Mechanism using Negative Password: An Approach for Intrusion Detection | Abstract | 
| Shiva Kumar G V, Dr Devananda S N, Suhas G K | ||
| 26 - 50 of 108 Items | << < 1 2 3 4 5 > >> | |