|
Issue |
Title |
|
Vol 1, No 1 (2025): Jan-Apr |
A Review of Password Attacks and Comparative Analysis of Secure Authentication Methods |
Abstract
|
Rajibhai Harish Dubey, Muskan Tarachand Karmani, Lekhraj Vilhekar |
|
Vol 1, No 1 (2025): Jan-Apr |
A Review: Brain Imaging For Neurological Disorder |
Abstract
|
Shilpa K C, Shilpa M I, Harshitha V, Priyanka V, Priyanka V, Nisarga M, Siri K S |
|
Vol 1, No 2 (2025): May-Aug |
Advances in Pneumonia Detection: A Comprehensive Review |
Abstract
|
Wilny Wilson P, Dr. J D Dorathi Jayaseeli |
|
Vol 1, No 2 (2025): May-Aug |
Hybrid Crypto: A Secure and User-Friendly Encryption System for Digital Communication |
Abstract
|
Erugadindla Sukumar, Khatravath Sai Pavan, Dr. Ch. Ramesh Babu, Dr. Meera Alphy, Dr. K. Sreekala, S. Vijaya Lakshmi |
|
Vol 1, No 1 (2025): Jan-Apr |
Network Security and Data Mining : Comprehensive Review |
Abstract
|
Vipin Kumar, Mrs. DEEPTI SHARMA |
|
Vol 1, No 1 (2025): Jan-Apr |
REDEFINING SECURITY- BIOMETRIC AUTHENTICATION SYSTEM |
Abstract
|
Tamirah Sharieff, Zoya Harmain, Sarah Smyrline, Shafiya Noorain |
|
Vol 1, No 2 (2025): May-Aug |
TEXT TO FACIAL SKECTH GENERATION USING GANS |
Abstract
|
Albin Sojan, Alekh J, Amegh C S, Cyriac P S, Rashma T V |
|
Vol 1, No 1 (2025): Jan-Apr |
The Security and Efficiency of 5G: Allocating Network Resources for Network Slicing |
Abstract
|
Ranjitha K, Shreya U, Supreetha R |
|
Vol 1, No 2 (2025): May-Aug |
ThreatHive: Honeypot and AI Powered Intrusion Detection System |
Abstract
|
Abhishek T A, Anupriya M A, Aswathy Nandan S, Aswathy Sudheer R, Sujarani M S |
|
1 - 9 of 9 Items |
|