Growing Cybercrime Incidences in India-An Analytical Study
Farha Khan, Sudhanshu Maurya
|
PDF |
|
Mobile Devices Security and its Impact on the Privacy
Mariam Alrajeh, Sara AlSahaim, M M Hafizur Rahman, and Abu Sufian
|
PDF |
|
A Review of PCA and GAN Based Change Detection of Remote Sensing Images
Kshitij Kumar Verma, Mehuli Basu, Tamesh Halder, Rintu Kumar Gayen, Arundhati Mishra Ray, Debashish Chakravarty
|
PDF |
|
Cognitive Load with Different Origins: An EEG Model- Based Explanation
Yamini Gogna, Dr. Sheela Tiwari, Dr. Rajesh Singla
|
PDF |
|
A Systematic Literature Review on Cyber Security Issues in Metaverse
Mariam Ali Alhamed, Hanan Khalid Alsuwaelim, M M Hafizur Rahman3 , Abu Sufian
|
PDF |
|
Black Widow Spider Inspired Feature Selection with SVM Classifier for Bio-Medical Data Classification
Shobha Aswal, Neelu Jyothi Ahuja, Ritika Mehra
|
PDF |
|
Analytical Approach Towards Evolutionary Computations
Aabha Malik, Sanjay Kumar Dubey
|
PDF |
|
Security Analysis of Message Transmission Using Quantum Cryptography
Praveen Kumar Tripathi, Ratnesh Kumar Shukla, Radha Raman Chandan, Sanjeev Kumar Shukla, Akhilesh Kumar Pandey
|
PDF |
|
Security Threats for Short Range Communication Wireless Network on IoT Devices
Km Ujjawal, Sharvan Kumar Garg, Arif Ali, Deepak Kumar Singh
|
PDF |
|
Person Identification System Based on Iris Patterns Using Statistical and Machine Learning Techniques
Sonali Gaikwad, Jyotsna Gaikwad, Yogesh Rajput
|
PDF |
|