A Modest Approach Toward Cloud Security Hygiene
A Survey on Path Key Establishment
Credit Card Fraud Detection using ML Techniques
Vulnerabilities in Smart contracts of Decentralized Blockchain
Object Detection using TensorFlow 2 and Amazon Sage Maker
Multi-Key Fully Homomorphic Encryption Scheme Over Integers
Hybrid Lightweight Cryptography using AES and ECC for IoT Security
A Survey: Analysis of Existing Hybrid Cryptographic Techniques
Cloud based Integrated Real-Time Twitter Grievance Redressal With AWS EC2 and RDS using Machine Learning Approach for Enhanced Security
Blockchain Based Public Distribution System
Security Flaw in TCP/IP and Proposed Measures
Identity Based Designated Verifier Proxy Signature scheme and its Application to Health Care
Detection of Phishing Link using different Machine Learning Techniques
Categorizing Tracing Techniques for Network Forensics
Cloud-Based Object Detection Model using Amazon Rekognition
Orphanage Channelization System Using Blockchain Technology
A Review on Quantum key Distribution Protocols, Challenges and Its Applications
Static Analysis Approach of Malware using Machine Learning
Chatbot based android application towards security using FCM
Ensemble Deep Model for Hate Speech Detection
Accuracy Enhancement For Intrusion Detection Systems Using LSTM Approach
Cyber Attack Detection Using Machine Learning Technique
An Investigative study on Security Aspects and Authentication Schemes for Internet of Vehicles.