03Mar/25 MACHINE LEARNING ALGORITHMS FOR REAL-TIME MALWARE DETECTION March 3, 2025Volume No:1. Issue No.1 (2017), Year 2017karthick R
03Mar/25 ACCESS CONTROL MODELS FOR SECURE HYBRID CLOUD DEPLOYMENT March 3, 2025Volume No:1. Issue No.1 (2017), Year 2017karthick R
03Mar/25 CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES March 3, 2025Volume No:1. Issue No.1 (2017), Year 2017karthick R
01Mar/25 THE GROWING THREAT OF DEEPFAKES: IMPLICATIONS FOR SECURITY AND PRIVACY March 1, 2025Volume No:4. Issue No.1 (2020), Year 2020, Yearskarthick R
01Mar/25 CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES March 1, 2025Volume No:4. Issue No.1 (2020), Year 2020karthick R
01Mar/25 MACHINE LEARNING ALGORITHMS FOR REAL-TIME MALWARE DETECTION March 1, 2025Volume No:4. Issue No.1 (2020), Year 2020karthick R
01Mar/25 ACCESS CONTROL MODELS FOR SECURE HYBRID CLOUD DEPLOYMENT March 1, 2025Volume No:4. Issue No.1 (2020), Year 2020karthick R
01Mar/25 MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES March 1, 2025Volume No:4. Issue No.1 (2020), Year 2020karthick R