Call us : 9940389791
Mail us : karthickkiwi@gmail.com
AI & Cyber Security AI & Cyber Security
  • Home
  • Editorial Board
    • Instruction to Authors
    • Ethical Guidelines
  • Plagiarism Policy
  • Archives
  • Contact Us

Monthly Archives: March 2025

03Mar/25

MACHINE LEARNING ALGORITHMS FOR REAL-TIME MALWARE DETECTION

March 3, 2025Volume No:1. Issue No.1 (2017), Year 2017karthick R
Leave a comment
03Mar/25

ACCESS CONTROL MODELS FOR SECURE HYBRID CLOUD DEPLOYMENT

March 3, 2025Volume No:1. Issue No.1 (2017), Year 2017karthick R
Leave a comment
03Mar/25

CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES

March 3, 2025Volume No:1. Issue No.1 (2017), Year 2017karthick R
Leave a comment
01Mar/25

THE GROWING THREAT OF DEEPFAKES: IMPLICATIONS FOR SECURITY AND PRIVACY

March 1, 2025Volume No:4. Issue No.1 (2020), Year 2020, Yearskarthick R
Leave a comment
01Mar/25

CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES

March 1, 2025Volume No:4. Issue No.1 (2020), Year 2020karthick R
Leave a comment
01Mar/25

MACHINE LEARNING ALGORITHMS FOR REAL-TIME MALWARE DETECTION

March 1, 2025Volume No:4. Issue No.1 (2020), Year 2020karthick R
Leave a comment
01Mar/25

ACCESS CONTROL MODELS FOR SECURE HYBRID CLOUD DEPLOYMENT

March 1, 2025Volume No:4. Issue No.1 (2020), Year 2020karthick R
Leave a comment
01Mar/25

MULTI-CLOUD ENVIRONMENTS: MITIGATING SECURITY RISKS IN DISTRIBUTED ARCHITECTURES

March 1, 2025Volume No:4. Issue No.1 (2020), Year 2020karthick R
Leave a comment

Posts navigation

  • « Previous
  • 1
  • 2

Archives

  • April 2026
  • March 2026
  • February 2026
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025

Categories

  • Volume No:1. Issue No.1 (2017)
  • Volume No:10. Issue No.1 (2026)
  • Volume No:4. Issue No.1 (2020)
  • Volume No:5. Issue No.1 (2021)
  • Volume No:8. Issue No.1 (2024)
  • Volume No:9. Issue No.1 (2025)
  • Volume No:9. Issue No.2 (2025)
  • Year 2017
  • Year 2020
  • Year 2021
  • Year 2024
  • Year 2025
  • Year 2026
  • Years
Copyright © AI & Cyber Security
Powered by AI & Cyber Security
MENU
  • Home
  • Editorial Board
    • Instruction to Authors
    • Ethical Guidelines
  • Plagiarism Policy
  • Archives
  • Contact Us