All Stories

  1. Enhanced SqueezeNet model for detecting IoT-Bot attacks: A comprehensive approach
  2. OCR using traditional and DNN approach
  3. Application and Evaluation of the Secured Blockchain Framework
  4. Design of Smart Waste Management System Using IoT
  5. Stock Forecasting Using LSTM Neural Networks
  6. A Simulation-Based Analysis of IoT Security Architecture in Smart Homes
  7. Implementation of Intelligent Manufacturing Using Cyber-Physical Systems
  8. Unveiling Sentiments: CNN-LSTM Based Social Media Sentiment Analysis
  9. Revolutionizing Online Transaction Safety with CNN and GAN-Based Fraud Detection Strategies
  10. Development of Chatbot Using Python
  11. Genome Trader: Utilizing Genetic Algorithms for Smarter Investment
  12. Customized convolutional neural network model for IoT botnet attack detection
  13. Artificial Intelligence and Internet of Things based Augmented Trends for Data Driven Systems
  14. Efficiency Assessment of Software-Defined Networking for Real-Time Network Systems
  15. MAN C: A masked autoencoder neural cryptography based encryption scheme for CT scan images
  16. Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset
  17. Smart Technologies in Healthcare Management
  18. Performance analysis of ODL and RYU controllers’ against DDoS attack in software defined networks
  19. Fake Review Identification Using Machine Learning
  20. Designing and Development of AR Based Application for Biological Education
  21. Generation & evaluation of datasets for anomaly-based intrusion detection systems in IoT environments
  22. Generating IoT Specific Anomaly Datasets Using Cooja Simulator (Contiki-OS) and Performance Evaluation of Deep Learning Model Coupled with Aquila Optimizer
  23. Designing and Development of AR Based Application for Studying Magnetism
  24. Detection of False Information on Social Media
  25. Deep-Learning-based Cryptanalysis through Topic Modeling
  26. Analysis of Influence of the Conflict on Cyber Security and it Development
  27. A novel sFlow based DDoS detection model in software defined networking
  28. MAN-C: A Masked Autoencoder Neural Cryptography Based Encryption Scheme for CT Scan Images
  29. Revolutionizing Healthcare by Unleashing the Power of Machine Learning in Diagnosis and Treatment
  30. An Integrated Approach to Potato Leaf Disease Detection Using Convolutional Neural Networks and Random Forest
  31. A Hybrid Deep Learning Model for Intrusion Detection System in the Internet of Things Environment
  32. Simulation of DDoS Attack in Software Defined Networking
  33. Harmonizing Nature and Technology: CNN-SVM for Cercospora Leaf Spot Disease Recognition in Chilli Plants
  34. Nature’s Secrets Revealed: Unraveling Fusarium Wilt Diseases through CNN and SVM
  35. A comparative study on blockchain-based distributed public key infrastructure for IoT applications
  36. Use of Neural Machine Translation in Multimodal Translation
  37. Analyse and Evaluate Quixbugs with Open AI Codex and Powering Next Generation Application
  38. The Role of Cloud Computing in Ensuring Business Continuity During Disasters
  39. Consensus Algorithms in Blockchain for an Efficient and Secure Network
  40. Handbook of Augmented and Virtual Reality
  41. Improved Deep Maxout for IoT Botnet Attack Detection with LDA based Selected Feature Set
  42. Software Defined Network Implements Real Time Detection and Mitigation of DDoS attacks
  43. A Regularized CNN-SVM Framework for Improved Diagnosis of Citrus Fruit Diseases, both Common and Exotic
  44. Evaluation of contemporary intrusion detection systems for internet of things environment
  45. Implementation of blockchain-based e-voting system
  46. Intelligent IoT-BOTNET attack detection model with optimized hybrid classification model
  47. A Concise Review on Internet of Things: Architecture and Its Enabling Technologies
  48. A Review on Blockchain Smart Contract Applications
  49. Review of Software-Defined Network-Enabled Security
  50. Potential of IoT for Water Monitoring to Upgrade Food Quality
  51. DDoS attack defence mechanism using sFlow
  52. A Study on the Impact of 5G in Defense and Security
  53. A Systematic Review on Internet of Things (IoT): Applications & Challenges
  54. Blockchain for Internet of Things (IoT): Research Issues, Challenges, and Future Directions
  55. Role of Augmented Reality and Internet of Things in Education Sector
  56. A DDoS Vulnerability Analysis System against Distributed SDN Controllers in a Cloud Computing Environment
  57. A Comparative Study of Software Defined Networking Controllers Using Mininet
  58. Next Generation IoT and Blockchain Integration
  59. Machine Learning, Blockchain, and Cyber Security in Smart Environments
  60. Reducing Resource and Energy Consumption in Cryptocurrency Mining by using both Proof-of-Stake Algorithm and Renewable Energy
  61. Secure key issuing scheme in ID-based cryptography with revocable ID
  62. A Secure and Efficient Signature Scheme for IoT in Healthcare
  63. Rule-based Merged Line Segmentation Technique
  64. Challenges and Risks Associated with Public Key Infrastructure
  65. Parametric and Non-parametric Analysis on MAOA-based Intelligent IoT-BOTNET Attack Detection Model
  66. Performance Analysis of SDN Controller
  67. A Novel Framework for Efficient Multiple Signature on Certificate with Database Security
  68. A Synoptic Review on Feature Selection and Machine Learning models used for Detecting Cyber Attacks in IoT
  69. Improvised Secure Transmission Technique accessory on Artificial Intelligence
  70. A Synoptic Review on Feature Selection and Machine Learning models used for Detecting Cyber Attacks in IoT
  71. A New Hybrid Approach for Encrypting XML Documents
  72. A Study of Awareness and Perception of Augmented Reality in Education Sector
  73. An approach for Storage Optimized Cloud using AES Mechanism
  74. Application of IoT in Agriculture
  75. Artificial Intelligence Predictability of Human Emotion in Psychology
  76. Automated Bus Information System
  77. Comparative Analysis of Various Encryption Algorithms Used In IoT Security
  78. Comparison between Code Clone Detection and Model Clone Detection
  79. Demystifying Security and Applications of Internet of Things
  80. Energy and Resource Consumption in Cryptocurrency Mining: A Detailed Comparison
  81. Impact of Covid-19 on Education System
  82. Revolution of IoT In Healthcare During Covid-19
  83. Smart Healthcare Monitoring System Using Wireless Body Area Network
  84. Smart Waste Segregation System Using IoT
  85. A Novel Certificateless Secured Signature Scheme for IoT Data in Healthcare System
  86. DDoS Penetration Testing on OpenDayLight 3-Node in Software Defined Networking
  87. Efficient and secure multiple digital signature to prevent forgery based on ECC
  88. IoT Architectures and Its Security: A Review
  89. De Authentication Attack: A Review
  90. Emerging Part of Industry 4.0: The Digital and Physical Technology
  91. The Need for Information Security Management for SMEs
  92. Classification and Imapct of Cyber Threats in India: A review
  93. IoT-Enabled Healthcare Network With SDN
  94. Secure and Robust Watermarking Scheme based on Motion Features for Video Object
  95. Security and Issues of M-Banking: A Technical Report
  96. A Technical Review Report on Cyber Crimes in India
  97. An efficient and secure identity based multiple signatures scheme based on RSA
  98. e-Device for the Protection of Agricultural Land from Elephant Attacks in Odisha: A Review
  99. An Analysis of Integration of Internet of Things and Cloud Computing
  100. Machine Learning Algorithms for building Recommender Systems
  101. Applications of Digital Signatures in Cryptography
  102. Extended identity based multi-signcryption scheme with public verifiability
  103. Security Issues and Countermeasures of Online Transaction in E-Commerce
  104. Design and Implementation of a Secure Hierarchical Trust Model for PKI
  105. Extended Design and Implementation of Certificate Authorities
  106. Identity Based Cryptography
  107. A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority
  108. Security Issues and Countermeasures of Online Transaction in E-Commerce
  109. Implementation and Performance Analysis of Enhanced SHA-192