ICSSR Sponsored National Conference on Cyber Threat Intelligence and Attacker Behaviour Analysis - Viksith Bharath 2047 Perspective

Special Issue of ICSSR - National Conference on Cyber Threat Intelligence and Attacker Behaviour Analysis-February 2025 

No. Article Title and Authors Name Page No Download
1

SPAMSPOTTERELITE: "IDENTIFYING SPAM, PROTECTING YOUR MESSAGES"
Bhavana Mukku, Chaitanya Kishore Reddy Mukku      DOI: 10.46647/ijetms.2025.v09si01.001

1 - 11 Download
2

IMAGE STEGANALYSIS AND SECURITY ENHANCEMENT USING MIDPOINT TRANSFORMATION
P. Lalitha Mani Priya, Dr.B.Rama Subba Reddy      DOI: 10.46647/ijetms.2025.v09si01.002

12 - 17 Download
3

Harnessing Machine Learning for Advanced Attacker Behavior Analysis in Cybersecurity
Ganla Sneha, G Manogna, T C Swetha Priya      DOI: 10.46647/ijetms.2025.v09si01.003

18 - 26 Download
4

Unmasking Cyber Adversaries: Leveraging Cyber Threat Intelligence for Attacker Behavior Analysis
Dr.Vijayalakshmi Chintamaneni, Dr.M.SreeRamu, Penubala Nagarjuna,Praswika Meekala, Pentamaraju Sumegha      DOI: 10.46647/ijetms.2025.v09si01.004

27 - 36 Download
5

Street-Light Emergency Buzzer System
Sunitha Lingam, P. Shivani, K. Varnika, V. Jahnavi      DOI: 10.46647/ijetms.2025.v09si01.005

37 - 42 Download
6

Role of Accomplices in Morphing Attacks: A Comprehensive Survey
Naheed Sultana, T C Swetha Priya      DOI: 10.46647/ijetms.2025.v09si01.006

43 - 50 Download
7

Honeypot Detection System
Lokeswari Mrudula Anjali Pandi, Shrija Reddy Mekala, Meghana Raparthi      DOI: 10.46647/ijetms.2025.v09si01.007

51 - 57 Download
8

Leveraging AI and Machine Learning to Decode Adversarial Tactics, Techniques, and Procedures
J Manasa Krishna      DOI: 10.46647/ijetms.2025.v09si01.008

58 - 61 Download
9

FAKE NEWS DETECTION USING MACHINE LEARNING
C.Gayathri Reddy, E.Kiran Sirisha, G.Hima Bindu      DOI: 10.46647/ijetms.2025.v09si01.009

62 - 66 Download
10

Cybersecurity Threat Analysis and Behaviour Analysis: A Comprehensive Approach to Proactive Défense
B.S.Mounika Yadav, Komali Guthikonda, Venu Matta      DOI: 10.46647/ijetms.2025.v09si01.010

67 - 70 Download
11

Biohacking and Cybersecurity: The Threat of Implanted Medical Devices
DHANUSH VONTELA      DOI: 10.46647/ijetms.2025.v09si01.011

71 - 77 Download
12

A Survey on Hybrid Secure Key Management System (HSKMS) for Multi-Tenant Cloud Environments
Sree Lakshmi Done, Dr. Siva Rama Krishna T      DOI: 10.46647/ijetms.2025.v09si01.012

78 - 84 Download
13

Advanced Phishing Protection Techniques
Mamatha.P      DOI: 10.46647/ijetms.2025.v09si01.013

85 - 89 Download