No. | Article Title and Authors Name | Page No | Download | |||
1 |
SPAMSPOTTERELITE: "IDENTIFYING SPAM, PROTECTING YOUR MESSAGES"
|
1 - 11 | Download | |||
2 |
IMAGE STEGANALYSIS AND SECURITY ENHANCEMENT USING MIDPOINT TRANSFORMATION
|
12 - 17 | Download | |||
3 |
Harnessing Machine Learning for Advanced Attacker Behavior Analysis in Cybersecurity
|
18 - 26 | Download | |||
4 |
Unmasking Cyber Adversaries: Leveraging Cyber Threat Intelligence for Attacker Behavior Analysis
|
27 - 36 | Download | |||
5 |
Street-Light Emergency Buzzer System
|
37 - 42 | Download | |||
6 |
Role of Accomplices in Morphing Attacks: A
Comprehensive Survey
|
43 - 50 | Download | |||
7 |
Honeypot Detection System
|
51 - 57 | Download | |||
8 |
Leveraging AI and Machine Learning to Decode Adversarial Tactics, Techniques, and Procedures
|
58 - 61 | Download | |||
9 |
FAKE NEWS DETECTION USING MACHINE LEARNING
|
62 - 66 | Download | |||
10 |
Cybersecurity Threat Analysis and Behaviour Analysis: A Comprehensive Approach to Proactive Défense
|
67 - 70 | Download | |||
11 |
Biohacking and Cybersecurity: The Threat of Implanted Medical Devices
|
71 - 77 | Download | |||
12 |
A Survey on Hybrid Secure Key Management System (HSKMS) for Multi-Tenant Cloud Environments
|
78 - 84 | Download | |||
13 |
Advanced Phishing Protection Techniques
|
85 - 89 | Download | |||