Focus & Scope Author Guidelines Review Process Manuscript Template Publication Ethics Publication Frequency Open Access Policy Plagiarism Policy Editorial Board Processing Charge
Search
1 - 21 of 21 items
Zero Trust Architecture in Cloud Security: Enhancing Security Posture in the Cloud Era
Abstract : 170
PDF : 39
Assessment of RFID Implementation for Security in Electric Vehicle Charging Stations
Abstract : 57
PDF : 31
PiFortify: A Raspberry Pi-based Encryption Tool with Biometric Authentication
Abstract : 32
PDF : 32
Stegcryption: Graphical User Interface (GUI) Based File Protection System Utilizing Cryptography and Steganography
Abstract : 31
PDF : 25
Analyzing the Security Implications of Popular Video Conferencing Applications in Classified Environments: A Comprehensive Network Traffic Review
Abstract : 38
PDF : 27
Review of Network Intrusion Systems Evaluated on NSL-KDD and CIC-IDS2017 Datasets
Abstract : 44
PDF : 29
Securing e-commerce against SQL injection, cross site scripting and broken authentication
Abstract : 48
PDF : 23
Acrypt: Minimizing Data Leakage in Cloud Storage with Cryptography Encryption
Abstract : 33
PDF : 28
Simulation, Investigation and Response Towards Log4J Vulnerability (Log4Shell)
Abstract : 44
PDF : 41
1 - 21 of 21 items




