Abstract is missing.
- Reinforcement Technique for Classifying Quasi and Non-quasi Attributes for Privacy Preservation and Data ProtectionSharath Yaji, Bayyapu Neelima. 3-17 [doi]
- Non-malleable Codes from Authenticated Encryption in Split-State ModelAnit Kumar Ghosal, Dipanwita Roychowdhury. 18-33 [doi]
- Continuously Non-malleable Codes from Authenticated Encryptions in 2-Split-State ModelAnit Kumar Ghosal, Dipanwita Roychowdhury. 34-45 [doi]
- Deep Learning Based Differential Classifier of PRIDE and RC5Debranjan Pal, Upasana Mandal, Abhijit Das 0004, Dipanwita Roy Chowdhury. 46-58 [doi]
- A Better MixColumns Matrix to AES Against Differential Fault Analysis AttackAnit Kumar Ghosal. 59-70 [doi]
- Variants of Crypto-Jacking Attacks and Their Detection TechniquesP. Mercy Praise, S. Basil Xavier, Anoop Jose, G. Jaspher W. Kathrine, J. Andrew. 71-87 [doi]
- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-sourced Data in Social Media PlatformsKeshav Kapur, Rajitha Harikrishnan, S. Raghavendra. 88-97 [doi]
- Modified Blowfish Encryption Algorithm for Wireless Body Area NetworkS. Divya, K. V. Prema, Balachandra Muniyal. 98-108 [doi]
- EyeEncrypt: A Cyber-Secured Framework for Retinal Image SegmentationGovardhan Hegde, Shourya Gupta, Gautham Manuru Prabhu, Sulatha V. Bhandary. 109-120 [doi]
- Cosine Similarity Based Group Movie Recommendation Scheme Considering Privacy of UsersC. Tripti, R. Manoj, P. B. Rinsha, Megha Suresh, Niya Jain, Tanya Sunish. 121-129 [doi]
- Enhancing Face Recognition Accuracy Using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber SecurityPranav Virmani, Srikanth Prabhu, Ramya S.. 130-142 [doi]
- Intrusion Detection Using Federated LearningG. K. Sudhina Kumar, K. Krishna Prakasha, Balachandra Muniyal. 143-151 [doi]
- Analysis of Classification Algorithms for Predicting Parkinson's Disease and Applications in the Field of CybersecurityU. Sumalatha, K. Krishna Prakasha, Srikanth Prabhu, Vinod C. Nayak. 155-163 [doi]
- Optimization of Secured Cluster Based Charging Dynamics and Scheduling of EV Using Deep RNNShivanand C. Hiremath, Jayashree D. Mallapur. 164-177 [doi]
- Analysis and Prognosis of Water Quality for River Ganga Using Water Quality IndexYash Bijalwan, Pranav Chaudhari, Om Sharma, S. Raghavendra. 178-190 [doi]
- Detection of Android Ransomware Using Machine Learning ApproachAnoop Jose, C. Priyadharsini, P. Mercy Praise, G. Jaspher W. Kathrine, J. Andrew. 191-203 [doi]
- Cyber Security and Layering of Medical Data Using Machine Learning AlgorithmsAnmol Garg, Jay Singhvi, Saurav Sabu, Rushikesh Sahu, Srikanth Prabhu, Arti Pawar. 204-226 [doi]
- Analysis on Classification of Handwritten Devanagari Characters Using Deep Learning ModelsSai Prashanth Duddela, Senthil Kumaran, Priya R. Kamath. 227-240 [doi]
- Analysis and Comparison of Different Frontend FrameworksSuryaansh Rathinam. 243-257 [doi]
- Lightweight Capability-Based Access Control for Internet of Things (IoT)S. Deepthi, Shrey Khandwekar. 258-266 [doi]
- Securing IoT Using BlockchainS. Deepthi, Apoorva. 267-278 [doi]
- VIKAS: A Multimodal Framework to Aid in Effective Disaster ManagementGautham Manuru Prabhu, Tanay Gupta, Metta Venkata Srujan, A. R. Soumya, Anshita Palorkar, Anurag Chowdhury. 279-289 [doi]
- Discovery of Rare Itemsets Using Hyper-Linked Data Structure: A Parallel ApproachGoutham Yadavalli, Shwetha Rai. 290-301 [doi]