Volume 8, Issue 1, Jan, 2020
ISSN: 2321-5992, Journal IMPACT Factor: 8.98
Volume 8, Issue 1, Jan, 2020
The Impact of Digital Transformation on Corporate Strategy
Authors: Deepika
A Survey on Security Issues in Mobile Ad Hoc Networks.
Authors: K. Jeevan Pradeep, Prashanth Kumar Shukla
Performance Analysis of Routing Protocols in Delay Tolerant Networks.
Authors: Neetha George
A Study on Energy Efficient Scheduling Algorithms for Cloud Computing.
Authors: Jianhang Liu
Volume 8, Issue 2, Feb, 2020
The Impact of Digital Transformation on Corporate Strategy
Authors: Brij B. Gupt
A Review of Intrusion Detection Systems for Wireless Sensor Networks.
Authors: Tarik Chafiq
A Survey on Data Mining Techniques for Big Data Analysis.
Authors: C.Pooja, A. Sabarmathi
A Survey on Deep Learning Techniques for Natural Language Processing.
Authors: Prof. Franklin Wabwoba
A Review of Reinforcement Learning Algorithms for Robotics.
Authors: Dr. Nambiro Alice
Volume 8, Issue 3, Mar, 2020
A Study on Computer Vision Techniques for Object Recognition.
Authors: Prakash Khanale
A Survey on AI Applications in Healthcare.
Authors: Mridul Mishra
A Review of AI Ethics and Bias.
Authors: Nrutyangana Mohapatra
Secure Routing Protocols for Mobile Ad-hoc Networks: A Comparative Analysis.
Authors: Anup Roy
Enhancing Network Security with Intrusion Detection Systems: A Machine Learning Approach.
Authors: Dr. Arnab Bhattacharya
Volume 8, Issue 4, April, 2020
Network Forensics: Investigating Cybercrime in Cloud Environments.
Authors: Arnold Mashud Abukari
Performance Evaluation of SDN Controllers in Data Center Networks.
Authors: Seidu Nimatu
The Impact of 5G on IoT Security: Challenges and Solutions.
Authors: Jhansi Bharathi
Volume 8, Issue 5, May, 2020
Blockchain Technology for Secure Data Sharing in Cloud Computing.
Authors: Damian Schofield
A Survey on Denial-of-Service Attacks and Mitigation Techniques.
Authors: S. Suresu
Cybersecurity in Smart Cities: Vulnerabilities and Countermeasures.
Authors: Saptarshi Bhattacharyya
Improving Library Cataloging Efficiency with Image Processing.
Authors: Mrs. Jyoti, Mrs. Meena M, Mr. Anil Kumar K
Volume 8, Issue 6, June, 2020
Security Challenges in Wireless Sensor Networks for Industrial Applications.
Authors: Xing Zhao, Ooi Boon Keat , Jacquline Tham
Privacy-Preserving Techniques in Big Data Analytics.
Authors: Surekha Lanka, Nay Myo Sandar
Energy-Efficient Routing Protocols for Wireless Sensor Networks.
Authors: Michael Ceasar R
Volume 8, Issue 7, July, 2020
The Impact of Digital Transformation on Corporate Strategy
Authors: R. Vijayalakshmi, R. S. Ravichandran
Quality of Service (QoS) Provisioning in Software-Defined Networking.
Authors: K. Shravani, A.Srinivasula Reddy
Congestion Control Algorithms for High-Speed Networks.
Authors: Pramod V.R, Mrs. Aparna.M
Volume 8, Issue 8, Aug, 2020
Network Virtualization for Cloud Computing: Performance and Security.
Authors: Raj Vikram Singh
The Role of AI in Network Security Automation.
Authors: Saurabhi Chaudhary
Securing the Internet of Medical Things (IoMT): Challenges and Solutions.
Authors: Bijendra Kumar
A Comparative Study of Network Simulation Tools.
Authors: S. Meena Rani
Volume 8, Issue 9, Sep, 2020
Mobile Ad Hoc Network Routing Protocols: A Performance Comparison.
Authors: E S V Subrahmanyam , Ranabothu Govardhan, Krishnakartik M
Delay Tolerant Networks: Routing and Security Challenges.
Authors: Varsha M
Volume 8, Issue 10, Oct, 2020
Securing Cloud Storage: Encryption and Access Control Mechanisms.
Authors: Jeffrey Ken B. Balangao
Intrusion Detection in IoT Networks using Machine Learning.
Authors: Bishnupriya Mishra
Blockchain for Secure Data Management in Healthcare.
Authors: B Bhaskar Rao, Chandrakant Naikodi
Volume 8, Issue 11, Nov, 2020
The Future of Network Security: Quantum Computing and Cryptography.
Authors: Swati Arya, Ashwani
Edge Computing Security: Protecting Data at the Network Edge.
Authors: Dogha Mohamed Soufiane
Secure Communication Protocols for Industrial Control Systems.
Authors: Vaibhav V. Khond
Efficient Resource Allocation in Cloud Computing Environments
Authors: Shabana Naaz, Senior Grade Lecturer, Department of Computer Science & Engineering, Govt. Women's Polytechnic, Kalaburagi, Karnataka, India
Vijaykumar Wallure, Senior Grade Lecturer, Department of Computer Science & Engineering, Government. Polytechnic, Aurad (B), Karnataka, India
Farheen Jahan Aara,Senior Grade Lecturer, Department of Computer Science & Engineering, Govt. Women's Polytechnic, Kalaburagi, Karnataka, India
Volume 8, Issue 12, Dec, 2020
Software Defined Networking Security: Challenges and Solutions.
Authors: R.Nathiya
The Impact of Network Function Virtualization on Security.
Authors: Prajeesha M.P., S. Packialakshmi
Security Considerations for Mobile Cloud Computing.
Authors: Cheekati Sushmasree