A Unit of I2OR
IJRECE_G809
Download Paper
IJRECE_G810
Download Paper
IJRECE_G811
Download Paper
IJRECE_G812
Download Paper
IJRECE_G813
Download Paper
IJRECE_G814
Download Paper
IJRECE_G815
Download Paper
IJRECE_G816
Download Paper
IJRECE_G817
Download Paper
IJRECE_G818
Download Paper
IJRECE_G819
Download Paper
IJRECE_G820
Download Paper
IJRECE_G821
Download Paper
IJRECE_G822
Download Paper
IJRECE_G823
Download Paper
IJRECE_G824
Download Paper
IJRECE_G825
Download Paper
IJRECE_G826
Download Paper
IJRECE_G827
Download Paper
IJRECE_G828
Download Paper
IJRECE_G829
Download Paper
IJRECE_G830
Download Paper
IJRECE_G831
Download Paper
IJRECE_G832
Download Paper
IJRECE_G833
Download Paper
IJRECE_G834
Download Paper
IJRECE_G835
Download Paper
IJRECE_G836
Download Paper
IJRECE_G837
Download Paper
IJRECE_G838
Download Paper
IJRECE_G839
Download Paper
IJRECE_G840
Download Paper
IJRECE_G841
Download Paper
IJRECE_G842
Download Paper
IJRECE_G843
Download Paper
IJRECE_G844
Download Paper
IJRECE_G845
Download Paper
A research Paper for Symmetric and Asymmetric Cryptography
Akshay Kekunnaya, Rajeshwari Gundla, Siddharth Nanda
A Comphrehensive Study on Known Plaintext Attack,Chosen Plaintext Attack and Ciphertext Only Attack.
Kanika Kapoor, Siddharth Nanda, Rajeshwari Gundla
A Comprehensive Study on Biometrics Authentication
Kanika Kapoor, Jemima Abraham
A Study on Firewall
Rohan Dhadge, Himabindu Kasireddi, Sakshee Thakare, Ananya Choudhary, Deepti Dave
Advanced Persistence Threat and Cyber warfare
Pratik Hinge, Rajeshwari Gundla, Siddharth Nanda
Facebook Spoofing and Messenger Calling
Akash Shitole, Sneha Ambhore
Comparison of Symmetric Cryptographic Techniques
Akash Shitole, Siddharth Nanda, Rajeshwari Gundla
Comparative analysis of cryptographic streams
Anand Patil ,OmkarShendre, Shashank Singh, Shivam Singh, Shubham Gupta, Deepti Dave
Comparative Study of CIA Triad
Aishwarya patil, Shreyash Patil, Siddhi Jadhav, Prof. Sneha Ambhore
Methods of managerial, procedural and technical controls for virus and worms
Mihirwalia, Siddharth Nanda, Rajeshwari Gundla
Cyber Attacks and Its Types
Mintu Patel, Needa Mugut, Rahul Agarwal, Shubham Telkar, Sneha Ambore
Survey on Enigma Machine
Aadesh Darawade, Sanket Gaikwad, SuyashChavan, Deepti Dave
Fileless malware
Aditya Chopade, Shlok Sawant, Suyog Surve, Sneha Ambhore
Increasing Efficiency of Indian Healthcare System
Prerit Shah, Sneha Ambhore
A Way to Securely use Instagram App
Akshay Kekunnaya, Sneha Ambhore
Un-authorized access for security portal in User Interface
Sayali Ambre, Radhika Ajani, Sneha Ambhore
Home Security based on GSM using Arduino
Hiren Chafekar, Harsh Shah, Anmol Hariyani, Sneha Ambhore
Image Forgery
Pratik Ramesh Hinge, Sneha Ambhore, Yogesh Ratnaparkhe, Kshitij Wadekar, Prof Sneha Ambhore
A Novel Approach of in halt based Video Recuperation System using Optimal Character Recognition Technologies | Apurva Kandelkar, Rohini Deshmane, Monali Bachhav
Information Gathering with E-Governance Websites
Suyog Kharche, Sneha Ambhore
Comparison between the types of Substitute Ciphers
Jemima Abraham, Siddharth Nanda, Rajeshwari Gundla
A New Approach to Secure Smartphone Applications
Jemima Abraham, Sneha Ambhore, Kanika Kapoor
A Review on Vulnerabilities in Mahavitaran Mobile Application
Mayuri More, Sneha Ambhore
P3 Whatsapp
Prerna Bhajbhuje, Sneha Ambhore
Preventive vs Detective vs Corrective Security Controls
Prakash Choudhary, Rajeshwari Gundla, Siddharth Nanda
A Comprehensive Study of Retail Based Recommendation System
Nirupma Singh, Siddharth Nanda
Managerial Procedural Technical Controls for Rootkit
Prajwal Sonawane, Rajeshwari Gundla, Siddharth Nanda
A Comparative Study on Virus Vs Worm Vs Trojan
Sayaliambre, Siddharth Nanda, Rajeshwari Gundla
Social Engineering - The Dark Art of Manipulation
Prerit Shah, Siddharth Nanda, Rajeshwari Gundla
SSL/TLS - Attacks and It’s Fixes
KiranRaj KG, Shahikant Khot, Sneha Ambhore
Human based Vs Computer based Social Engineering
Prerna Bhajbhuje, Rajeshwari Gundla, Siddharth Nanda
Study on Multitenancy security in Cloud Computing
Deepti Dave,
Survey on Network Security Attacks
Ajay Yadav, Hari Krishnan, Raju Prasad, Deepti Dave
Survey on Symmetric Key Cryptography
Animesh Kumar, Deepak Idnani, Kaushal Soni, Nitin Taneja, Rounak Shrivastava, Prof. Sneha Ambhore
Trojan Vs Rat Vs Rootkit
Mayuri More, Rajeshwari Gundla, Siddharth Nanda
Methods for Spoofing Caller ID with TrueCaller
Mihir Walia, Sneha Ambore
Validation of One-Time Password (OTP)
Sachin Kumar Maurya, Sneha Ambhore
Special Issue | Comprehensive Study of Network Security and Data Analytics.
Guest Editor Names: