Search Result

An Optimized Approach for Emotion Detection in Real- Time for Twitter Sentiment Analysis with Natural Language Processing

Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Pranjal Maurya, Upendra Nath Tripathi

Vol-11  Issue-3  June  2024

Download PDF View Abstract Google Crossref

No. of Downloads: 13 | No. of Views: 416

A Comprehensive Review for Detection and Prevention Techniques for SQL Injection Attack in Cloud Computing

Munish Saran, Rajan Kumar Yadav, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 53 | No. of Views: 1024

A Comprehensive Review for Detection and Prevention Techniques for SQL Injection Attack in Cloud Computing

Munish Saran, Rajan Kumar Yadav, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 53 | No. of Views: 1024

A Comprehensive Review for Detection and Prevention Techniques for SQL Injection Attack in Cloud Computing

Munish Saran, Rajan Kumar Yadav, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 53 | No. of Views: 1024

A Comprehensive Review for Detection and Prevention Techniques for SQL Injection Attack in Cloud Computing

Munish Saran, Rajan Kumar Yadav, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 53 | No. of Views: 1024

Mobile Cloud Computing Security and its Challenges

Rajan Kumar Yadav, Munish Saran, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google

No. of Downloads: 27 | No. of Views: 726

A Survey for Secure Routing Protocol Used in Internet of Things (IoT)

Pranjal Maurya, Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 51 | No. of Views: 1143

Using Different Methodologies of Data Science to Find Comparison Between Them for Cyber-Security

Sangeeta Devi, Pranjal Maurya, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 28 | No. of Views: 784

Indexed by

Crossref logo
-->
-->