Search Result

An Optimized Approach for Emotion Detection in Real- Time for Twitter Sentiment Analysis with Natural Language Processing

Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Pranjal Maurya, Upendra Nath Tripathi

Vol-11  Issue-3  June  2024

Download PDF View Abstract Google Crossref

No. of Downloads: 8 | No. of Views: 78

A Comprehensive Review for Detection and Prevention Techniques for SQL Injection Attack in Cloud Computing

Munish Saran, Rajan Kumar Yadav, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 52 | No. of Views: 911

Mobile Cloud Computing Security and its Challenges

Rajan Kumar Yadav, Munish Saran, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google

No. of Downloads: 26 | No. of Views: 647

A Survey for Secure Routing Protocol Used in Internet of Things (IoT)

Pranjal Maurya, Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 50 | No. of Views: 1089

A Survey for Secure Routing Protocol Used in Internet of Things (IoT)

Pranjal Maurya, Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 50 | No. of Views: 1089

A Survey for Secure Routing Protocol Used in Internet of Things (IoT)

Pranjal Maurya, Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 50 | No. of Views: 1089

A Survey for Secure Routing Protocol Used in Internet of Things (IoT)

Pranjal Maurya, Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 50 | No. of Views: 1089

Using Different Methodologies of Data Science to Find Comparison Between Them for Cyber-Security

Sangeeta Devi, Pranjal Maurya, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 27 | No. of Views: 717

Indexed by

Crossref logo
-->
-->