Search Result

A Comprehensive Review for Detection and Prevention Techniques for SQL Injection Attack in Cloud Computing

Munish Saran, Rajan Kumar Yadav, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 49 | No. of Views: 779

Mobile Cloud Computing Security and its Challenges

Rajan Kumar Yadav, Munish Saran, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google

No. of Downloads: 25 | No. of Views: 585

A Survey for Secure Routing Protocol Used in Internet of Things (IoT)

Pranjal Maurya, Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 48 | No. of Views: 946

A Survey for Secure Routing Protocol Used in Internet of Things (IoT)

Pranjal Maurya, Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 48 | No. of Views: 946

A Survey for Secure Routing Protocol Used in Internet of Things (IoT)

Pranjal Maurya, Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 48 | No. of Views: 946

A Survey for Secure Routing Protocol Used in Internet of Things (IoT)

Pranjal Maurya, Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 48 | No. of Views: 946

Using Different Methodologies of Data Science to Find Comparison Between Them for Cyber-Security

Sangeeta Devi, Pranjal Maurya, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Google Crossref

No. of Downloads: 26 | No. of Views: 617

Indexed by

Crossref logo
-->
-->