Search Result

A Comprehensive Review for Detection and Prevention Techniques for SQL Injection Attack in Cloud Computing

Munish Saran, Rajan Kumar Yadav, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Crossref

No. of Downloads: 33 | No. of Views: 476

Mobile Cloud Computing Security and its Challenges

Rajan Kumar Yadav, Munish Saran, Pranjal Maurya, Sangeeta Devi, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract

No. of Downloads: 18 | No. of Views: 385

A Survey for Secure Routing Protocol Used in Internet of Things (IoT)

Pranjal Maurya, Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Crossref

No. of Downloads: 27 | No. of Views: 418

A Survey for Secure Routing Protocol Used in Internet of Things (IoT)

Pranjal Maurya, Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Crossref

No. of Downloads: 27 | No. of Views: 418

A Survey for Secure Routing Protocol Used in Internet of Things (IoT)

Pranjal Maurya, Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Crossref

No. of Downloads: 27 | No. of Views: 418

A Survey for Secure Routing Protocol Used in Internet of Things (IoT)

Pranjal Maurya, Sangeeta Devi, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Crossref

No. of Downloads: 27 | No. of Views: 418

Using Different Methodologies of Data Science to Find Comparison Between Them for Cyber-Security

Sangeeta Devi, Pranjal Maurya, Munish Saran, Rajan Kumar Yadav, Upendra Nath Tripathi

Vol-9  Issue-5  October  2022

Download PDF View Abstract Crossref

No. of Downloads: 18 | No. of Views: 318

Indexed by

Crossref logo
-->
-->