Table of Contents
Articles
Numerous Public Cloud Storage Solutions For Data Secure And Traceable | |
NEHRU KOMARAVOLU, Dr. M JAYAPAL, MADDURU SAMBASIVUDU | 10117 - 10121 |
Authenticated Digital Avatars on Metaverse by Cyber Security Procedures | |
TATAPUDI SIVA RAMAKRISHNA, Mrs LAKSHMI NALLA | 10122 - 10132 |
An IoT Based Gradient Descent Approach and ML for Precision Smart Crop Prediction | |
K L GANAPATHI REDDY, SUSHUMA NARKEDAMILLI | 10133 - 10137 |
A Literature Based Study on Cyber Security Vulnerabilities | |
ROSHINI SOWRIRAJAN | 10138 - 10141 |
A Study on Components Used in Constructing the RADAR | |
ROSHINI SOWRIRAJAN, THENMOZHI S.E, SNEHAA D | 10142 - 10144 |
Cloud Security Measures Using Machine Learning | |
ADABALA P V D L KUMAR, CHILLA SANTHI | 10145 - 10150 |
Medical Image Segmentation using Deep Learning using Segnet | |
SURESH SAPPA, GARAGA SUBBARAO | 10150 - 10156 |
Literature based Cyber Security Topics: Handbook | |
Dr SRIDHAR SESHADRI | 10157 - 10182 |
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.