Skip to main content
Cyber Times International Journal of Technology & Management
Where Research is Passion
nike flyknit roshe electric green black Paris 308270 - SBD - nike boot with side zipper jeans black pants size , 111 Release Date
Adidas x Pharrell NMD HU Gold - adidas Nizza Platform Mid Parley Almost Blue W Release Date - SBD
Jordan Trunner Q4 343408-171 - Air LOW Jordan 1 Art Basel Igloo Rust Pink - LOW Jordan LOW Jordan ADG 3 sneakers Schwarz
Jo malone jasmine sambac & marigold💥оригинал миниатюра travel 9 мл spray цена за 1мл — цена 60 грн в каталоге Парфюмерия ✓ Купить товары для красоты и здоровья по доступной цене на Шафе , Украина #23711571
Air MUS12 Jordan 3LAB5 Gamma Blue Metallic Silver - MUS12 Jordan Air 200e Men Dc9836-200 - 200 - MUS12 Jordan Air 200e Men Dc9836
Home
Conference
Editorial Board
Publications
Gallery
Contact Us
Vol 9 Issue 2
!!!! Bi-Annual Double Blind Peer Reviewed Refereed Journal !!!!
!!!! Open Access Journal !!!!
A NOVEL DESIGN OF SLOT PATCH ANTENNA FOR MOBILE/WLAN/Wi-MAX/ LTE APPLICATIONS
VAMPIRE ATTACK IN WSN: A DETECTION AND PREVENTION APPROACH AGAINST VAMPIRE
INJECTED SHELLCODE DETECTION USING REVERSE ENGINEERING
INVESTIGATION AND ANALYSIS PROCESS OF MOBILE FORENSICS
A SURVEY ON FORENSICS INVESTIGATION OF CLOUD STORAGE APPLICATIONS ON ANDROID DEVICES
SURVEY ON TRAFFIC-MONITORING AND ANALYSIS THROUGH DARKNET
A SURVEY: IOT BASED CROP HEALTH MONITORING SYSTEM
A DETAIL STUDY ABOUT IOT, SECURITY ISSUES WITH IOT AND SURVEY OF PROTECTING SYSTEM FOR AUTHENTICATION AT GATEWAY
A SURVEY OF DATA LEAKAGE DETECTION AND PREVENTION
SURVEY FOR E-GOVERNANCE IN GIS SYSTEM WITH SECURE VALIDATION ON CLOUD ARCHITECTURE
SURVEY OF ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK
MALWARE OBFUSCATION TECHNIQUES TO BYPASS AV ENGINES
DETECTION OF ROGUE ACCESS POINT TO PREVENT EVIL TWIN ATTACK IN WIRELESS NETWORK A SURVEY
SURVEY ON RECOGNITION BASED GRAPHICAL PASSWORD AUTHENTICATION METHODS
INTRUSION DETECTION USING PSO A REVIEW
A SURVEY ON ADABOOST ALGORITHM WITH FEATURE SELECTION, MODBOOST, AND ACCELERATED BOOSTING
A WIDE SLOT MONOPOLE PLANAR ANTENNA FOR MOBILE/WLAN/WIMAX/ NETWORK SECURITY APPLICATIONS
A BRIEF SURVEY OF INTRUSION DETECTION AND PREVENTION IN INTERNET OF THINGS
A BRIEF SURVEY ON CYBER CRIME IN THE EXISTING SCENARIO
A SURVEY ON HELLO FLOOD ATTACK IN WIRELESS SENSOR NETWORKS
SURVEY OF INSIDER ATTACK MITIGATION TECHNIQUE ON VANETS
DEFENSE APPROACH AGAINST REMOTE FILE INCLUSION ATTACK IN WEB BASED APPLICATIONS USING SECURE CODING
JPEG IMAGES EMBEDDED WITH HIDDEN MALICIOUS CODES
SIMULATION BASED COMPARISON BETWEEN OWL AND DSDV
A SURVEY OF DIFFERENT METHODS OF HYBRID CRYPTOGRAPHY
HOME-BASED SECURITY SYSTEMS AND IOT
A COMPREHENSIVE STUDY ON MALWARE DETECTION APPROACHES BASED ON DATA MINING TECHNIQUES
COMPARISON OF VARIOUS CRYPTOGRAPHIC ALGORITHMS UNDER THE CLOUD FOR DATA SECURITY
SURVEY IN SECURITY AND CHALLENGES ON HOME ARE NETWROK (HAN) IN SMART GRID
ANALYSIS OF MEDICAL IMAGE DEFECTS USING RELIABLE COMPUTING
A STUDY OF IMPLEMENTATION USING ELLIPTIC CURVE CRYPTOGRAPHY BASED SMART CARD
A SURVEY FOR PRACTICING ENTERPRISE CONTENT MANAGEMENT (ECM) FOR INDIAN RD ORGANIZATION AND ITS BEHVIORAL ASPECT
A JUDGMENTAL INVESTIGATION AND PRESUMPTION TO ENHANCE SECURE WEB SERVICE
SURVEY ON WEB APPLICATION SECURITY TEST HARNESS METHODS
SECURITY MEASURES OF WORDPRESS VULNERABILITIES FOR WEB
CRYPTOGRAPHY ALGORITHM IN QUANTUM COMPUTING FOR SECURITY
ISSN No.: 2278-7518
CTIJTM Policies
Peer Review Policy
Publication and Authorship
Editorial Responsibilities
Anti Plagiarism Policy
Ethics Policy
Malpractice Policy
CopyRight Policy
Author's Section
Author's Responsibility
Author Guidelines
Call for Papers
Certificate of Originality
Sample Paper
Submit your paper
Enquiry Form
Previous Conference Sponsors
User login
Username
*
Password
*
Request new password
SPAM PROTECTION
Enter the characters shown in the image.
What code is in the image?
*
Enter the characters shown in the image.
Join Us On!