Skip to main content
Cyber Times International Journal of Technology & Management
Where Research is Passion
IetpShops Denmark - Asymmetrical body with logo ADIDAS fy3960 Originals - adidas fy3960 Performance 720
Baseball cap Casablanca - VbjdevelopmentsShops Egypt - carhartt united script cap
nike Boys Air Zoom Spiridon Cage 2 "Black" - StclaircomoShops - nike Boys 77 Campfire Orange
Тени для век perricone md no makeup eyeshadow — цена 1250 грн в каталоге Тени для век ✓ Купить товары для красоты и здоровья по доступной цене на Шафе , Украина #137710590
air jordan 6 carmine 2021 release date
Home
Conference
Editorial Board
Publications
Gallery
Contact Us
Vol 9 Issue 2
!!!! Bi-Annual Double Blind Peer Reviewed Refereed Journal !!!!
!!!! Open Access Journal !!!!
A NOVEL DESIGN OF SLOT PATCH ANTENNA FOR MOBILE/WLAN/Wi-MAX/ LTE APPLICATIONS
VAMPIRE ATTACK IN WSN: A DETECTION AND PREVENTION APPROACH AGAINST VAMPIRE
INJECTED SHELLCODE DETECTION USING REVERSE ENGINEERING
INVESTIGATION AND ANALYSIS PROCESS OF MOBILE FORENSICS
A SURVEY ON FORENSICS INVESTIGATION OF CLOUD STORAGE APPLICATIONS ON ANDROID DEVICES
SURVEY ON TRAFFIC-MONITORING AND ANALYSIS THROUGH DARKNET
A SURVEY: IOT BASED CROP HEALTH MONITORING SYSTEM
A DETAIL STUDY ABOUT IOT, SECURITY ISSUES WITH IOT AND SURVEY OF PROTECTING SYSTEM FOR AUTHENTICATION AT GATEWAY
A SURVEY OF DATA LEAKAGE DETECTION AND PREVENTION
SURVEY FOR E-GOVERNANCE IN GIS SYSTEM WITH SECURE VALIDATION ON CLOUD ARCHITECTURE
SURVEY OF ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK
MALWARE OBFUSCATION TECHNIQUES TO BYPASS AV ENGINES
DETECTION OF ROGUE ACCESS POINT TO PREVENT EVIL TWIN ATTACK IN WIRELESS NETWORK A SURVEY
SURVEY ON RECOGNITION BASED GRAPHICAL PASSWORD AUTHENTICATION METHODS
INTRUSION DETECTION USING PSO A REVIEW
A SURVEY ON ADABOOST ALGORITHM WITH FEATURE SELECTION, MODBOOST, AND ACCELERATED BOOSTING
A WIDE SLOT MONOPOLE PLANAR ANTENNA FOR MOBILE/WLAN/WIMAX/ NETWORK SECURITY APPLICATIONS
A BRIEF SURVEY OF INTRUSION DETECTION AND PREVENTION IN INTERNET OF THINGS
A BRIEF SURVEY ON CYBER CRIME IN THE EXISTING SCENARIO
A SURVEY ON HELLO FLOOD ATTACK IN WIRELESS SENSOR NETWORKS
SURVEY OF INSIDER ATTACK MITIGATION TECHNIQUE ON VANETS
DEFENSE APPROACH AGAINST REMOTE FILE INCLUSION ATTACK IN WEB BASED APPLICATIONS USING SECURE CODING
JPEG IMAGES EMBEDDED WITH HIDDEN MALICIOUS CODES
SIMULATION BASED COMPARISON BETWEEN OWL AND DSDV
A SURVEY OF DIFFERENT METHODS OF HYBRID CRYPTOGRAPHY
HOME-BASED SECURITY SYSTEMS AND IOT
A COMPREHENSIVE STUDY ON MALWARE DETECTION APPROACHES BASED ON DATA MINING TECHNIQUES
COMPARISON OF VARIOUS CRYPTOGRAPHIC ALGORITHMS UNDER THE CLOUD FOR DATA SECURITY
SURVEY IN SECURITY AND CHALLENGES ON HOME ARE NETWROK (HAN) IN SMART GRID
ANALYSIS OF MEDICAL IMAGE DEFECTS USING RELIABLE COMPUTING
A STUDY OF IMPLEMENTATION USING ELLIPTIC CURVE CRYPTOGRAPHY BASED SMART CARD
A SURVEY FOR PRACTICING ENTERPRISE CONTENT MANAGEMENT (ECM) FOR INDIAN RD ORGANIZATION AND ITS BEHVIORAL ASPECT
A JUDGMENTAL INVESTIGATION AND PRESUMPTION TO ENHANCE SECURE WEB SERVICE
SURVEY ON WEB APPLICATION SECURITY TEST HARNESS METHODS
SECURITY MEASURES OF WORDPRESS VULNERABILITIES FOR WEB
CRYPTOGRAPHY ALGORITHM IN QUANTUM COMPUTING FOR SECURITY
ISSN No.: 2278-7518
CTIJTM Policies
Peer Review Policy
Publication and Authorship
Editorial Responsibilities
Anti Plagiarism Policy
Ethics Policy
Malpractice Policy
CopyRight Policy
Author's Section
Author's Responsibility
Author Guidelines
Call for Papers
Certificate of Originality
Sample Paper
Submit your paper
Enquiry Form
Previous Conference Sponsors
User login
Username
*
Password
*
Request new password
SPAM PROTECTION
Enter the characters shown in the image.
What code is in the image?
*
Enter the characters shown in the image.
Join Us On!