Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Register
Login
About
About the Journal
Aim & Scope
Privacy Statement
Policies
Join as an Editorial Board Member
Editorial Team
Current
Article Processing Charges
Archives
Author Guidelines
Indexing
Contact
Search
Home
/
Archives
/
Vol. 6 No. 2 (2026): Volume 6, Issue 2, 2026
Vol. 6 No. 2 (2026): Volume 6, Issue 2, 2026
Published:
01-04-26
Articles
Analysis of Microphone Exploitation Attacks and Development of Security Mitigation Strategies
1B. RaviKumar , 2 B. Dharani, 3 D. Kalyani, 4 B. Sanjeev (Author)
1-6
pdf
DESIGN AND IMPLEMENTATION OF A VULNERABLE WEB APPLICATION FOR SQL INJECTION ATTACK DEMONSTRATION AND PREVENTION
1 Ravinder, 2 G.Neha, 3 A.Sri vidhya , 4 Chandrakanth (Author)
7-14
pdf
STUDY OF ONION ROUTING , ANONYMITY NETWORKS AND SECURE DARK WEB ACCESS USING THE TOR NETWORK
1Madhunika,2A.Sagargoud,3A.Praveen kumar,4K.Ajay (Author)
pdf
SNAPCHAT LOG IN PHISHING SIMULATION
1Manaswini,2Rohan Patil.,3B.SaiKiran,4Shubham Maity (Author)
24-32
pdf
DETECTION AND PREVENTION OF WEBSITE CREDENTIAL HARVESTING ATTACKS THROUGH SECURITY MONITORING TECHNIQUES
1Ravinder , 2 C. Jitender, 3 V. Bhargav Sharma , 4 N. Harsha Vardhan (Author)
33-41
pdf
SECURE IMAGE -BASED DATA HIDING USING STEGANOGRAPHY TECHNIQUES
1Madhunika,2S.Sumithra,3N.Sahithya,4B.Durga bhavani siri (Author)
42-50
pdf
IMPLEMENTATION OF DETECTION AND PREVENTION TECHNIQUES
1 Tejaswi , 2 Tulasi, 3 D. Vidya, 4 A. Vishnu (Author)
51-58
pdf
ANALYSIS OF COMMAND-LINE AND GUI-BASED NETWORK SCANNING TECHNIQUES USING NMAP COMPARATIVE AND ZENMAP FOR SECURITY ASSESSMENT
1Manaswini,2B.Vineeth kumar,3k.Manoj,4.B.Naveen (Author)
59-65
pdf
Location Tracking Assessment
1 Tejaswi , 2 A. Manoj, 3 K. Kishore, 4 P. Vikas (Author)
66-74
pdf
Analysis of Brute Force Attack Techniques Using User-Pattern-Based Password Generation And Implementation of Defensive Counter Measures
1 B. RaviKumar , 2 Bhanu Chander, 3 B.Vamshi, 4 N.Manoj (Author)
75-82
pdf
TWIN TRAP: A LIGHTWEIGHT SECURITY MECHANISM FOR DETECTING ROGUE ACCESS POINTS IN PUBLIC WI-FI NETWORKS
1Manaswini , 2 V. Mythri, 3 G. Jyoshna, 4 Yaseen (Author)
83-91
pdf
Transformer Embeddings with Attention-Gated Structural Fusion for HDL Vulnerability Localization
M. K. Chakravarthy, Kandhipati Lakshmiprasanna, Bukkaraju Suchithra, Bellamkonda Sai Kiran, Bandapu Someswar Rao (Author)
92-98
Pdf
SmartWSN-IDS: A Hybrid Deep Reservoir and Optimized Tree Model for Routing Attack Detection
P. Bhargavi, Annangi Nishitha, Badugu Reethu Sri, Kaki Poorna Yamini, Kota Vishnu Vardhan Reddy (Author)
99-107
Pdf
A Dynamic Hybrid Stacking Approach for Real-Time Threat Detection in High-Mobility Vehicular Networks
A. Hemantha Kumar, Bodanapu Jafeer, Madathala Guru Eswar Reddy, Mamuduru Sumanth (Author)
108-116
Pdf
Hybrid Cognitive Framework for Fraud Detection using NLP and Transaction Behavior Analytics
G. Shanmugavel, Shaik Abdul Aleem, Shaik Yusufur Rahaman, Somisetty Venkata Manoj Kumar, Swarna Yaswanth (Author)
117-126
Pdf
ADOPTION OF ARTIFICIAL INTELLIGENCE IN ACCOUNTING AND ITS IMPACT ON FINANCIAL REPORTING QUALITY AND TRANSPARENCY
Yennam Venkat Reddy, Dr. E. Raghava Chaitanya, K. Sudhakar Reddy (Author)
127-140
Pdf
Stacked Machine Learning and SHAP-Based Insights for Hotel Cancellation Prediction
Mr G Ravi Chandra1|Yalamsetti Gopi2|Aspanna Pushpa Latha3|Chappidi Ashok Babu4|Pathan Gouse Basha5 (Author)
141-148
pdf
Deep Neural Networks For Reliable Detection Of Ai-Generated Text In Healthcare Systems
Ms T. Krishna Sai1|Lingireddy Anitha2|Thodeti Avinash3|Laga Srinu4|Neela Kiran Kumar5 (Author)
149-157
pdf
Intelli campus: An NLP-Driven Chat bot Framework for Seamless Campus Communication
Mrs Y.Nikhitha1|Ponnaganti Vijaya Pavani2|Bathina Supraja3|Vicharapu Mukesh Roshan4|Pulipati Saidulu5 (Author)
158-164
pdf
Safeguarding Clinical Data Privacy through Block chain Integrated For Multi Disease Detection
Mr P Venkat1|Ammisetty Lavanya2|Shaik Masuda3|Derangula Uligi Nadha Uday Kumar4|Oburi Venu Madhav Kumar (Author)
165-172
pdf
Green Secure: Intelligent Block chain-AI Platform for Agricultural Land Ownership 5.0
Mrs. Ch Manjula Deepthi1|Mandati Sujini2|Chittiboina Vasavi3|Nuggu Venkata Krishna4|Unnam Krishna Teja5 (Author)
173-180
pdf
Hybrid Intelligence Model for Malicious URL Detection Using Machine Learning and Graph Neural Networks
Dr. V. Nagagopiraju1|Maseed Zaheer2|Uppalapati Subbarao3|Nalliboyina Siva Krishna4|Gogula Dileep Reddy5 (Author)
181-188
pdf
Ai Driven Sustainable Prediction Model for Start Up Success Using Advanced Machine Learning Techniques
Mrs. K.Anusha1|Yeluri Narasimharao2|Challagundla Jyoshna3|Jonnalagadda Naveen Kumar4|Gopu Meghana5 (Author)
188-194
pdf
Ai Driven Predictive Analy tics for Early Disease Outbreak Detection Using Historical Multimodal Health Data
Mr. P.Bujji Babu1|Pamulapati Naga Sai2|Chimata Anil Kumar3|Kolluri Salomanraju4|Mundru Prasanna Sagar5 (Author)
195-201
pdf
Enhancing Emotion Detection from Facial Expressions using Advanced CNN Architectures
Mrs. Ch. Manjula Deepthi1|Shaik Asma2|Kakumanu Bhanu Prakash3|Poluri Adhwaith Krishna4|Sankarapu Pavan Kumar5 (Author)
202-208
pdf
CIFAKE: A Hybrid Approach for Detecting and Explaining AI-Generated Synthetic Images
Mrs. K.Anusha1|Mohammad Bushra Fathima2|Sukamanchi Chandu Sai3|Panduri Bhumesh4|Nelluri Vamsi Gopala Krishna5 (Author)
209-216
pdf
High‑Accuracy Phishing Classification Using Deep Models and Advanced Feature Importance
Mr.T.Vijaya Kumar,Gopi Chand Kanisetti,Marri Phanindra Reddy,Mallela Rajesh,Marri Venkata Gopal Reddy (Author)
217-222
pdf
Hybrid Temporal–Ensemble Learning for Adaptive Detection of Adversarial DNS Tunnels
Dr.B.N.Mallikarjuna Rao,Dhulipalla Teja,Shaik Reshma,Ravela Abhishek Kumar,Molabanti Sai Krishna (Author)
223-228
pdf
Adaptive Ensemble Classification with Recursive Feature Selection for Network Intrusion Detection
Mrs.M.Sandhya Rani,Bontha Asha Jyothi,Guvvala Divya Sukumar,Byrapaneni Srikanth,M.Deva Prasanna Kumar (Author)
229-234
pdf
Enhanced Intrusion Detection in Network Traffic via SMOTE‑Augmented Feature Reduction and Ensemble Learning
Mr.T.Jyothi Kumar,Nannapaneni Jai Karthik,Chavala srilakshmi,Medharametla Mahesh,Manohar (Author)
235-240
pdf
Fusion‑Based Deep Reinforcement Learning for High‑Precision Network Intrusion Classification
Mr.A.Anil,Mr.S.Sundara Mohan,Upputholla Narendra,Ghantasala sudarsan,Sanka Sambasivanarayana,G. Tharun (Author)
241-246
pdf
Ensemble-Based Detection of Application-Layer DDoS Attacks Generated by Publicly Accessible Toolkits
Mr.S.Sundara Mohan,Nidamanuri Gowthami,Maddiboyina Dora Swami Raju,Battula Nandini,Gudari gopiraju,Rathnakumar (Author)
247-251
pdf
Exploring Privacy and Security in Distributed Cloud Computing: A Survey on Federated Learning and Advanced Techniques
Mr. K. Subrahmanyam1 , Rangisetty Deepika2, Vinnakota Chandini Sri3, Nalluri Lakshmi Vyshnavi4, Pinjala Soma Sri5, Gunji Sandhya6 (Author)
252-258
pdf
Hybrid Machine Learning-Based Phishing Detection System Using URL Analysis
Mrs M. Lakshmi Bai¹, Sareddy Vijay Kumar Reddy², Satyala Rajesh Paul³, Jadapalli Lakshmaiah⁴,Vadde Jaswanth⁵, Mohammad Abdul Matheen⁶ (Author)
259-268
pdf
Cyber-Physical System Security in Industry 4.0 Manufacturing Using Parallel LSTM-CNN Based Orchestration Framework
Mrs Rajitha1, Sali Siemen 2, Gottipati Siva Manikanta3, Pinniboyina Sai Krishna 4, Pulakanam Mani Chakrish 5, Gollaprolu Maruthi 6 (Author)
268-272
pdf
A Security and Privacy-Preserving Consortium Blockchain-Based Accessing Control in Mobile Crowdsensing
Sri. M. Gopi Sai 1, Shaik Nagoor 2, Mahamkali Gopala Krishna 3, Pittu Balaji Reddy 4, Busiraju Raviteja 5, Thota Venkatesh 6 (Author)
277-284
pdf
A Machine Learning -Based Classification and Prediction Technique For DDOS
Sri. V Srikanth 1, Pinjala Jey Sankar Sai 2, Gavini Paulu3, Thota Venkata Sri Ram 4, Chukka Manikanta 5, Lakkakula Kalyan Babu 6 (Author)
285-292
pdf
IoT-Based RFID-Enabled Crowd Management and Child Safety System
V. Yuva Teja,M. Anuradha,V. Praneeth S.V.S,A. Phaneendra,S. Hemanth (Author)
293-298
pdf
Dual-Mode Hand Gesture and Line-Following Controlled Robotic Car
K. Prakash¹, K.G.S. Avinash², K. Meghana³, S. Karthikeya⁴, Y. Venkatesh⁵ , Ms. E. Sravya (Author)
299=303
pdf
IP Based Automotive Black Box for Accident Reporting and Anti-Theft Detection
P. Bhanu Sri¹, K. Sai Kishore2, S. Sagar3, M. Varun4, P. H. Amrit Varma5 , Mrs. A. Navya (Author)
304-307
pd
COMPARATIVE ANALYSIS OF DC EV AND BLDC EV IN NORMAL AND REGENERATIVE MODE OF OPERATION
1Mr. KONATHAM RAJU, 2GUDISA GOVINDA, 3SIDDANTHAPU NAVEEN KUMAR, 4 ILLURI YASWANTH REDDY , 5PUTLURI SIVA PRASANNA REDDY (Author)
308-314
Pdf
Enhancing Consumer Trust in Supply Chains Through BlockchainBased Product Traceability
C Charan, T Sunil Kumar Reddy (Author)
315-322
Pdf
An Advanced Hybrid Deep Learning Approach for Large-Scale Emotion Detection in Social Media Text Streams
D Bharath, K Bhaskar, A Dhanasekhar Reddy (Author)
323-331
Pdf
A Multi-Model Deep Learning Framework for Enhanced Network Intrusion Detection Across Diverse Datasets
G Rajesh, G Prathyusha, A Dheeraj (Author)
332-341
Pdf
Brain Tumor Detection and Localization Using Advanced Deep Learning Ensembles and YOLO-Based MRI Analysis
G Swapna, A V Indumathi (Author)
342-349
Pdf
Automated Vulnerability Detection in Smart Contracts Using Deep Learning
J Chanbasha, R R Shantha Spandana (Author)
350-356
Pdf
A Smart Learning Approach for Predicting Job Failures in Cloud Systems
M Hema Priyanka, K Keerthana (Author)
357-365
Pdf
Hybrid Deep Learning Framework for Short-Term Urban Parking Occupancy Prediction Using Multi-Model Architectures
N Pandu, D V Sushma Charitha, K Yatheendra (Author)
366-373
Pdf
An Intelligent Ensemble Learning Approach for Accurate Attack Detection in Large Scale Internet of Things Networks
E Pavithra, P Yaswanth, Syed Jeelan (Author)
374-382
Pdf
Automated Artificial Intelligence Approach for Reliable Earthquake Precursors Detection and Classification Using Hybrid Deep Learning Models
K Yatheendra, M Siva Priya, Jithendra Kukutla, Jithendra Kukutla (Author)
383-391
Pdf
Enhanced Fire and Smoke Detection Using Advanced YOLOv11 Variants for Improved Accuracy
T Bhargavkrishna, G Viswanath (Author)
392-398
Pdf
A HIERARCHICAL THREAT INTELLIGENCE SYSTEM FOR SCALABLE MALWARE DETECTION
Chitla Rahul, T. Sanath Kumar, Durishetti Anjali, Bodapatla Rajesh, Dudapaka Goutham, Bukya Arun (Author)
399-411
Pdf
DYNAMIC ROLE-BASED SECURITY FRAMEWORK WITH HYBRID VOTING CLASSIFIERS FOR SENSOR NETWORK PROTECTION
Edhigani Revathi, A. Nagarani, Rekha Gangula, G Bhanu Prakash, Dasari Prashanth, Kudikala Hari Priya (Author)
412-421
Pdf
A Robust Multi-Layer Stacking Model for Malicious Node Classification in Vehicular Networks
Kulla Swetha, P. Shireesha, Chiluveru Dinesh, Nutenki Nagaraju, Nagulapalli Manikanta, N Nagaraj Reddy (Author)
422-432
Pdf
Multi-Feature Wavelet-Based Network Intrusion Detection Using Machine Learning and Data Balancing Techniques
Rukhaya Khanam, R. Rajashekar, Rekha Gangula, Sai Naga Poojitha N, Guguloth Nithin, Polepaka Chaithanya (Author)
433-441
Pdf
Interpretable AI-Based Railway Communication Security Analysis Using Contextual Text Embeddings and Hybrid Rule-Based Models
Gattu Sandeep, Kiran Gadapaka, Dayakar Thalla, S Vishwanath Goud, Vadde Shiva, Nunavath Veeranna (Author)
442-452
Pdf
SecureFlow Analyzer: Live Packet Inspection and Threat Detection Framework
Asfiya Zareef, P. Shireesha, J. Lavanya, Mudide Nithya Sri, Nambi Sanjith, R Arjun Ranadheer (Author)
453-463
Pdf
TrustPay Analytics: Real-Time Fraud Detection Using Behavioral Intelligence in UPI Systems
K. Soumya, Bommera Keerthana, Bolleboina Rakesh, Syed Ziauddin, K Varalaxmi (Author)
464-473
Pdf
Hybrid Ensemble White Shark Optimizer for Fine-Grained Software Bug Detection
N. Rajesh, K. Srinivas, Nagapuri Akhil, Thota Vamshikrishna, Lingampalli Ankitha, Varanganti Navya (Author)
474-484
Pdf
Ensemble Text-Visual Anomaly Detection for Authentic Real Estate Listings
P. Prasanna, K. Srinivas, Ande Sathvika, Siddirala Sripriya, Bhukya Akash, Gantasala Adarsh (Author)
485-494
Pdf
DermaNetX: An Efficient Deep Learning Framework For Automated Skin Disease Classification
G. Sai Prashanth, K. Tharun Reddy, M. Praneeth, Mr. K. Karunakar (Author)
495-499
Pdf
BLOCKCHAIN-BACKED ZERO TRUST NETWORKING FOR SECURE EVENT LOGGING AND POLICY-GUIDED DATA ACCESS
J. Srikanth, Bandaru Abhinay, Bajjuri Saipriya, Bolle Shyam Kumar, Ettaboina Vinay (Author)
500-509
Pdf
Data Shield Vault: A Secure Exchange Framework Combining MFA, RSAAES Hybrid Cryptography, and SHA-256-Based Integrity with Role Logging
P. Vamshi Krishna, Chinthala Sahithya, Bandari Manohar, Dandu Abhinaya Sri (Author)
510-517
Pdf
Dynamic Pattern Intelligence for SQLi-Centric Anomaly Detection in Controlled Input Environments
Musham Swetha, K. Sharmila Reddy, Guntipally Keerthana, Aruri Raghavendra, Banothu Lavanya, Chinthakindi Teja (Author)
518-529
Pdf
CipherFlow Storage: Encrypted File Exchange across Distributed Content Networks
P. Subramanya Sai, Bhukya Niranjan, Akula Tejaswini, A Varshitha, Rangu Prashanth (Author)
530-538
Pdf
Trans Secure Health: Transformer-Driven Cyber Threat Intelligence and Vulnerability Analysis for Medical Systems
M. Vamshi, Pallapu Nageshwari, Kompelli Meenakshi, Milkuri Akhila, Pusa Madhu Kumar (Author)
539-549
Pdf
A Multi-Domain Access Governance Framework for Secure and Auditable Digital Certification Pipelines
Moola Swathi, Dubasi Laxmi Priya, Janga Bharath Yadav, Samala Ajay, Gali Vignesh (Author)
550-561
Pdf
IP Sentinel: A Decentralized Blockchain–IPFS Fabric for Secure Intellectual Asset Lineage and Ownership Proof
B. Kavya sree, Gopu Divya Jyothi, Gangarapu Bharath Kumar, Mogasani Naveen (Author)
562-570
Pdf
BLOCKCHAIN-ENABLED EVIDENCE INTEGRITY AND TRANSPARENCY FRAMEWORK FOR LAW ENFORCEMENT AGENCIES
Edla Varun, Gorre Divya Jyothi, Gorla Koushik, Marka Vinay Goud, Janagam Lokesh (Author)
571-581
Pdf
A Blockchain-Integrated Incremental Learning Framework for Adaptive Fraud Detection in Financial Transactions
Amgoth Ashok Kumar, K. Sharmila Reddy, Raidi Adithi Sree, Chennaboina Akshitha, Pandrala Amruth, Ramagiri Akshay (Author)
582-590
Pdf
A Dual-Layer Cryptographic Framework for Secure Image Data Embedding Using ECC, ChaCha20, and SHA-256
G. Sandhyarani, Vavilala Vasanth, Pallapu Kavya, Kalva Soumya, Lone Saicharan (Author)
591-601
Pdf
Next-Gen AI Cybersecurity Simulator with Real-Time Network Intelligence and Threat Visualization
P. Subramanya Sai, Gouru Swetha, Gurrapu Vamshi, Mohammed Aslam Nawaz, Muppu Archana (Author)
602-608
Pdf
Skin Cancer Detection Using Deep Learning
1Alluri Anusha,2Katta Surya Teja,3Gudivada Mounika,4Kurra Vamsi Gowtham,5Mr.K.S.R. Prasad (Author)
pdf
Predictive House Prices Using Machine Learning and Techniques
1Kuchipudi Krishna Vinay,2Garapati Jaya Lakshmi Akhil,3Mukku Lakshmi Naga Sasanka Varma,4Peethala Naga Venkata Vijay Kumar, 5Mr.P. Krupavaram (Author)
pdf
Predicting Rice Crop Diseases Using CNN Based Image Classification
1Boddu Likith Satya Surya Swaroop,2Ganta Geethika Sri,3Ramayanam Mohana Anusha, 4Gandarapu Akhil Soma Sekhar, 5Mr.K S R Prasad (Author)
pdf
Intelligent Forensic Analysis for Deep Fake Video Detection Using AI
1Gudivada Lakshmi Prasanna,2Indukuri Rishitha Bhavani,3Paili Gagana Harika, 4Chintapalli Gowtham Kumar,5Ms.U. Nissi Komal (Author)
pdf
Generative AI-Driven Fake News Detection and Rewriting Framework Using GPT For Accurate Media Verification and Content Correction
1CH.Divya,2S. Kota Sai Prudhvi,3BH. Jaya Sri,4R. Siva krishna,5G. Sujatha (Author)
pdf
NETWORK TRAFFIC CLASSIFICATION LEVERAGING MACHINE LEARNING ALGORITHMS
1 P.PRASHANTH, 2 A. MEGHANA, 3 B. SANKEERTHAN REDDY, 4 M.SUBHASH,5 K.VINAY KUMAR (Author)
pdf
COMPLETE LEARNING PLATFORM WITH GENI AI
1 A.NARESH, 2 K.SINDHU, 3 K.SAI VENKAT, 4 B.VARUN,5 E.HARI SAI (Author)
pdf
SECURE CHAT APPLICATION
1 CH.VIJAY SHANTI, 2 A. TEJASWINI , 3 K. SAMHITHA SREE, 4 B.NAVYA,5 J. HARSHAVARDHINI (Author)
pdf
MALWARE DETECTION AND BEHAVIOURAL CLASSIFICATION USING AI
1 K.JOTHSNA , 2 B. BHAVYA SREE, 3 K. BHAVANI, 4 CH. ABHIJITH,5 M. SATYA (Author)
pdf
SECURE FACE ACCESS CONTROL SYSTEM
1 K.SWETHA, 2 M. MANIKANTA GANDHI , 3 CH. PRAKASH, 4 N.ANVESH,5 M.SREELEKHA (Author)
pdf
A Novel Hybrid Deep Learning Model for Botnet Attacks Detection in a Secure IoMT Environment
Ms.K.Sai Durga,Mrs. Bethalam Jyothika,Ms.Myla Mohana Valli,,Mr. Chilakalapudi. Lalin Kumar, Mr. Korrapati Manikanta (Author)
17-22
pdf
Cyber Threat Hunting: A Proactive Approach to Network Security
Mr. V Koteswara Rao Pokuri,Ms. Vangala Deepika , Ms.Palla Venkata Triveni, Mr.Ravipati Sasidhar Reddy, Mr.Domari Ashok (Author)
pdf
LGB: Language Model and Graph Neural Network-Driven Social Bot Detection
Mr. N. Kiran Kumar,Mr. Bejjavarapu.Chenna Kesava, Ms. Chennamsetti Sahithi, Ms.Ramala.Hyma Krishnaveni, , Mr.Pulipati Imaniyelu (Author)
pdf
Machine Learning-Based Detection of Anomalies, Intrusions and Threats in Industrial Control Systems
Mr. V Koteswara Rao Pokuri,Ms. Gundreddi Nandini, Mr. Bonigala Chinnu, Mr. Janni Venkatesh, Mr. Sarimalla Suresh (Author)
pdf
Machine Learning in Hospitality: Interpretable Forecasting of Booking Cancellations
Ms.N.Pushpanjali,Ms.Manam Vani, Mr.Aritakula Naga Venkata Sai Krishna, Mr.Kattupalli Vinod, Mr.Malapati Venkateswarlu (Author)
pdf
A DESIGN AND SIMULATION OF LOW POWER 18T HYBRID MASTER-SLAVE FLIP-FLOP USING FREQUENCY DIVIDER
N. PRAVEEN KUMAR, N. Rakshitha, B. Chaitanya, S. Sri Ram, Ch. Durga Anudeep, H. Mohan, K. Lakshmi Krishna Murari (Author)
609-618
Pdf
DESIGN OFALOW NOISE AMPLIFIER
D.Vijaya Sri1 , Routhu Pallavi2 ,Ommari Himaja3 ,Gullipalli Sai Kumar4 , Lanka HarshaVardhan5 , Kapuganti Prasanna6 (Author)
619-624
Pdf
AN EVIDENTIARY TRUST FABRIC FOR LAW ENFORCEMENT WITH INTEGRITY ANCHORING AND OBSERVABLE CUSTODY STATE EVOLUTION
E. Sravanthi, Pabbathi Laxmiprasanna, Mulukutla Jahnavi, Kancharla Kritika Reddy (Author)
625-633
Pdf
Zero-Ambiguity Donation Channels via NFT-Encoded Auction Provenance in Distributed Benevolence Ledgers
K. Sunil Kumar, Mohammad Malik, Gujju Koushik, Nujetti Abinandhan (Author)
634-644
Pdf
A Resource-Aware Authenticity Model for Secure Propagation of SystemLevel Updates in IoT Ecosystems
V. Sowjanya, Datla Shravya, Jeripothu Sathwik, Kundella Yashwanth (Author)
645-653
Pdf
Edge-Enabled Diagnostic Engine with Homomorphic Encryption for RealTime Medical Decision Support
B. Rajesh Reddy, Marri Vignesh Kumar, Manchala Shashi Pradeep, Dolka Snehith (Author)
654-663
Pdf
A Hybrid IPFS - Ethereum Framework for Decentralized Cloud Storage Security
K. Vijaya Bhaskar Reddy, Kethavath Vinod, Sheri Shiva Prasad, Machini Manikanta (Author)
664-672
Pdf
A Modular Flask-Based Platform for Real-Time IoT Device Classification and Traffic Analysis
A. Hareesha, Pudari Ashritha Goud, Barrenkala Karthik, Ollem Lahari (Author)
673-682
Pdf
Scalable AI Framework for Real-Time Anomaly Detection and Authentication Threat Management in Digital Networks
J. Naresh, Venu Kumar Garshakurthy, Nagaluti Revanth Kumar, Supriya Boga (Author)
683-693
Pdf
Contextual Embedding-Based Railway Communication Threat Detection with Transparent AI Models
Bulusu Rama, Degala Sai Varun, Maroju Tharun Kumar, Suthrave Shashank (Author)
694-702
Pdf
Multi-Generation Network Classification Using Signal-Centric Decision Tree Algorithms
B. Poojitha, B. Malleswari, K. Manaswini, M. Tharunya (Author)
703-716
Pdf
Workforce Experience Indicators derived from Employee Text under Transformer-Based Multi-Label Analysis
B. Lakshman Rao, A. Kavya, G. Kalpana, G. Deepika (Author)
717-728
Pdf
P2P Traffic Intelligence System Employing Wavelet Bandwidth Analytics for Multivariate Anomaly Reasoning
N. Sai Sindhuri, Sk. Khadar Basha, Sk. Thoufeq Ahamed, T. V. Gopal Krishna, V. Rupesh (Author)
729-738
Pdf
A Study on Profitability Trend Analysis – Bandhan Bank
Sika Bindu¹, Kurva Nishitha², Sena Sudhir³, Ramannagari Akhil⁴, Dr. B. Narmada⁵ (Author)
694-701
Pdf
A STUDY ON CONSUMER PERCEPTIONS TOWARDS HYUNDAI
Jakkala Sandeep¹, Mudavath Ramesh², Ankila Shashank Reddy³, B Harshavardhan⁴, Mr. G. Mahesh⁵ (Author)
702-709
Pdf
A Study on Factors Influencing Investment Behavior Among Young Investors at HDFC
Bavu Ranadheer¹, Chityala Shankar Manikanta2 , Md Jahangeer3 , Chettukrindi Uday Chandra4 , Dr. Y. Azith5 (Author)
710-717
Pdf
A STUDY ON TRAINING NEED ANALYSIS AND DEVELOPMENT
Bagaipalli Jaya Vardhan¹, Gampa Pushpa2 , Kamble Krishnaveni3 , Kattula Jyothi4 , Ms. S. Ramya5 (Author)
718-726
Pdf
A STUDY ON CONSUMER PERCEPTION TOWARDS FLIPKART SERVICE QUALITY IN INDIA
Pasula Sridhar1 , Paddaku Umadevi2 , Kallem Sai, Gillala Hema Sree3 , Parvatham Pavan Durga4 , Mr. Shaik Abdul Zameel5 (Author)
727-733
Pdf
A STUDY ON FINANCIAL IMPACT OF GREEN BONDS ON CORPORATE SUSTAINABILITY AT NTPC LTD
Kandadi Sravya Reddy1 , N V N S Aashrith2 , G Nageshwari3 , Sattu Ajay Kumar4 , K.V. Chiranjeevi5 (Author)
734-741
Pdf
HUMAN-CENTERED AI IN MENTAL HEALTH: ETHICAL AND TECHNICAL CHALLENGES IN DIGITAL THERAPEUTICS
Dr. Simmi Prakash, Dr. K. Rama Krishna Baba, Dr. Devanjali Dutta, Kontham Abhinay Deep, Dr. Ashwini Sonawane, Sabyasachi Patra (Author)
742-747
Pdf
Machine Learning Based Cyber Attacks Detector in Software Difined Networks (Sdn) For Healthcare Systems
B. Ankama1 , Mr. Mr. V. Chandra Sekhar2 (Author)
748-757
Pdf
Latest publications
IF
Information
For Readers
For Authors
For Librarians
Language
English