Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Register
Login
About
About the Journal
Aim & Scope
Privacy Statement
Policies
Join as an Editorial Board Member
Editorial Team
Current
Article Processing Charges
Archives
Author Guidelines
Indexing
Contact
Search
Home
/
Archives
/
Vol. 6 No. 2 (2026): Volume 6, Issue 2, 2026
Vol. 6 No. 2 (2026): Volume 6, Issue 2, 2026
Published:
01-04-26
Articles
Analysis of Microphone Exploitation Attacks and Development of Security Mitigation Strategies
1B. RaviKumar , 2 B. Dharani, 3 D. Kalyani, 4 B. Sanjeev (Author)
1-6
pdf
DESIGN AND IMPLEMENTATION OF A VULNERABLE WEB APPLICATION FOR SQL INJECTION ATTACK DEMONSTRATION AND PREVENTION
1 Ravinder, 2 G.Neha, 3 A.Sri vidhya , 4 Chandrakanth (Author)
7-14
pdf
STUDY OF ONION ROUTING , ANONYMITY NETWORKS AND SECURE DARK WEB ACCESS USING THE TOR NETWORK
1Madhunika,2A.Sagargoud,3A.Praveen kumar,4K.Ajay (Author)
pdf
SNAPCHAT LOG IN PHISHING SIMULATION
1Manaswini,2Rohan Patil.,3B.SaiKiran,4Shubham Maity (Author)
24-32
pdf
DETECTION AND PREVENTION OF WEBSITE CREDENTIAL HARVESTING ATTACKS THROUGH SECURITY MONITORING TECHNIQUES
1Ravinder , 2 C. Jitender, 3 V. Bhargav Sharma , 4 N. Harsha Vardhan (Author)
33-41
pdf
SECURE IMAGE -BASED DATA HIDING USING STEGANOGRAPHY TECHNIQUES
1Madhunika,2S.Sumithra,3N.Sahithya,4B.Durga bhavani siri (Author)
42-50
pdf
IMPLEMENTATION OF DETECTION AND PREVENTION TECHNIQUES
1 Tejaswi , 2 Tulasi, 3 D. Vidya, 4 A. Vishnu (Author)
51-58
pdf
ANALYSIS OF COMMAND-LINE AND GUI-BASED NETWORK SCANNING TECHNIQUES USING NMAP COMPARATIVE AND ZENMAP FOR SECURITY ASSESSMENT
1Manaswini,2B.Vineeth kumar,3k.Manoj,4.B.Naveen (Author)
59-65
pdf
Location Tracking Assessment
1 Tejaswi , 2 A. Manoj, 3 K. Kishore, 4 P. Vikas (Author)
66-74
pdf
Analysis of Brute Force Attack Techniques Using User-Pattern-Based Password Generation And Implementation of Defensive Counter Measures
1 B. RaviKumar , 2 Bhanu Chander, 3 B.Vamshi, 4 N.Manoj (Author)
75-82
pdf
TWIN TRAP: A LIGHTWEIGHT SECURITY MECHANISM FOR DETECTING ROGUE ACCESS POINTS IN PUBLIC WI-FI NETWORKS
1Manaswini , 2 V. Mythri, 3 G. Jyoshna, 4 Yaseen (Author)
83-91
pdf
Transformer Embeddings with Attention-Gated Structural Fusion for HDL Vulnerability Localization
M. K. Chakravarthy, Kandhipati Lakshmiprasanna, Bukkaraju Suchithra, Bellamkonda Sai Kiran, Bandapu Someswar Rao (Author)
92-98
Pdf
SmartWSN-IDS: A Hybrid Deep Reservoir and Optimized Tree Model for Routing Attack Detection
P. Bhargavi, Annangi Nishitha, Badugu Reethu Sri, Kaki Poorna Yamini, Kota Vishnu Vardhan Reddy (Author)
99-107
Pdf
A Dynamic Hybrid Stacking Approach for Real-Time Threat Detection in High-Mobility Vehicular Networks
A. Hemantha Kumar, Bodanapu Jafeer, Madathala Guru Eswar Reddy, Mamuduru Sumanth (Author)
108-116
Pdf
Hybrid Cognitive Framework for Fraud Detection using NLP and Transaction Behavior Analytics
G. Shanmugavel, Shaik Abdul Aleem, Shaik Yusufur Rahaman, Somisetty Venkata Manoj Kumar, Swarna Yaswanth (Author)
117-126
Pdf
ADOPTION OF ARTIFICIAL INTELLIGENCE IN ACCOUNTING AND ITS IMPACT ON FINANCIAL REPORTING QUALITY AND TRANSPARENCY
Yennam Venkat Reddy, Dr. E. Raghava Chaitanya, K. Sudhakar Reddy (Author)
127-140
Pdf
Latest publications
IF
Information
For Readers
For Authors
For Librarians
Language
English