CRACKS IN DIGITAL DEFENSE: A STUDY ON PASSWORD SECURITY AWARENESS AND BEHAVIOR IN COLLEGE STUDENTSSubitha Sivakumar1, Sivakumar Venkataraman2
|
THE FLOW BASED TRAFFIC DETECTION AND MONITORING MODEL IN COMPLEX NETWORKS USING PREDICTIVE MANAGEMENT APPROACHL Vinitha Sree, A Amjath
|
AICSA - AN ARTIFICIAL INTELLIGENCE CYBER SECURITY ALGORITHM FOR COOPERATIVE P2P FILE SHARING IN SOCIAL NETWORKSJ Logeshwaran
|
NON-PERFORMING ASSETS IN INDIAN BANKING AND THE ROLE OF ASSET RECONSTRUCTION COMPANIESAbhijit Sinha
|
SECURE TRANSMISSION OF BIO-MEDICAL DATA USING STEGANOGRAPHYS Thenmozhi, P Sureka, Ramgopal Segu
|
A SMART ANALYSIS OF HUMAN RESOURCE MANAGEMENT FOR MNC COMPANIES IN WORK FROM HOME ENVIRONMENTS. Aradhana and K. Harshini
|