| Issue | Title | |
| Vol 10, No 1 (2025): January- April (Full Issue Published on 30-04-2025) | Advanced Encryption Techniques for Securing Internet Communication | Abstract PDF 13-21 |
| Rakesh Verma | ||
| Vol 10, No 2 (2025): May- August (Full Issue Published on 30-08-2025) | Advancements and Challenges in Safeguarding Computer, Internet, And Network Security | Abstract PDF 60-73 |
| Dr. Rakesh Mehra | ||
| Vol 10, No 3 (2025): September- December (Full Issue Published on 30-12-2025) | AI/ML-Driven Intrusion Detection and Threat Prediction for Intelligent Cybersecurity Management in Next-Generation Networks | Abstract PDF 106-117 |
| Dr. Rajesh Rawat, Sheetal Rastogi, Kusum Pathak | ||
| Vol 11, No 1 (2026): January-April (Full issue to be published on April) | AI-Based Deceptive Intelligence System for Proactive Cybersecurity | Abstract PDF 1-12 |
| Abhinandan Gavali, Shahana Gajala Qureshi | ||
| Vol 10, No 3 (2025): September- December (Full Issue Published on 30-12-2025) | Blockchain & Distributed Ledger Technologies for Enhancing Network Security in Modern Digital Ecosystems | Abstract PDF 118-128 |
| Atul Chaudhary, Rachna Kulhare, Prachi Bhure, Geetanjali Bisht | ||
| Vol 11, No 1 (2026): January-April (Full issue to be published on April) | Decentralized Password Manager | Abstract PDF 13-20 |
| Shubham Patil, Gourav Kamble, Neha Teli, Dr. Tahseen Mulla | ||
| Vol 10, No 1 (2025): January- April (Full Issue Published on 30-04-2025) | Implementation of Blockchain Technology for Secure Data Transmission in Networks: A Critical Review | Abstract PDF 34-42 |
| Priyanka Nair, Aman Gupta | ||
| Vol 10, No 2 (2025): May- August (Full Issue Published on 30-08-2025) | Integrated Approaches to Computer, Internet, and Network Security in The Digital Age | Abstract PDF 74-86 |
| Anjali Rathi, Kashish Jain, Nitin Gaikwad | ||
| Vol 10, No 1 (2025): January- April (Full Issue Published on 30-04-2025) | Intrusion Detection Systems (IDS) for Network Security: Emerging Trends and Future Directions | Abstract PDF 43-51 |
| Himanshu Verma, Ritu Saxena, Kavita Pal | ||
| Vol 10, No 2 (2025): May- August (Full Issue Published on 30-08-2025) | Natural Language Processing for Human-Machine Interaction | Abstract PDF 87-94 |
| Ritika Sharma, Sandeep Verma | ||
| Vol 11, No 1 (2026): January-April (Full issue to be published on April) | Post-Quantum Cryptography | Abstract PDF 31-46 |
| Raman S. Patil, Kanika N. Deshmukh | ||
| Vol 11, No 1 (2026): January-April (Full issue to be published on April) | Quantum Computing and Quantum Software Engineering | Abstract PDF 47-62 |
| Ghanshyam Pathak | ||
| Vol 10, No 2 (2025): May- August (Full Issue Published on 30-08-2025) | Safety Summons: Network Security Services | Abstract PDF 52-59 |
| D. Prasad | ||
| Vol 10, No 3 (2025): September- December (Full Issue Published on 30-12-2025) | Secure Software and Application Vulnerabilities in Modern Devsecops Environments: A Comprehensive Analysis of Security Challenges, Strategies, and Future Trends | Abstract PDF 129-139 |
| Dr. Priyanka Sharma | ||
| Vol 10, No 3 (2025): September- December (Full Issue Published on 30-12-2025) | Securing Future Wireless Networks: Challenges and Strategies in 5g/6g and Sdn/Nfv Ecosystems | Abstract PDF 140-149 |
| Dr. Bhavya Singh, Parul Gupta | ||
| Vol 10, No 1 (2025): January- April (Full Issue Published on 30-04-2025) | Securing IoT Devices: Challenges and Mitigation Strategies | Abstract PDF 22-33 |
| Pooja Srivastava, Kajal Agarwal, Nitin Kapoor | ||
| Vol 10, No 2 (2025): May- August (Full Issue Published on 30-08-2025) | The Dark Web: Risks, Challenges, and Regulations | Abstract PDF 95-105 |
| Ravi Kumar Singh, Shalini Ramesh, Amit Deshmukh | ||
| Vol 11, No 1 (2026): January-April (Full issue to be published on April) | The ML-Based Sandbox Malware Visualizer | Abstract PDF 21-30 |
| Arya Khobragade, Vaibhavi Kumbhar, Atmaj Khatavkar, Prof. Mr. S. N. Kamble | ||
| Vol 10, No 1 (2025): January- April (Full Issue Published on 30-04-2025) | Unlocking Blockchain's Potential in Healthcare: An Overview of Its Applications | Abstract |
| R. Vijaya Lakshmi, Vijaya S C | ||
| Vol 10, No 3 (2025): September- December (Full Issue Published on 30-12-2025) | Zero-Trust Architecture for Next-Generation Networks: Enhancing Cybersecurity Through Continuous Authentication and MicroSegmentation in Distributed Environments | Abstract PDF 150-163 |
| Dr. Ananya Deshmukh, Mr. Arvind Kumar Patel | ||
| 1 - 20 of 20 Items | ||