Title Page No Download
Leveraging Threat Intelligence, AI and ML with MITRE ATT&CK for Prioritized Risk Assessments in Financial and actionable Security Strategies
Authors: ShivaDutt Jangampeta, Sai Teja Makani
DOI: 10.48047/IJIEMR/V13/ISSUE 07/01
1-4 Download
An Extensive Analysis of the Three-Way Hashed Security Model in Cryptography and Network Security with Low Computation Time and Advanced Load-Balancing System
Authors: Setti Sarika, Dr S Jhansi Rani
DOI: 10.48047/IJIEMR/V13/ISSUE 07/02
5-14 Download
Probabilistic Evaluation of a Wireless Sensor Network (WSN) Ensemble Attacks Pattern Learning System
Authors: Arjunamahanthi Sushma, Dr S Jhansi Rani
DOI: 10.48047/IJIEMR/V13/ISSUE 07/03
15-24 Download
OPTIMISING DATA PERFORMANCE: TECHNIQUES FOR FASTER AND EFFICIENT DATA PROCESSING
Authors: SAI CHARAN DATTA
DOI: 10.48047/IJIEMR/V13/ISSUE 07/04
25-27 Download
Optimized DNA Data Extraction and Differentiating Synthetic and Natural DNA using Geneious Prime
Authors: Kulvinder Singh, Dr. Balkar Singh
DOI: 10.48047/IJIEMR/V13/ISSUE 07/06
45-53 Download
ENHANCING URBAN SUSTAINABILITY THROUGH IOT AND CLOUD TECHNOLOGIES: INSIGHTS FROM SMART AGRICULTURAL AND WATER QUALITY MONITORING
Authors: MUDRESH MOHAN TRIPATHI, ROHITA YAMAGANTI
DOI: 10.48047/IJIEMR/V13/ISSUE 07/07
54-62 Download
ADVANCED CLASSIFICATION OF EUROPEAN COURT OF HUMAN RIGHTS CASES THROUGH HYBRID TRANSFORMER-BASED TECHNIQUES
Authors: Ravinder Reddy Baireddy , Dr. Rohita Y , Amireddy Poojitha , K. Nayana Sharon, N. Charan
DOI: 10.48047/IJIEMR/V13/ISSUE 07/08
63-67 Download