Volume 6 Issue 7 2024

Serial: 1

A study on Socio-Political Thoughts of Swami Vivekananda

Authors: Jugendra Singh, Dr.D.K.Verma, Dr.M.C.Dubey
Page No: 1-8
Jugendra Singh, Dr.D.K.Verma, Dr.M.C.Dubey. A study on Socio-Political Thoughts of Swami Vivekananda. 1-8. http://journalcybersecurity.com/wp-content/uploads/1-Jul-2024.pdf
Serial: 2

A Comparative Study of Black-Box and White-Box Adversarial Attack Methods for SQL Injection in Web Applications

Authors: Archana Tomar, Archana Tomar, Priusha Narwaria, Abhinanadan Singh Dandotia
Page No: 1-5
Archana Tomar, Archana Tomar, Priusha Narwaria, Abhinanadan Singh Dandotia. A Comparative Study of Black-Box and White-Box Adversarial Attack Methods for SQL Injection in Web Applications. 1-5. http://journalcybersecurity.com/wp-content/uploads/2-Jul-2024.pdf
Serial: 3

2-Node Decentralized Flow in Municipal Biodegradable Waste Management Value Stream for Municipal Cities of India

Authors: Ar. Aditya Anand
Page No: 1-9
Ar. Aditya Anand. 2-Node Decentralized Flow in Municipal Biodegradable Waste Management Value Stream for Municipal Cities of India. 1-9. http://journalcybersecurity.com/wp-content/uploads/3-Jul-2024.pdf
Serial: 4

Energy Conservation in Buildings using Biomimicry

Authors: Ar. Gopal Goyal, Ar. Aditya Anand
Page No: 1-5
Ar. Gopal Goyal, Ar. Aditya Anand. Energy Conservation in Buildings using Biomimicry. 1-5. http://journalcybersecurity.com/wp-content/uploads/4-Jul-2024.pdf
Serial: 5

A Review Paper on Role of Indoor Plants in Interior Environment

Authors: Shilpa Bhargava, Pariniti Singh
Page No: 1-10
Shilpa Bhargava, Pariniti Singh. A Review Paper on Role of Indoor Plants in Interior Environment. 1-10. http://journalcybersecurity.com/wp-content/uploads/5-Jul-2024.pdf
Serial: 6

“Analysis Of Activation Function In The Convolution Neural Network Model” (Best Activation Function Sigmoid Or Tanh)

Authors: Archana Tomar, Harish Patidar
Page No: 1-8
Archana Tomar, Harish Patidar. “Analysis Of Activation Function In The Convolution Neural Network Model” (Best Activation Function Sigmoid Or Tanh). 1-8. http://journalcybersecurity.com/wp-content/uploads/6-Jul-2024.pdf
Serial: 7

Implementing Secure Data Storage and Sharing Techniques for advanced Protections in Cloud Environments

Authors: ]Ms. Smita B. Zanke, C. M. Mankar
Page No: 1-9
]Ms. Smita B. Zanke, C. M. Mankar. Implementing Secure Data Storage and Sharing Techniques for advanced Protections in Cloud Environments. 1-9. http://journalcybersecurity.com/wp-content/uploads/7-Jul-2024.pdf
Serial: 8

Reverse Engineering in Pharmaceutical Problems

Authors: S.P. Mone, Jinendra Bafna, Yash Nikam, Shreyas Lokhande, Prashant Pote
Page No: 1-6
S.P. Mone, Jinendra Bafna, Yash Nikam, Shreyas Lokhande, Prashant Pote. Reverse Engineering in Pharmaceutical Problems. 1-6. http://journalcybersecurity.com/wp-content/uploads/8-Jul-2024.pdf
Scroll to Top