Journal of Cyber Security in Computer System 4-1 Jan-Apr 2025=1
Author |
Ara,Tabassum |
Publication |
MAT JOURNALS |
ISBN - 10 |
|
Language |
English |
Department |
|
SeriesName |
|
BIBLevel |
|
BibNoOfRefrences |
|
ThesisAbstract |
|
Subject |
Cyber Security |
PublicationYear |
2025 |
ISBN - 13 |
|
OriginalLanguage |
English |
CorporateBody |
|
SeriesISSN |
|
VolumeTitle |
|
VolumeNo |
|
VolumePagination |
|
Class.Code |
005.8 |
Edition - Reprint |
- |
Page |
55 |
Size |
|
NoofCopies |
|
SeriesSttofRes |
|
VolumeSttofRes |
|
Material Accession Nos.
Accession No. |
CD Accession No. |
Section |
Status |
Due Dt. |
Rack |
Sub Rack |
Member |
Institute |
UJ1733 |
|
Reference |
Available |
|
|
|
|
DU |
Note: Reference books are not for Issue
Book Content
Chapter No. |
Chapter Name |
Chapter PageNo |
Content No |
Content Name |
Content PageNo |
"
|
4-1 January-April 2025
|
|
|
Review of Secure Energy Harvesting Techniques for prolonged IoT
Lifespan
Manas Kumar Yogi, Subhasri Telkar |
1-13 |
''
|
''
|
|
|
Advancing Cybersecurity: Emerging Threats, Defensive Strategies,
and Future Trends
Raghu Ram Chowdary Velevela. Anand Kumar Machavarapu |
14-22 |
''
|
''
|
|
|
Filtering Falsehoods: A Machine Learning Approach in Fake News
M. Nikesh, Syeda Hifsa Naaz |
23-31 |
''
|
''
|
|
|
PhishGuard: Detecting Phishing Attacks in Rear-Time via Multi-
Browser Extensions
S.Adolphine Shyni, A. Harish, P. Karthikeyan, S. Willfard Austen Zerro,
R. Yogesh |
32-45 |
''
|
''
|
|
|
Cybercrime and Mitigation Strategies: Al-Driven Security
Approaches in the Digital Era
Parul Jha Shubham P. Bisht, Himanshu. P. Dubey, Mohd Faizan. S.
Raeen. Joshua R. Jacob |
46-55 |