IJRECE_G809
Download Paper

IJRECE_G810
Download Paper

IJRECE_G811
Download Paper

IJRECE_G812
Download Paper

IJRECE_G813
Download Paper

IJRECE_G814
Download Paper

IJRECE_G815
Download Paper

IJRECE_G816
Download Paper

IJRECE_G817
Download Paper

IJRECE_G818
Download Paper

IJRECE_G819
Download Paper

IJRECE_G820
Download Paper

IJRECE_G821
Download Paper

IJRECE_G822
Download Paper

IJRECE_G823
Download Paper

IJRECE_G824
Download Paper

IJRECE_G825
Download Paper

IJRECE_G826
Download Paper

IJRECE_G827
Download Paper

IJRECE_G828
Download Paper

IJRECE_G829
Download Paper

IJRECE_G830
Download Paper

IJRECE_G831
Download Paper

IJRECE_G832
Download Paper

IJRECE_G833
Download Paper

IJRECE_G834
Download Paper

IJRECE_G835
Download Paper

IJRECE_G836
Download Paper

IJRECE_G837
Download Paper

IJRECE_G838
Download Paper

IJRECE_G839
Download Paper

IJRECE_G840
Download Paper

IJRECE_G841
Download Paper

IJRECE_G842
Download Paper

IJRECE_G843
Download Paper

IJRECE_G844
Download Paper

IJRECE_G845
Download Paper

A research Paper for Symmetric and Asymmetric Cryptography 
Akshay Kekunnaya, Rajeshwari Gundla, Siddharth Nanda

A Comphrehensive Study on Known Plaintext Attack,Chosen Plaintext Attack and Ciphertext Only Attack.
Kanika Kapoor, Siddharth Nanda, Rajeshwari Gundla

A Comprehensive Study on Biometrics Authentication
Kanika Kapoor, Jemima Abraham

A Study on Firewall
Rohan Dhadge, Himabindu Kasireddi, Sakshee Thakare, Ananya Choudhary, Deepti Dave

Advanced Persistence Threat and Cyber warfare
Pratik Hinge, Rajeshwari Gundla, Siddharth Nanda

Facebook Spoofing and Messenger Calling
Akash Shitole, Sneha Ambhore

Comparison of Symmetric Cryptographic Techniques
Akash Shitole, Siddharth Nanda, Rajeshwari Gundla

Comparative analysis of cryptographic streams
Anand Patil ,OmkarShendre, Shashank Singh, Shivam Singh, Shubham Gupta, Deepti Dave

Comparative Study of CIA Triad
Aishwarya patil, Shreyash Patil, Siddhi Jadhav, Prof. Sneha Ambhore

Methods of managerial, procedural and technical controls for virus and worms
Mihirwalia, Siddharth Nanda, Rajeshwari Gundla

Cyber Attacks and Its Types
Mintu Patel, Needa Mugut, Rahul Agarwal, Shubham Telkar, Sneha Ambore

Survey on Enigma Machine
Aadesh Darawade, Sanket Gaikwad, SuyashChavan, Deepti Dave

Fileless malware
Aditya Chopade, Shlok Sawant, Suyog Surve, Sneha Ambhore

Increasing Efficiency of Indian Healthcare System 
Prerit Shah, Sneha Ambhore

A Way to Securely use Instagram App 
Akshay Kekunnaya, Sneha Ambhore

Un-authorized access for security portal in User Interface
Sayali Ambre, Radhika Ajani, Sneha Ambhore

Home Security based on GSM using Arduino
Hiren Chafekar, Harsh Shah, Anmol Hariyani, Sneha Ambhore

Image Forgery
Pratik Ramesh Hinge, Sneha Ambhore, Yogesh Ratnaparkhe, Kshitij Wadekar, Prof Sneha Ambhore

A Novel Approach of in halt based Video Recuperation System using Optimal Character Recognition Technologies | Apurva Kandelkar, Rohini Deshmane, Monali Bachhav

Information Gathering with E-Governance Websites 
Suyog Kharche, Sneha Ambhore

Comparison between the types of Substitute Ciphers
Jemima Abraham, Siddharth Nanda, Rajeshwari Gundla

A New Approach to Secure Smartphone Applications 
Jemima Abraham, Sneha Ambhore, Kanika Kapoor

A Review on Vulnerabilities in Mahavitaran Mobile Application 
Mayuri More, Sneha Ambhore

P3 Whatsapp 
Prerna Bhajbhuje, Sneha Ambhore

Preventive vs Detective vs Corrective Security Controls
Prakash Choudhary, Rajeshwari Gundla, Siddharth Nanda

A Comprehensive Study of Retail Based Recommendation System
Nirupma Singh, Siddharth Nanda

Managerial Procedural Technical Controls for Rootkit
Prajwal Sonawane, Rajeshwari Gundla, Siddharth Nanda

A Comparative Study on Virus Vs Worm Vs Trojan
Sayaliambre, Siddharth Nanda, Rajeshwari Gundla

Social Engineering - The Dark Art of Manipulation
Prerit Shah, Siddharth Nanda, Rajeshwari Gundla

SSL/TLS - Attacks and It’s Fixes
KiranRaj KG, Shahikant Khot, Sneha Ambhore

Human based Vs Computer based Social Engineering
Prerna Bhajbhuje, Rajeshwari Gundla, Siddharth Nanda

Study on Multitenancy security in Cloud Computing
Deepti Dave,

Survey on Network Security Attacks
Ajay Yadav, Hari Krishnan, Raju Prasad, Deepti Dave

Survey on Symmetric Key Cryptography
Animesh Kumar, Deepak Idnani, Kaushal Soni, Nitin Taneja, Rounak Shrivastava, Prof. Sneha Ambhore

Trojan Vs Rat Vs Rootkit
Mayuri More, Rajeshwari Gundla, Siddharth Nanda

Methods for Spoofing Caller ID with TrueCaller 
Mihir Walia, Sneha Ambore

Validation of One-Time Password (OTP)
Sachin Kumar Maurya, Sneha Ambhore


Special Issue | Comprehensive Study of Network Security and Data Analytics.

Guest Editor Names:

  • Siddharth Nanda | Faculty - IT, iNurture Education Solutions 
  • Nirupma Singh | Faculty - IT, iNurture Education Solutions
  • Deepti Dave | Senior Faculty- IT, iNurture Education Solutions

ISSN (Online): 2348-2281
ISSN (Print): 2393-9028

International Journal of Research in Electronics AND Computer Engineering (IJRECE)

A Unit of I2OR