Volume 10 -2020
Page | Title | Full Text |
---|---|---|
1-6 |
Reducing Insider Attack Using Encryption Algorithms Swati Sharma and . Monika Saini |
Full Text PDF |
7-10 | A Combined Method to Impute Missing Data and Predict Accurate Value of a Target Variable in Supervised Machine Learning Deepak and Sonia Batra |
Full Text PDF |
11-13 | SCRUTINY OF VANET SIMULATORS Arif Khan and Dr Nancy Arya |
Full Text PDF |
14-16 | Cloud Computing - Ensuring Data Security Mohammad Furqan and Monika Saini |
Full Text PDF |
17-20 | Results Analysis for PAVD Cloud Computing Security System Rakesh Kumar |
Full Text PDF |
Articles publishing inprocess |
IJCSET Menu
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net
Downloads