Cyber Threat Analysis- Vulnerability Scanner and Patcher
Cyber Attacks Classification and Detection
Advance Network Traffic Fingerprinting
Cyber Attack Detection Using Machine Learning
PfSence Firewall rules analysis and configuration to secure network
Modified SASE Architecture with Morse Code Encryption Col. Akshat Kapoor
Token Bases Valid and Secure Payment System Using SHA-256 - Saleh Umar, Tokpe Kossi, OuattaraLamine
SENTIMENT ANALYSIS: CONCEPTS, METHODS, AND APPLICATIONS - Nikita Anand