Vol. 1 No. 3 (2025): Jul-Sep 2025

Published: 2025-06-30

Articles

  • Secure Key Exchange Protocols in Wireless Sensor Networks

    Akshit Kohli (Author)
    Jul (1-7)
    DOI: https://doi.org/10.63345/ijarcse.v1.i3.101
  • Role of Homomorphic Encryption in Privacy-Preserving Machine Learning

    Kratika Jain (Author)
    Jul (8-16)
    DOI: https://doi.org/10.63345/ijarcse.v1.i3.102
  • Attack Simulation and Mitigation in Smart Grid Cybersecurity Environments

    Niharika Singh (Author)
    Jul (17-24)
    DOI: https://doi.org/10.63345/ijarcse.v1.i3.103
  • Cyber Threat Intelligence Sharing Using Blockchain for Critical Infrastructure

    Shubham Jain (Author)
    Jul (25-33)
    DOI: https://doi.org/10.63345/ijarcse.v1.i3.104
  • Watermarking Techniques for Secure Multimedia Transmission

    Dr. Gaurav Raj (Author)
    Jul (34-40)
    DOI: https://doi.org/10.63345/ijarcse.v1.i3.105
  • Lightweight Cryptographic Protocols for Wearable Health Devices

    Dr Shantanu Bindewari (Author)
    Aug (1-7)
    DOI: https://doi.org/10.63345/v1.i3.67
  • Zero Trust Security Architecture in Microservices-Based Web Applications

    Dr Abhishek Jain (Author)
    Aug (8-15)
    DOI: https://doi.org/10.63345/v1.i3.68
  • AI-Driven Malware Behaviour Classification and Detection Systems

    Apoorva Jain (Author)
    Aug (16-24)
    DOI: https://doi.org/10.63345/v1.i3.69
  • Comparative Analysis of Signature-Based and Anomaly-Based IDS

    Dr Amit Kumar Jain (Author)
    Jul (25-31)
    DOI: https://doi.org/10.63345/v1.i3.70
  • IoT Firmware Security Auditing Using Automated Vulnerability Scanning

    Dr. Saurabh Solanki (Author)
    Aug (32-39)
    DOI: https://doi.org/10.63345/v1.i3.71