International Journal of Science and Research (IJSR)
Computer Science
Downloads: 5 | Views: 684
Computer Science & Engineering, India, Volume 10 Issue 6, June 2021
Pages: 1240 - 1249Secure Methods for Supplychain Management to Protect from Attacks in Blockchain
B. Ratnakanth | K. Venkata Ramana
Downloads: 5 | Views: 902
Computer Science and Information Technology, India, Volume 10 Issue 7, July 2021
Pages: 43 - 46An Analysis of Cloud Computing Risk and Challenges
Shivam Dhoot | Himanshu Gupta
Downloads: 5 | Views: 635
Computer Science & Engineering, India, Volume 10 Issue 9, September 2021
Pages: 345 - 348Comparison of Data Gathering Techniques Using Artificial Intelligence
Varsha Kumari | Preeti Sondhi
Downloads: 5 | Views: 642
Computer Science and Information Technology, India, Volume 10 Issue 9, September 2021
Pages: 1258 - 1264Novel Technique to Hide Identity of Alina Malware
Dhruv R. Gajjar
Downloads: 5 | Views: 468
Computer Science & Engineering, India, Volume 10 Issue 10, October 2021
Pages: 584 - 587Big Data Getting Bigger: Catering Challenges
Daksh Mehta
Downloads: 5 | Views: 519
Computer Science & Engineering, China, Volume 10 Issue 12, December 2021
Pages: 820 - 822Research on Public Opinion Security under Blockchain Architecture
Wang Hong-Mei
Downloads: 5 | Views: 649
Computer Science, India, Volume 11 Issue 3, March 2022
Pages: 1430 - 1432Online Proctoring System to Avoid Defrauding
K. Pranay Krishna | Dr. G. Arun Sampaul Thomas | B. Manasa
Downloads: 5 | Views: 587
Computer Science, Iraq, Volume 11 Issue 4, April 2022
Pages: 678 - 681Benchmarking Machine Learning Methods COVID-19 Classification using MCDM technique
Suad M. Shakor
Downloads: 5 | Views: 542
Computer Science, Iceland, Volume 11 Issue 4, April 2022
Pages: 1166 - 1171Mechanical Elements Analysis of Stewart Platform: Computational Approach
Reza Hassanian | Morris Riedel
Downloads: 5 | Views: 674
Computer Science, India, Volume 11 Issue 5, May 2022
Pages: 283 - 286Intrusion Detection using Machine Learning
Bhumika Malik | Nivedita Singh