International Journal of Science and Research (IJSR)
Computer Science
Downloads: 3 | Views: 213
Computer Science and Information Technology, India, Volume 14 Issue 12, December 2025
Pages: 499 - 509Efficient Misinformation Detection on Twitter: A Hybrid Approach Using Machine Learning and Bayesian Optimization with Hyperband
T. Poornima
Downloads: 3 | Views: 69
Computer Science, India, Volume 14 Issue 12, December 2025
Pages: 748 - 750Techniques and Tools used in Data Science for Cyber Security
Antima Bhimrao Shendge
Downloads: 3 | Views: 98
Computer Science, India, Volume 14 Issue 12, December 2025
Pages: 1632 - 1636Image-Based Constellation Recognition Using Deep Learning on Consumer-Grade Sky Imagery
Bhakti Israni
Downloads: 3 | Views: 54
Computer Science, India, Volume 14 Issue 12, December 2025
Pages: 1649 - 1655A Survey on Addition Chains Generation Methods
Anupama M | Dr. Shijo M Joseph | Dr. K. Mani
Downloads: 3 | Views: 96
Computer Science and Information Technology, India, Volume 14 Issue 12, December 2025
Pages: 1984 - 1990Comparative Analysis of Machine Learning Models for Smishing Message Detection
Aqsa Shaikh | Mariya Shaikh | Srivaramangai R
Downloads: 2 | Views: 493
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1789 - 1791The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence
Vina Lomte | Saloni Shah
Downloads: 2 | Views: 553
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh | Vaibhav Pandey
Downloads: 2 | Views: 480
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2267 - 2274Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal | G. Srinivasa Reddy
Downloads: 2 | Views: 638
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar | Purnima Selokar
Downloads: 2 | Views: 725
Computer Science and Information Technology, India, Volume 11 Issue 1, January 2022
Pages: 359 - 363Arithmetic Addition Coding and Linear Invertible Equation using Prime Modulo with Multiplicative Inverse for Text Encryption
N. Subramanyan | Dr. K. Arunesh