Jyothi, V Esther
514  results:
Search for persons X
?
1

Vulnerability Classification for Detecting Threats in Cloud..:

, In: 2024 IEEE 13th International Conference on Communication Systems and Network Technologies (CSNT),
 
?
2

A Pattern Recognition Model: Hand Gestures Recognition usin..:

, In: 2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS),
 
?
3

Securing the Cyber Supply Chain: A Risk-based Approach to T..:

, In: 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC),
 
?
4

Secure Data Access Management for Cyber Threats using Artif..:

, In: 2022 6th International Conference on Electronics, Communication and Aerospace Technology,
 
?
5

Healthcare Supply Chain Security with ZeroKnowledge Proof A..:

, In: 2024 Third International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE),
 
?
6

Analysis of Cryptography Encryption for Network Security:

Esther Jyothi, V. ; Prasad, Dr. BDCN ; Mojjada, Dr Ramesh Kumar
IOP Conference Series: Materials Science and Engineering.  981 (2020)  2 - p. 022028 , 2020
 
?
12

Guidelines for the use and interpretation of assays for mon..:

Klionsky, Daniel J ; Abdel-Aziz, Amal Kamal ; Abdelfatah, Sara...
info:eu-repo/semantics/altIdentifier/doi/10.1080/15548627.2020.1797280.  , 2021
 
1-15