Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Articles & Issues
Current
Archives
About
About the Journal
Editorial Team
Indexing & Abstracting
Publication Ethics
Contact
Publish
Author Guidelines
Peer Review Process and Policies
Submissions & Guidelines
Privacy Statement
Generative AI Policies
MileStone Journals
Search
Register
Login
Home
/
Archives
/
Vol. 5 No. 3 (2026): May / June : Issue - 3
Vol. 5 No. 3 (2026): May / June : Issue - 3
Published:
2026-02-17
Articles
Digital Forensics for Detecting and Investigating Cyber Malicious Activities
Marathi Muni Babu, M Sai Harshini, P V Koteswara Rao, R Gowtham, G Jamuna
744 - 755
DOWNLOAD PDF
Reinventing Authentication through User-Centric Two-Factor Security and Personalized Image Verification
J Sivarani, D Lashya Kumari, A Jyothsna, S K Mohammed Khaif, I Hithaishi
756 - 767
DOWNLOAD PDF
Predicting Cybersecurity Risk Through Fuzzy and Adaptive Neuro-Fuzzy Systems
P Bhanu Prakash, B Sivani, S Burhan, B Siva Gopi Chandu, K Sumana
768 - 779
DOWNLOAD PDF
A Robust IDS-Driven Approach to Secure Industrial Control Systems from Emerging Cyber-Physical Attacks
D Nagabhushanam, K Veerasekhar Achari, P Kranthi Kumar, S Abrar Ali, R Manoj Kumar Reddy
780 - 792
DOWNLOAD PDF
A Unified Architecture for Real-Time Analytics Using Microsoft Fabric OneLake
Narendra Mangala
793 - 807
DOWNLOAD PDF
An Efficient Machine Learning Framework for Behavioral Insider Threat Detection with Comparative Analysis of Ensemble Methods.
J Sivarani, R Bhargava Reddy, C Sai Sreeja, R Keerthi Priya, S Munendra
808 - 819
DOWNLOAD PDF
Milestone Research
Indexing and Abstracting
GoogleScholar
Zenodo (DOI)
OpenAIRE
CLOCKSS
PKP Publication Networks
SUDOC, France
Information
For Readers
For Authors
For Librarians