Contents
- A Framework for the Evaluation of Criticality of Critical National Information Infrastructure (CNII)
Architectural of a New Fingerprint-Based Voting System
A DFIM that uses DCoC For Integrity, and Authenticity
Securing the Chain of Drug Distribution Analysis Using the Blockchain Technology
On Quantum Cryptography for Network Security
A Convolutional Neural Network Library
Big Data And Big Data Analytics: A Literature-Based Research On Privacy And Security -A Decade Tour