Published: 2020-05-10
Articles
Penetration Testing on Metasploitable 2
Pages No. 25014-25022
Abstract 1148 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4476TOTP Based Authentication Using QR Code For Gateway Entry System
Pages No. 25023-25028
Abstract 200 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4481Blockchain In Depth
Pages No. 25029-25038
Abstract 391 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4482Legal Document Summarization Using Nlp and Ml Techniques
Pages No. 25039-25046
Abstract 743 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4488Personalized Suggestion For Music Based On Collaborative Filtering
Pages No. 25047-25051
Abstract 263 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4487Light Actuation Based On Facial Mood Recognition
Pages No. 25052-25056
Abstract 270 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4483