Published: 2020-05-10

Penetration Testing on Metasploitable 2

Mandeep Singh, Sunny Kumar, Tushant Garg, Niranjan Pandey

Pages No. 25014-25022

Abstract 1148  | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4476

TOTP Based Authentication Using QR Code For Gateway Entry System

Abhishek Arvind, Pradyumna Mahajan, Rishikesh Chalke

Pages No. 25023-25028

Abstract 200  | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4481

Blockchain In Depth

Saransh Kotha, Pearl Patel

Pages No. 25029-25038

Abstract 391  | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4482

Legal Document Summarization Using Nlp and Ml Techniques

Rahul C Kore, Prachi Ray, Priyanka Lade, Amit Nerurkar

Pages No. 25039-25046

Abstract 743  | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4488

Personalized Suggestion For Music Based On Collaborative Filtering

Aniket Salunke, Ruchika Kukreja, Jayesh Kharche, Amit Nerurkar

Pages No. 25047-25051

Abstract 263  | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4487

Light Actuation Based On Facial Mood Recognition

Abhi Kadam, Anupama Mhatre, Sayali Redasani, Amit Nerurkar

Pages No. 25052-25056

Abstract 270  | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4483