Published: 2020-05-10
Articles
Penetration Testing on Metasploitable 2
Pages No. 25014-25022
Abstract 873 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4476TOTP Based Authentication Using QR Code For Gateway Entry System
Pages No. 25023-25028
Abstract 173 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4481Blockchain In Depth
Pages No. 25029-25038
Abstract 201 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4482Legal Document Summarization Using Nlp and Ml Techniques
Pages No. 25039-25046
Abstract 597 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4488Personalized Suggestion For Music Based On Collaborative Filtering
Pages No. 25047-25051
Abstract 226 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4487Light Actuation Based On Facial Mood Recognition
Pages No. 25052-25056
Abstract 212 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4483