Published: 2020-05-10
Articles
Penetration Testing on Metasploitable 2
Pages No. 25014-25022
Abstract 1036 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4476TOTP Based Authentication Using QR Code For Gateway Entry System
Pages No. 25023-25028
Abstract 181 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4481Blockchain In Depth
Pages No. 25029-25038
Abstract 224 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4482Legal Document Summarization Using Nlp and Ml Techniques
Pages No. 25039-25046
Abstract 625 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4488Personalized Suggestion For Music Based On Collaborative Filtering
Pages No. 25047-25051
Abstract 241 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4487Light Actuation Based On Facial Mood Recognition
Pages No. 25052-25056
Abstract 221 | PDF DOI https://doi.org/10.18535/ijecs/v9i05.4483