2022 Volume 3
- Secure smart socket system for energy monitoring embedded with IoT
- By: Sourasis Chattopadhyay, Snikta Banerjee, Akash Pal, Novi Susetyo Adi, Mosiur Rahaman
- Cite as: Chattopadhyay S., Banerjee S., Pal A., Adi N. S., Rahaman M., (2022) Secure smart socket system for energy monitoring embedded with IoT, Cyber Security Insights Magazine, Insights2Techinfo, Volume 3, pp. 1-5.
- Analysis of Rumour and Fake News Detection Techniques
- By: Anupama Mishra, Varsha Mittal, Kshitij Mishra
- Cite as: Mishra A., Mittal V., Mishra K., (2022) Analysis of Rumour and Fake News Detection Techniques, Cyber Security Insights Magazine, Insights2Techinfo, Volume 3, pp. 6-9.
- Quantum Computing: A Tool in Big Data Analytics
- By: Akshat Gaurav, Kwok Tai Chui, Francesco COLACE
- Cite as: Gaurav A., Chui K.A., COLACE F. (2022) Quantum Computing: A Tool in Big Data Analytics, Cyber Security Insights Magazine, Insights2Techinfo, Volume 3, pp. 10-14
- Security Implications in Cloud Computing
- By: Rajkumar Show, Vivek Kumar
- Cite as: Show R., Kumar V. (2023) Security Implications in Cloud Computing, Cyber Security Insights Magazine, Insights2Techinfo, Volume 3, pp. 15-20
- Relationship between Data Science and Development of Business
- By: Bhavna, Dolly Verma, Palki, Arshan Kler, Avneet Kaur
- Cite as: Bhavna, Dolly Palki V, Kler A., Kaur A. (2023) Relationship between Data Science and Development of Business, Cyber Security Insights Magazine, Insights2Techinfo, Volume 3, pp. 21-25
pp. 1-5
pp. 6-9
pp. 10-14
pp 15-20
pp. 21-25