Day: June 25, 2025

IJETEV1I1A003 – ANDROID HACKING AND EXPLOITATIONUSING KALI LINUX : A CYBER FORENSIC ANALYSIS OFVULNERABIILTIES AND MITIGATION

IJETEV1I1A003 –  ANDROID HACKING AND EXPLOITATION USING KALI LINUX : A CYBER FORENSIC ANALYSIS OF VULNERABIILTIES AND MITIGATION AUTHORS : G.Vishvanath Sundharam, Sudhakaran S, Vijayasarathi S,  James Godwin G. ABSTRACT – IT security is a paramount concern in today’s internet landscape due to the prevalence of communication activities. Testing for personal data theft using social engineering […]
Read more

IJETEV1I1A002 – BLOSTERING WEB SECURITY BY INTEGRATING FRAMEWORKS TO DETECT SQL INJECTION AND XSS VULNERABILITIES

IJETEV1I1A002 – BLOSTERING WEB SECURITY BY INTEGRATING FRAMEWORKS TO DETECT SQL INJECTION AND XSS VULNERABILITIES AUTHORS :  G. Sivakumar,  Arthi M.E, Sahasra S, Gowtham Siddarth N ABSTRACT – With the increasing number of web applications, cyber threats such as SQL Injection (SQLi) and Cross-Site Scripting (XSS) have become more prevalent. This paper presents a framework for […]
Read more
Cart