Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 11 | Issue 3 |

Volume 11 | Issue 3 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6)OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: Defending Against DDoS Attacks Using Ant Colony Optimization

  Author Name(s): R.M. Mallika, P.Lavanya, M. Peddaiah, K. Lohith, P.Lokeswari

  Published Paper ID: - IJCRT2303946

  Register Paper ID - 233654

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2303946 and DOI :

  Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303946
Published Paper PDF: download.php?file=IJCRT2303946
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303946.pdf

  Your Paper Publication Details:

  Title: DEFENDING AGAINST DDOS ATTACKS USING ANT COLONY OPTIMIZATION

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 3  | Year: March 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 3

 Pages: h988-h994

 Year: March 2023

 Downloads: 171

  E-ISSN Number: 2320-2882

 Abstract

The importance of the DDoS issue and the rise in the frequency, sophistication, and power of assaults have prompted the development of several prevention techniques. Each suggested preventive measure differs from the others in certain specific benefits and drawbacks. In this study, we categorise the many defences against potential DDoS assaults that have been put forth in the literature and evaluate the advantages and disadvantages of each defence. It is preferred to consider that the number of maximum continuous DoS attacks in both the S-C and the C-A channels is bounded because of the cost effect of attacks. In this project on Distributed denial of service (DoS) attacks in cyber-systems, DoS attacks exist in between the sensor and controller communications and the controller-to-actuator communications. Then, a successful security control technique is developed to counter two-channel DoS attacks, fully utilising the hardware to guarantee that control inputs are periodically captured during each time slot. A security controller that includes both the present and future control inputs is designed at the same time. The addressed CPS can be stable under 2-channel DoS attacks while maintaining control effectiveness under an appropriate security control strategy and security controller. Last but not least, simulations and tests are provided to show the viability of the suggested active security control approach.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DoS attacks, Security transmission policy, Actively defend, Security control, Experiments, Cyber-physical systems.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Emergence And Growing Potentiality Of Small Tea Cultivators Towards Employment Generation In Assam

  Author Name(s): Monali Borah

  Published Paper ID: - IJCRT2303945

  Register Paper ID - 233658

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2303945 and DOI :

  Author Country : Indian Author, India, 785004 , Jorhat, 785004 , | Research Area: Medical Science All

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303945
Published Paper PDF: download.php?file=IJCRT2303945
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303945.pdf

  Your Paper Publication Details:

  Title: EMERGENCE AND GROWING POTENTIALITY OF SMALL TEA CULTIVATORS TOWARDS EMPLOYMENT GENERATION IN ASSAM

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 3  | Year: March 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Medical Science All

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 3

 Pages: h980-h987

 Year: March 2023

 Downloads: 179

  E-ISSN Number: 2320-2882

 Abstract

This paper discusses the emergence and growing potentiality of the small tea cultivators in Assam towards employment generation. The tea industry in Assam has traditionally been dominated by large tea estates, but in recent years, small tea growers have emerged as a significant force in the sector. These small growers, often located in remote and underdeveloped regions, have been able to leverage modern technology and better cultivation practices to increase their yields and quality. As a result, they are contributing significantly to the state's tea production and employment generation. This study examines the factors driving the growth of small tea cultivators in Assam and the challenges they face. It also analyzes the potential of this sector to provide livelihoods for a large number of people in the region and contribute to the state's economic development.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Small tea growers, development, plantation

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: INTERNET OF THINGS (IOT) BASED SMART HEALTH CARE MEDICAL BOX FOR ELDERLY PEOPLE

  Author Name(s): B. Getthavani, B. Venkat Kethan, K. Vijay Kumar, P. Shanmuga Reddy, G. Santhosh

  Published Paper ID: - IJCRT2303944

  Register Paper ID - 233653

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2303944 and DOI :

  Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303944
Published Paper PDF: download.php?file=IJCRT2303944
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303944.pdf

  Your Paper Publication Details:

  Title: INTERNET OF THINGS (IOT) BASED SMART HEALTH CARE MEDICAL BOX FOR ELDERLY PEOPLE

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 3  | Year: March 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 3

 Pages: h969-h979

 Year: March 2023

 Downloads: 151

  E-ISSN Number: 2320-2882

 Abstract

Despite the delayed adoption of IoT (Internet of Things) in the healthcare industry compared to other sectors, IoT in medicine is destined to keep the people safe and healthy, with the primary goal being to reduce the cost of health care in the next years. An intelligent medication box linked to sensors and a server for routine health monitoring is suggested as part of a smart Internet of Things-based healthcare system. With the aid of this internet-connected smart pill box, patients can stay on top of their medical regimens and easily communicate with their doctors even when they can't be in the same room at the same time. The suggested medication box has an alert that will remind the patient to take their medication at the prescribed time. Information about the doctor and patient, including medical history, medications, and upcoming appointments, is maintained on a laptop that also serves as a server. The doctor and the patient both have their own login credentials to use on the server. The server also stores the patient's prescription history and body temperature for the convenience of the attending physician. If the doctor decides to make a modification to the patient's prescription, they will be informed via the patient's mobile app. In addition, the doctor is in a position to act quickly in the event of a medical emergency.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Health Care,Internet of Things (IoT), Body sensor network, LCD

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: AUTOMATIC DETECTION AND CLASSIFICATION OF BREAST CANCER USING THE TRANSFER-LEARNING TECHNIQUE.

  Author Name(s): B. Geethavani, R. Ganeswari, N. Hyndavi, V. Bharath Kumar, P.G. Hanumateja

  Published Paper ID: - IJCRT2303943

  Register Paper ID - 233650

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2303943 and DOI :

  Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303943
Published Paper PDF: download.php?file=IJCRT2303943
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303943.pdf

  Your Paper Publication Details:

  Title: AUTOMATIC DETECTION AND CLASSIFICATION OF BREAST CANCER USING THE TRANSFER-LEARNING TECHNIQUE.

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 3  | Year: March 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 3

 Pages: h963-h968

 Year: March 2023

 Downloads: 152

  E-ISSN Number: 2320-2882

 Abstract

Cancer is one of the most deadly diseases. In addition, breast cancer is the most common cancer in women and can be fatal if untreated. Despite substantial improvements in medical technology over the years, a biopsy is still the only effective way to find breast cancer. Pathologists can detect cancer using microscopic histology images. Visualizing cancer is a challenging task that requires a lot of skill, creativity, and focus. Hence, a quicker and more accurate way of detecting breast cancer is needed. As a result of advancements in machine learning and image processing, numerous sorts of research are being conducted to create an efficient partially or totally computer monitored diagnosing system. In this study, invasive ductal carcinoma was diagnosed and classified utilising


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Deep learning, convolutional neural network (CNN), VGG19, Inception, Resnet, and dataset of breast cancer images.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Group Data Sharing in Cloud Computing on Identity Based Encryption

  Author Name(s): N.BABU, M. Sonali, D. Venkatesh, K. Subba Reddy, V. Sai Kumar

  Published Paper ID: - IJCRT2303942

  Register Paper ID - 233648

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2303942 and DOI :

  Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303942
Published Paper PDF: download.php?file=IJCRT2303942
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303942.pdf

  Your Paper Publication Details:

  Title: GROUP DATA SHARING IN CLOUD COMPUTING ON IDENTITY BASED ENCRYPTION

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 3  | Year: March 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 3

 Pages: h957-h962

 Year: March 2023

 Downloads: 155

  E-ISSN Number: 2320-2882

 Abstract

One of the most popular ways to protect data secrecy in many real-world applications, such as cloud-based data storage systems, is using encryption technologies. However, the production of encrypted data in a largely "static" format may obstruct further data processing. For computation or other purposes, encrypted data might need to be "converted" into another format. The idea of encryptions witching was first put up for conversion, namely between Paillier and ElGamal encryptions, in order to allow encryption to be employed in another device equipped with a different encryption mechanism. The conversion between traditional identity-based and attribute-based encryptions is taken into consideration in this research, and it also makes a concrete construction suggestion using the proxy re-encryption technique. In the standard model, it is demonstrated that the design is CPA secure under the q-decisional parallel bilinear Diffie-Hellman exponent assumption. The performance comparisons show that, especially when the client's data is encrypted and outsourced to a distant cloud, our bridging technique lowers compute and communication costs on the client side. In practise, it is acceptable to incur the computational overhead associated with re-encryption (on the server side) and decryption (on the client side).


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CPA security, identity-based encryption, attribute-based encryption, encryption switching, data security.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: A Trustworthy Block chain-based Domain Name System

  Author Name(s): P. M. M. S. Chandu, M. Jashwanth, R. Gayathri, K. Jayakiran, G. Bhuvanesh

  Published Paper ID: - IJCRT2303941

  Register Paper ID - 233646

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2303941 and DOI :

  Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303941
Published Paper PDF: download.php?file=IJCRT2303941
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303941.pdf

  Your Paper Publication Details:

  Title: A TRUSTWORTHY BLOCK CHAIN-BASED DOMAIN NAME SYSTEM

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 3  | Year: March 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 3

 Pages: h949-h956

 Year: March 2023

 Downloads: 168

  E-ISSN Number: 2320-2882

 Abstract

T 2 DNS is a third-party DNS service that we created. T 2 DNS provides client trustworthiness evidence, protects clients from channel and server attackers, is compatible with the current Internet infrastructure, and introduces bounded overhead while serving client DNS queries. T 2 DNS uses an encryption and obfuscation hybrid protocol to protect user privacy, and Intel SGX is used to power its service proxy. Scaling the initialization procedure, limiting the obfuscation overhead, and fine-tuning useful system parameters are obstacles we successfully overcame. We develop a T 2 DNS prototype, and testing demonstrates that it is completely functional, has a manageable overhead when compared to alternative alternatives, and scales to the number of customers.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Ethereum, smart contracts, DNS security, block chains.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Block chain in Student Registration System

  Author Name(s): K.Maheswari, C. Kavya, B. Mohan Sai, P. Madhusudhan, D. Mahidhar

  Published Paper ID: - IJCRT2303940

  Register Paper ID - 233647

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2303940 and DOI :

  Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303940
Published Paper PDF: download.php?file=IJCRT2303940
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303940.pdf

  Your Paper Publication Details:

  Title: BLOCK CHAIN IN STUDENT REGISTRATION SYSTEM

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 3  | Year: March 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 3

 Pages: h944-h948

 Year: March 2023

 Downloads: 150

  E-ISSN Number: 2320-2882

 Abstract

Blockchain enables us to design a decentralised environment free from interference from outside parties. Every completed transaction is permanently validated and recorded in a public ledger. We suggest a global platform for managing student data and attendance based on blockchain technology. It makes up an internationally reputable, decentralised network for managing student data, attendance, and file sharing that can provide security at the level of a school or higher educational institution.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Block chain in student management system, student registration system.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Virus Spreading Control over network by using Black and White Algorithm

  Author Name(s): B. Pavan Kumar, V. Dhanushya, A. Dileep, B. Anusha, N. Hithesh

  Published Paper ID: - IJCRT2303939

  Register Paper ID - 233645

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2303939 and DOI :

  Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303939
Published Paper PDF: download.php?file=IJCRT2303939
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303939.pdf

  Your Paper Publication Details:

  Title: VIRUS SPREADING CONTROL OVER NETWORK BY USING BLACK AND WHITE ALGORITHM

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 3  | Year: March 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 3

 Pages: h937-h943

 Year: March 2023

 Downloads: 150

  E-ISSN Number: 2320-2882

 Abstract

Although difficult, controlling viral propagation over intricate networks on a tight budget has received a lot of attention. In order to restrict viral spread, this article seeks to answer the combinatorial, discrete resource allocation problems (RAPs). A co-evolutionary algorithm with network-community-based decomposition is offered as an evolutionary divide-and-conquer method to address the challenges of growing network scales and boost solving effectiveness. It is distinguished by its use of a community-based dividing strategy and cooperative co-evolutionary philosophy. Secondly, in order to decrease the time complexity, NCD-CEA separates a network into numerous communities using a modified community detection technique, resulting in a clustering of the variables that are most important to the solution. Then, the problem and the global swarm are divided into smaller problems and smaller swarms using low-dimensional Second, an alternate evolutionary strategy that promotes the evolution of sub swarms and the global swarm in turn, with sub solutions assessed by local fitness, is meant to produce high-quality solutions.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Resource distribution, networked systems, spreading control, cooperative coevolution (CC).

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Predicting Cervical Cancer Prognosis using a Health Recommendation System.

  Author Name(s): R.G. Kumar, V. Pradeepa, B. Naga Bhushana, E. Nandakumar, Y. Pallavi

  Published Paper ID: - IJCRT2303938

  Register Paper ID - 233643

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2303938 and DOI :

  Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303938
Published Paper PDF: download.php?file=IJCRT2303938
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303938.pdf

  Your Paper Publication Details:

  Title: PREDICTING CERVICAL CANCER PROGNOSIS USING A HEALTH RECOMMENDATION SYSTEM.

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 3  | Year: March 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 3

 Pages: h931-h936

 Year: March 2023

 Downloads: 194

  E-ISSN Number: 2320-2882

 Abstract

The most common gynaecological malignancy that causes serious issues for women if left untreated is cervical cancer. This study exhibits various classification algorithms and demonstrates the benefit of feature selection methodologies for the most accurate cervical cancer disease prediction. The amount of patient digital system data in the healthcare industry is utilised to extract information and predict immune deficiency syndrome, which aids in patients' informed decision-making. To help patients understand the reports' material better, a health recommender system is employed. For feature selection in the proposed model, we employ wrapper techniques with the K Nearest Neighbor (KNN) classifier, and Multi Objective Algorithm (MOA) has been identified. is utilised in this system for feature selection as the most effective evolutionary algorithm to choose the key features with less complexity as compared to other conventional feature selection approaches. The dataset for the implementation and accuracy of the cervical cancer risk classification has been used as the assessment parameter.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

K-Nearest Neighbor Algorithm, Multi Objective Algorithm, Feature Selection, Prediction, Health Recommender System

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Content Integrity as Counter-Measure to Site Content Attacks

  Author Name(s): J. Sridhar, T. Charan sai, Adarsh Dubey, P. Dinesh Reddy, T.D. Goutham Kumar

  Published Paper ID: - IJCRT2303937

  Register Paper ID - 233641

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2303937 and DOI :

  Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303937
Published Paper PDF: download.php?file=IJCRT2303937
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303937.pdf

  Your Paper Publication Details:

  Title: CONTENT INTEGRITY AS COUNTER-MEASURE TO SITE CONTENT ATTACKS

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 3  | Year: March 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 3

 Pages: h923-h930

 Year: March 2023

 Downloads: 152

  E-ISSN Number: 2320-2882

 Abstract

This article discusses the Content Security Policy (CSP) header, which is now the most popular defence against Cross-Site Scripting (XSS) assaults. It is stressed that the CSP header implementation is a comparatively easy way to raise the security level of Internet-based communication between people and devices. This makes it possible to precisely define the communication parties and web service assets utilised in the environments where secure web services are essential, such as web applications and Internet of Things (IoT) networks. As straightforward and efficient reporting is a natural element of the CSP design, administrators can be alerted to active attacks practically immediately. On real-world situations, the advantages of implementing CSP for communication are shown, as well as how simple it is to spread CSP.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Information security, organisation personnel, security planning and control

  License

Creative Commons Attribution 4.0 and The Open Definition



Call For Paper June 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer