Skip to main content
Skip to main navigation menu
Skip to site footer
Journal of Advanced Research in Electronics Engineering and Technology
Current
Archives
About
About the Journal
Editorial Team
Submissions
Contact
Search
Search
Register
Login
Home
/
Archives
/
Vol 12 No 1&2 (2025): Journal of Advanced Research in Electronics Engineering and Technology
Published:
2025-05-03
Research Article
Decoding Ransomware: Crafting a Comprehensive Taxonomy and Actionable Insights for Risk Mitigation
Swati Goyal, Himanshi nshi
1-11
pdf
Ransomware Evolution: Techniques, Countermeasures, and Legal Implications
Pankaj Kautik Patil
12-23
pdf
Augmented Reality (AR): Cybersecurity Risks in Military Applications
Rajesh Gopal
24-31
pdf
Cyber Diplomacy Framework for India: Lessons from Global Strategies and a Roadmap for the Future
Samrat Kishor
32-39
pdf
Combating Advanced Persistent Threats (APTS) in Critical Infrastructure
Karthik Varadharajan
40-62
Development of an Intrusion Detection System (IDS) using Machine Learning Algorithms
Dilip Khanolkar
63-69
pdf
Enhancing District Police Cyber Cell Responses to Cyber Fraud: Challenges, Strategies, and Best Practices
Dharmendra Singh
70-76
pdf
Cybersecurity Awareness and Social Media Reach: Analyzing the Effectiveness of Awareness Content Distribution
Mohamed Ismail E
77-80
pdf
Leveraging Heuristic Approaches to Optimize Lattice-Based Homomorphic Encryption via Approximate Shortest Vector Problem Solutions
Lisa Biswas
81-88
pdf
Optimizing of Multi-Layer Perceptron for Detecting PDF Malware: A study in Machine Learning
Bertrand Lawrence R Rodrigues
89-95
pdf
Revolutionising Security Operations in the BFSI Sector with XDR Technology
Fahad Rehman
96-105
pdf
Long Short-Term Memory Network (LSTM) based Phishing Detection Model for E-Mail and SMS with or without URL
Murali Dharmalingam
106-117
pdf
GridVigil: Tri-securing Critical Infrastructure of energy transmission systems through People, Process and Technology
Hardik Gadhvi, Ranmuktey Grid
118-123
pdf
Review Article
Strengthening OT Networks in Critical Infra structure: A Comprehensive Cybersecurity Strategy Leveraging Trojan Hunt India’s Data Diode and Threat Monitoring (InSKIA and OT SOC)
Kunal Sharma
123-127
pdf
Cyber Security Assessment: A Case Study of Smart Metering Infrastructure
Zeeshan Khan
128-135
pdf
Barriers to the protection of patient data and the need for immediate action in light of recent data breach incidents in India
Shashank Chaturvedi
136-140
pdf
Cybersecurity issues in Cellular Technology
Gaurav Mahajan
141-144
pdf
Cybersecurity Skill Gap in India
Abhishek Tripathi
145-149
pdf
Cybersecurity in Healthcare: How Regulation Is the Key to Pushing Cyber Resilience
Jason Joseph
150-153
pdf
From Legacy Threats to Modern Risks – Building a Cybersecurity Framework for Sporting Events
Priyanka Nambissan
154-159
pdf
Next-Gen Bio-Implant Ecosystem for Secure Living: Real-Time Medical Access and Criminal Monitoring
Arun S
160-166
pdf
Securing Generative AI Applications
Neehar Pathare
167-173
pdf
Studying the use cases of Vision AI in detecting QR Code Phishing
Shalabh Pradhan
174-178
pdf
Technostress in Cybersecurity: Evaluating Its Effects on Professional Performance and Organisational Security
Jayan Kopparethu Gopinadhan Pillai
179-187
pdf
The Shadow of FUD: Examining Fear, Uncertainty, and Doubt in the Cybersecurity Landscape
Love Vishwakarma
188-190
pdf
Enforcing Mobile Application Blocking in India: A Technological Analysis
Pankaj Sachdeva, Ravi Krishan Meena
191-194
pdf
Secure AI adoption framework for a multi-tenant SaaS Product Companies
Santosh Chachar
195-203
pdf
Information
For Readers
For Authors
For Librarians