
Google Scholar Indexing for Journals: Complete Expert Guide
Google Scholar Indexing for Journals: Complete Expert Guide Fast-Track Your Research Visibility with Proven Indexing…
Call for Papers: IJCT – International Journal of Computer Techniques 2025
Submit Your Article: Send your manuscripts to [editorijctjournal@gmail.com]. Submission Deadline: Last date for paper submission: December…
SURYAPRAKASH NALLURI
SuryaPrakash Nalluri - Cybersecurity Expert & IJCT Reviewer 🔹 Reviewer Profile - SuryaPrakash Nalluri 🔹…
Security and Privacy Considerations of Metadata
Radhika RavindranathNew Jersey, USA(Email: radhika.ravindranat@gmail.com) Abstract Metadata or meta information, also known as “data that…
Implementing Dynamic Routing with Codelist in Sterling Integrator: Custom Business Process Strategies for Flexible, Rules-Driven Routing – Volume 11 Issue 6
International Journal of Computer Techniques ISSN 2394-2231 DOI Registered Volume 11, Issue 6 | Published:…
Shift-Left Security Practices in Kubernetes-Based DevOps Environments: Measuring Impact on Software Vulnerability Reduction | IJCT Volume 11 – Issue 5 | IJCT-V11I5P4
International Journal of Computer Techniques ISSN 2394-2231 DOI Registered Volume 11, Issue 5 | Published:…
Configuring IBM Connect:Direct Server Adapter with Secure+ for Encrypted and Authenticated File Transfers in Heterogeneous Network Environments – Volume 11 Issue 4
International Journal of Computer Techniques ISSN 2394-2231 DOI Registered Volume 11, Issue 4 | Published:…
The Impact of AI and Machine Learning on Product Modeling in CRM – 2024
View Citation on Google Scholar The Impact of AI and Machine Learning on Product Modeling…
International Journal of Computer Techniques Volume 11 Issue 4 | Smart Nation Rising: How AI and Machine Learning Are Redefining American Innovation and Global Leadership
View Citation on Google Scholar Smart Nation Rising: AI & ML in American Innovation Smart…






