IRJCS – March Issue, Volume 13, Issue 03 of March 2026. No.02

S.No

Title & Authors Details

Paper ID

 

15.

 


Network Log Analyzer for Attack Detection


Authors:  Saranya N, Niga S, Prof.P.Sangeetha

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.15

 

CSMR26.

MRCS10094

 

 

16.

 


Secure Federated Learning Framework for privacy- Preserving AI Models

Authors:  Prof.K.Ashok Kumar, Sonali J , Ambika Kumari, Abinaya K

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.16

 

CSMR26.

MRCS10095

 

 

17.

 


Design and Implementation of a Honeypot Network for Malware Collection and Analysis

Authors:  D.Amuthvalli,Devajanani V, Nikitha M, Nishandhi P, Oviya S

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.17

 

CSMR26.

MRCS10096

 

 

18.

 


Advanced Persistent Threat (APT) Detection Using Machine Learning & Network Flow Analysis

Authors:  Prof.K.Ashok Kumar, Dharan D, Kavin M, Jothivarma K

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.18

 

CSMR26.

MRCS10097

 

 

19.

 


Distributed Denial-of-Service Attack Detection Using Machine Learning

Authors:  Prof.K.Ashok Kumar, Deepak R, Elamaran E, Jaiakash S

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.19

 

CSMR26.

MRCS10098

 

 

20.

 


PHISHNET: Phishing Detection Website

Authors:  P.Rengasamy, Elango P,Gowtham S,Vishnu kumar U

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.20

 

CSMR26.

MRCS10099

 

 

21.

 


Web Vulnerability Scanner

Authors: T.Sineka, Pradeep K,Perarasu B,SathishKumar M,Sowndhar R

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.21

 

CSMR26.

MRCS10100

 

 

22.

 


Deep Fake Detection Using Machine Convolutional Neural Networks

Authors:  M.Surya, Naveen.G,Kapil T,Saran S,Premkumar.G

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.22

 

CSMR26.

MRCS10101

 

 

23.

 


File Integrity Monitoring

Authors:  S.Malathi, Balamanigandan G,Kabilan K,Santhosh G

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.23

 

CSMR26.

MRCS10102

 

 

24.

 

Zero Trust Microservices Security in Kubernetes

Authors: Sangeetha, Arun Vasanth R,Vikram M,Dharmalingam M,Velayatham C

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.24

 

CSMR26.

MRCS10103

 

25.

 


Adversarial Machine Learning Attacks and Defence on Deep Neutral Network in Cyber Security

Authors:  P.Rengasamy, Ajay SuryaA R,Nithish K,Selvam A,Sneha C,

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.25

 

CSMR26.

MRCS10104

 

26.

 


Steganography and Steganalysis System Using Deep Learning

Authors:  S.Kanmani, Abhishek kumar,Suryakant Kumar,Vinay Kumar Yadav,

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.26

 

CSMR26.

MRCS10105

 

 

27.

 


Spam Detection System Using  Machine Learning

Authors:Malathi, Chandan Kumar,Deepak kumar,Gaurav singh,Harsh Raj

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.27

 

CSMR26.

MRCS10106

 

 

28.

 


Detection of DNS Tunneling Attack Using Network Traffic Entropy Analysis

Authors:  S.Kanmani, Bantikumar Goswamy, Bharatkumar, Ragavan.R, Shubham Giri

Doi:> https://doi.org/10.26562/irjcs.2026.v1303.28

 

CSMR26.

MRCS10107