Proceedings of the International Conference on Recent Advancements and Modernisations in Sustainable Intelligent Technologies and Applications (RAMSITA 2025)

Session: Ubiquitous Computing, Networking and Cyber Security

8 articles
Proceedings Article

Maximizing Cloud Security: Synergistic Approaches to Multi-factor Authentication Deployment

M. P. Dhanveer Prakash, Anurag Singh
Cloud computing has transformed traditional IT infrastructure, offering dynamic, configurable resources on demand. On the other hand, it brings unique cybersecurity challenges, particularly in protecting sensitive data from unauthorized access. Traditional single factor authentication does not address...
Proceedings Article

Review on Network Slicing Optimization: A Machine Learning Perspective

Margi Patel, Nitin Rathore, Ramesh R. Naik, Sashrik Gupta, Vinod Patel
Investigating how network slicing affects resource allocation and management, the paper explores methods for optimizing network resources in response to current demand and traffic trends. The effect of network slicing on Quality of Service (QoS) measurements is also examined, along with the ways in which...
Proceedings Article

A Detailed Analysis of Modern Load Balancing Methods in Software Defined Networks

Prerita Kulkarni, Nitika Vats Doohan, Rajesh Nagar
In these days of smart technology, the use of internet-connected devices has increased dramatically. This has led to a sharp rise in online activity. The necessity to manage a single server with several clients, which might lead to denial of service (DoS) assaults, restricted service availability, and...
Proceedings Article

Effective Security Analytical Enhancement for Cross-Site Scripting and Code Injection Vulnerabilities in Web Security

Shreyas Pagare, Anish Kumar Choudhary, Sanjay Thakur, Ashutosh Khemriya, Deepesh Shrivas
SQL injection and Cross-Site Scripting (XSS) have emerged as significant security vulnerabilities in contemporary web applications, eclipsing buffer overflow weaknesses, as indicated by recent vulnerability and exploit reports. Both SQL injection and XSS exemplify a broader category of input validation...
Proceedings Article

Estimating Software Security of a College ERP System: A Case Study Using Software Product Security Framework Approach

Smriti Jain, Nitin Kulkarni, Maya Ingle
Security is a major concern for business applications. With the intertwined dependencies of various security measures to secure an enterprise application, security must be included in the development process since its inception, i.e. from requirements gathering till the operation of the software. Various...
Proceedings Article

A Survey of Attack Prediction Approaches in Cyber Security

Varsha Zokarkar, Kirti Mathur
In the age of digitization, Cyber-attacks significantly affect the world. Lots of resources and the economy are compromised due to cyberattacks. Predictions of cyber attacks enable us to handle the attack at the appropriate time, which can save money and resources. This paper surveys the different methodologies...
Proceedings Article

A Review of Different Approaches to Detect Online Cyberbullying and Hate Speech

K. M. Chaman Kumar, Parth Mahajan, Tejas Naik, Navjyot Naik, Aryan Gaonkar
With the rapid rise in social media usage, platforms such as X(Twitter), Instagram and Facebook have become prevalent spaces for online interaction. These platforms allow users to share different forms of media such as text, image, video, etc. However, these platforms have also become a hotspot for harmful...
Proceedings Article

Mapping the Landscape: A Comprehension Review of Automated Cyberbullying Detection in Digital World

Nidhi Nigam, Poorva Shukla, Namrata Nebhnani
Digital world provides platforms to people at large scale to share their updates, opinions publically. Various social media platforms, online messaging forums and applications are channels to spread digital hate through Cyberbullying, hate speech etc. in native languages. Cyberbullying detection is one...