International Journal of communication and computer Technologies https://ijccts.org/index.php/pub <p>The "<em><strong>International Journal of Communication and Computer Technologies (IJCCTS) (ISSN - 2278-9723)</strong></em>," published by the Society for Communication and Computer Technologies, likely has the following aim and scope:</p> <p><strong>Aim:</strong> The aim of the<em><strong> International Journal of Communication and Computer Technologies (IJCCTS)</strong></em> is to provide a platform for researchers, scholars, engineers, and practitioners to disseminate cutting-edge research findings, innovations, and developments in the fields of communication and computer technologies. The journal strives to facilitate the exchange of ideas and knowledge, fostering collaboration and advancement in these rapidly evolving disciplines.</p> <p><strong>Scope:</strong> The scope of the International Journal of Communication and Computer Technologies (IJCCTS) encompasses a wide range of topics related to communication systems, networks, and computer technologies. This includes, but is not limited to, communication systems, computer networks, information theory, signal processing, and wireless/mobile communications. Additionally, it addresses areas such as computer architecture, cybersecurity, the Internet of Things (IoT), and artificial intelligence (AI) applied to communication and computer systems. Through original research papers, review articles, and technical notes, the journal aims to facilitate the exchange of ideas and advancements in these rapidly evolving fields.</p> <p>The <em>International Journal of Communication and Computer Technologies (IJCCTS)</em> welcomes original research papers, review articles, and technical notes that contribute to the advancement of knowledge and understanding in these areas. The journal follows a rigorous peer-review process to ensure the quality and relevance of published articles.</p> en-US editor@ijccts.org (Dr.A.Surendar) info@sccts.org (M.KAVITHA) Tue, 04 Nov 2025 00:00:00 +0300 OJS 3.3.0.14 http://blogs.law.harvard.edu/tech/rss 60 Harnessing Quantum Computing and Generative AI for Next-Generation Credit Fraud Detection: Real-Time Anomaly Detection and Adversarial Risk Mitigation https://ijccts.org/index.php/pub/article/view/251 <p>The increasing complexity of financial crimes has revealed severe weaknesses in the conventional credit fraud detection systems. With the future and development of the digital payment ecosystem expanding rapidly around the world, there is an immediate necessity of smart, adaptive, and dynamic solutions, able to intercept the growing trends of fraud. The paper will apply a hybrid model based on combining both Quantum Computing and Generative Artificial Intelligence (GenAI) to transform credit fraud detection. Quantum Computing opens up initial brand-new levels of computational power and parallel processing with an understanding of mass data analysis within transactions. Meanwhile, GenAI advances fraud detection because GenAI can produce fake cases of fraud, simulate human behaviours, and increase model resilience. The combination of these technologies provides the basis for proactive detection of anomalies and dynamic risk evaluation. It is based on a conceptual architecture, which fuses quantum-enhanced learning models with adversarially trained GenAI systems. The framework helps detect anomalies in real-time, adapt to learn a greater diversity of fraud patterns, and mitigate risks adversarial through a convenient methodology based on federated learning and model training secrets. This is a multidisciplinary approach that is natural to both traditional systems based upon rules and establishes the way to a scalable, smart, and regulations-adherent fraud detection infrastructure. Our results indicate a transformative possibility of the integration of emerging technologies to construct next-generation security systems that can predict and defend credit fraud at a greater pace and accuracy.</p> Puneet Pahuja Copyright (c) 2025 International Journal of communication and computer Technologies https://creativecommons.org/licenses/by-nc-sa/4.0 https://ijccts.org/index.php/pub/article/view/251 Tue, 04 Nov 2025 00:00:00 +0300 Protecting Distributed Ledgers from Advanced Persistent Threats Using SVM-Based Blockchain Security https://ijccts.org/index.php/pub/article/view/235 <p>This work focuses on multi-dimensional approach to incorporate the Support Vector Machine (SVM) models with Blockchain to secure distributed ledger against APTs. The classifying and high pattern recognition ability of SVM makes the proposed framework easily capture and neutralize malicious activities in the blockchain networks in realtime. The distribution of the blockchain technology and use of machine learning for predictive modeling guarantees a hard-coded countermeasure against new forms of cyber threats. As such, this work is centered on how these technologies can be integrated in harmony: attempting to enhance the accuracy of threat identification without compromising the functionality of the blockchain. This implementation shows the possibility of achieving strong, secure and scalable applications in different applications domains, and so make a way forward for upcoming decentralized cybersecurity solutions.</p> Kiruba Buri R, swaminathan K Copyright (c) 2025 International Journal of communication and computer Technologies https://creativecommons.org/licenses/by-nc-sa/4.0 https://ijccts.org/index.php/pub/article/view/235 Tue, 04 Nov 2025 00:00:00 +0300