DOI: https://doi.org/10.26483/ijarcs.v13i2

Published: 2022-04-20

Service Workers (SW): Facilitating Offline Accessibility in Web Applications

Sunday A. Idowu, Adewale O. Adebayo, Chigozirim Ajaegbu, Oluwatofunmi O Adetunji

1-8

DOI: https://doi.org/10.26483/ijarcs.v13i2.6810
DOI: https://doi.org/10.26483/ijarcs.v13i2.6813
DOI: https://doi.org/10.26483/ijarcs.v13i2.6804
DOI: https://doi.org/10.26483/ijarcs.v13i2.6807
DOI: https://doi.org/10.26483/ijarcs.v13i2.6808
DOI: https://doi.org/10.26483/ijarcs.v13i2.6811
DOI: https://doi.org/10.26483/ijarcs.v13i2.6812

ANALYSIS OFMODERN CYBERSECURITY THREAT TECHNIQUES ANDAVAILABLE MITIGATING METHODS

Wumi AJAYI, Obi Ibeto, Taiwo Olomola and Mathias Madewa

49-55

DOI: https://doi.org/10.26483/ijarcs.v13i2.6815

Improving Test Automation Using Genetic Algorithm

Wumi Ajayi, Owolabi Bukola, Ahmed Jolaosho

56-63

DOI: https://doi.org/10.26483/ijarcs.v13i2.6814
DOI: https://doi.org/10.26483/ijarcs.v13i2.6817