Deep learning techniques for classification of brain MRI. | 0 | 0.34 | 2020 |
A framework for phishing attack identification using rough set and formal concept analysis. | 0 | 0.34 | 2017 |
Book Review: Big Data Analytics. | 0 | 0.34 | 2015 |
Comparative Analysis of Cryptography Library in IoT. | 0 | 0.34 | 2015 |
Application Security framework for Mobile App Development in Enterprise setup. | 2 | 0.40 | 2015 |
Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment. | 0 | 0.34 | 2015 |
Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs. | 0 | 0.34 | 2015 |
Survey of Operating Systems for the IoT Environment. | 2 | 0.39 | 2015 |
Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments | 0 | 0.34 | 2014 |
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems. | 2 | 0.43 | 2014 |
Energy Harvesting in M2M and WSN Space. | 0 | 0.34 | 2014 |
Reversible and Irreversible Data Hiding Technique. | 3 | 0.41 | 2014 |
Steganalysis: Detecting LSB Steganographic Techniques. | 0 | 0.34 | 2014 |
Digital Watermarking Techniques in Spatial and Frequency Domain. | 0 | 0.34 | 2014 |
Application Layer Intrusion Detection with Combination of Explicit-Rule- Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program. | 1 | 0.35 | 2014 |
Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution | 0 | 0.34 | 2014 |
Secure Authentication of Cloud Data Mining API. | 0 | 0.34 | 2013 |
Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services. | 11 | 0.70 | 2013 |
Machine Translation Systems in India | 0 | 0.34 | 2013 |
RISM - Reputation Based Intrusion Detection System for Mobile Ad hoc Networks. | 12 | 0.79 | 2013 |
Impact of mobile transmitter sources on radio frequency wireless energy harvesting | 8 | 0.94 | 2013 |
Finding numerical solutions of diophantine equations using ant colony optimization | 1 | 0.39 | 2013 |
Impact of mobile transmitter sources on radio frequency wireless energy harvesting | 1 | 0.35 | 2013 |
Cloud Computing -- An Approach with Modern Cryptography | 2 | 0.38 | 2013 |
Clustering online social network communities using genetic algorithms. | 2 | 0.38 | 2013 |
Detection and prevention of botnets and malware in an enterprise network | 4 | 0.42 | 2013 |
Inter-Cloud Data Security Strategies | 2 | 0.38 | 2013 |
Increasing Security in Cloud Environment | 2 | 0.38 | 2013 |
Sleep Deprivation Attack Detection in Wireless Sensor Network | 21 | 0.97 | 2012 |
Reciprocally induced coevolution: A computational metaphor in Mathematics | 0 | 0.34 | 2012 |
TSET: Token based Secure Electronic Transaction | 0 | 0.34 | 2012 |
Collusion resistant self-healing key distribution in mobile wireless networks | 3 | 0.41 | 2012 |
Training artificial neural networks using APPM | 19 | 1.19 | 2012 |
Rule Based Expert System for Cerebral Palsy Diagnosis | 3 | 0.87 | 2012 |
A Hybrid Approach Towards Intrusion Detection Based on Artificial Immune System and Soft Computing | 1 | 0.36 | 2012 |
Proactive TCP mechanism to improve Handover performance in Mobile Satellite and Terrestrial Networks | 0 | 0.34 | 2012 |
Prover and Verifier Based Password Protection: PVBPP | 0 | 0.34 | 2012 |
Rule Based Expert System for Diagnosis of Neuromuscular Disorders | 0 | 0.34 | 2012 |
A PAXOS based State Machine Replication System for Anomaly Detection | 2 | 0.38 | 2012 |
Implementation of a Real Time Passenger Information System | 2 | 0.39 | 2012 |
Routing Protocols for Mobile and Vehicular Ad-Hoc Networks: A Comparative Analysis | 2 | 0.39 | 2012 |
A Multi-Dimensional approach towards Intrusion Detection System | 7 | 0.63 | 2012 |
Performance analysis of deterministic key allocation schemes for wireless sensor networks | 0 | 0.34 | 2012 |
A Connectionist Network Approach to Find Numerical Solutions of Diophantine Equations | 1 | 0.37 | 2012 |
A Review of Techniques to Mitigate Sybil Attacks | 2 | 0.38 | 2012 |
Security Architecture for Cluster based Ad Hoc Networks | 1 | 0.36 | 2012 |
A Survey on Various Data Hiding Techniques and their Comparative Analysis | 3 | 0.42 | 2012 |
A Heuristic Reputation Based System to Detect Spam activities in a Social Networking Platform, HRSSSNP | 0 | 0.34 | 2012 |
Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques | 20 | 0.93 | 2012 |
Optimal Allocation Of Rates In Guaranteed Service Networks | 1 | 0.35 | 2012 |