| A metaheuristic approach for application partitioning in mobile system – B.TECH IN NS2 SIMULATION |
| Towards an evolvable cellular architecture– B.TECH IN NS2 SIMULATION |
| Beyond gut instincts: Understanding, rating and comparing self-learning IDSs– B.TECH IN NS2 SIMULATION |
| Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis– B.TECH IN NS2 SIMULATION |
| Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems– B.TECH IN NS2 SIMULATION |
| DPWSec: Devices profile for Web Services Security– B.TECH IN NS2 SIMULATION |
| Practical voice session selection with FAHP in next generation wireless network– B.TECH IN NS2 SIMULATION |
| Riposte: An Anonymous Messaging System Handling Millions of Users– B.TECH IN NS2 SIMULATION |
| Stepped-FM UWB Home Security Sensor Using Tracking Filter– B.TECH IN NS2 SIMULATION |
| Exploitation of a dual-band cell phone antenna for near-field WPT– B.TECH IN NS2 SIMULATION |
| Guarding networks through heterogeneous mobile guards– B.TECH IN NS2 SIMULATION |
| JAMMY: a Distributed and Self-Adaptive Solution against Selective Jamming Attack in TDMA WSNs– B.TECH IN NS2 SIMULATION |
| Hacker’s toolbox: Detecting software-based 802.11 evil twin access points– B.TECH IN NS2 SIMULATION |
| Detecting and Preventing Online Identity Deception in Social Networking Services– B.TECH IN NS2 SIMULATION |
| Achieving shannon capacity region as secrecy rate region in a multiple access wiretap channel– B.TECH IN NS2 SIMULATION |
| Remote APDU Call Secure (RACS) creating secure and trusted applications for NFC mobile devices– B.TECH IN NS2 SIMULATION |
| Linking virtual and real-world identities– B.TECH IN NS2 SIMULATION |
| HaTen2: Billion-scale tensor decompositions– B.TECH IN NS2 SIMULATION |
| A pub/sub based architecture to support public healthcare data exchange– B.TECH IN NS2 SIMULATION |
| Postprocessing of the Oblivious Key in Quantum Private Query– B.TECH IN NS2 SIMULATION |
| Analysis of criminal social networks with typed and directed edges– B.TECH IN NS2 SIMULATION |
| A new non-intrusive authentication method based on dynamics of driver’s upper body joint angles– B.TECH IN NS2 SIMULATION |
| Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution–permutation functions and near-collision attacks on its hashing modes– B.TECH IN NS2 SIMULATION |
| Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices– B.TECH IN NS2 SIMULATION |
| Exploitation of a dual-band cell phone antenna for near-field WPT– B.TECH IN NS2 SIMULATION |
| 2015 IEEE B.TECH IN NS2 SIMULATION |