A metaheuristic approach for application partitioning in mobile system – B.TECH IN NS2 SIMULATION |
Towards an evolvable cellular architecture– B.TECH IN NS2 SIMULATION |
Beyond gut instincts: Understanding, rating and comparing self-learning IDSs– B.TECH IN NS2 SIMULATION |
Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis– B.TECH IN NS2 SIMULATION |
Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems– B.TECH IN NS2 SIMULATION |
DPWSec: Devices profile for Web Services Security– B.TECH IN NS2 SIMULATION |
Practical voice session selection with FAHP in next generation wireless network– B.TECH IN NS2 SIMULATION |
Riposte: An Anonymous Messaging System Handling Millions of Users– B.TECH IN NS2 SIMULATION |
Stepped-FM UWB Home Security Sensor Using Tracking Filter– B.TECH IN NS2 SIMULATION |
Exploitation of a dual-band cell phone antenna for near-field WPT– B.TECH IN NS2 SIMULATION |
Guarding networks through heterogeneous mobile guards– B.TECH IN NS2 SIMULATION |
JAMMY: a Distributed and Self-Adaptive Solution against Selective Jamming Attack in TDMA WSNs– B.TECH IN NS2 SIMULATION |
Hacker’s toolbox: Detecting software-based 802.11 evil twin access points– B.TECH IN NS2 SIMULATION |
Detecting and Preventing Online Identity Deception in Social Networking Services– B.TECH IN NS2 SIMULATION |
Achieving shannon capacity region as secrecy rate region in a multiple access wiretap channel– B.TECH IN NS2 SIMULATION |
Remote APDU Call Secure (RACS) creating secure and trusted applications for NFC mobile devices– B.TECH IN NS2 SIMULATION |
Linking virtual and real-world identities– B.TECH IN NS2 SIMULATION |
HaTen2: Billion-scale tensor decompositions– B.TECH IN NS2 SIMULATION |
A pub/sub based architecture to support public healthcare data exchange– B.TECH IN NS2 SIMULATION |
Postprocessing of the Oblivious Key in Quantum Private Query– B.TECH IN NS2 SIMULATION |
Analysis of criminal social networks with typed and directed edges– B.TECH IN NS2 SIMULATION |
A new non-intrusive authentication method based on dynamics of driver’s upper body joint angles– B.TECH IN NS2 SIMULATION |
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution–permutation functions and near-collision attacks on its hashing modes– B.TECH IN NS2 SIMULATION |
Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices– B.TECH IN NS2 SIMULATION |
Exploitation of a dual-band cell phone antenna for near-field WPT– B.TECH IN NS2 SIMULATION |
2015 IEEE B.TECH IN NS2 SIMULATION |