B.TECH IN NS2 SIMULATION


B.TECH IN NS2 SIMULATION
A metaheuristic approach for application partitioning in mobile system – B.TECH IN NS2 SIMULATION
Towards an evolvable cellular architecture– B.TECH IN NS2 SIMULATION
Beyond gut instincts: Understanding, rating and comparing self-learning IDSs– B.TECH IN NS2 SIMULATION
Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis– B.TECH IN NS2 SIMULATION
Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems– B.TECH IN NS2 SIMULATION
DPWSec: Devices profile for Web Services Security– B.TECH IN NS2 SIMULATION
Practical voice session selection with FAHP in next generation wireless network– B.TECH IN NS2 SIMULATION
Riposte: An Anonymous Messaging System Handling Millions of Users– B.TECH IN NS2 SIMULATION
Stepped-FM UWB Home Security Sensor Using Tracking Filter– B.TECH IN NS2 SIMULATION
Exploitation of a dual-band cell phone antenna for near-field WPT– B.TECH IN NS2 SIMULATION
Guarding networks through heterogeneous mobile guards– B.TECH IN NS2 SIMULATION
JAMMY: a Distributed and Self-Adaptive Solution against Selective Jamming Attack in TDMA WSNs– B.TECH IN NS2 SIMULATION
Hacker’s toolbox: Detecting software-based 802.11 evil twin access points– B.TECH IN NS2 SIMULATION
Detecting and Preventing Online Identity Deception in Social Networking Services– B.TECH IN NS2 SIMULATION
Achieving shannon capacity region as secrecy rate region in a multiple access wiretap channel– B.TECH IN NS2 SIMULATION
Remote APDU Call Secure (RACS) creating secure and trusted applications for NFC mobile devices– B.TECH IN NS2 SIMULATION
Linking virtual and real-world identities– B.TECH IN NS2 SIMULATION
HaTen2: Billion-scale tensor decompositions– B.TECH IN NS2 SIMULATION
A pub/sub based architecture to support public healthcare data exchange– B.TECH IN NS2 SIMULATION
Postprocessing of the Oblivious Key in Quantum Private Query– B.TECH IN NS2 SIMULATION
Analysis of criminal social networks with typed and directed edges– B.TECH IN NS2 SIMULATION
A new non-intrusive authentication method based on dynamics of driver’s upper body joint angles– B.TECH IN NS2 SIMULATION
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution–permutation functions and near-collision attacks on its hashing modes– B.TECH IN NS2 SIMULATION
Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices– B.TECH IN NS2 SIMULATION
Exploitation of a dual-band cell phone antenna for near-field WPT– B.TECH IN NS2 SIMULATION
2015 IEEE B.TECH IN NS2 SIMULATION