RTT-Based Random Walk Approach to Detect Stepping-Stone Intrusion – NS2 FOR B.TECH
Physical access control: A case study in a military institution of the Brazil– NS2 FOR B.TECH
Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component– NS2 FOR B.TECH
Language-based security analysis of database applications– NS2 FOR B.TECH
Automatic and secured backup and restore technique in Android– NS2 FOR B.TECH
The Electronic Voting in the Presence of Rational Voters– NS2 FOR B.TECH
Criminal data mining: A case studyin Criminal Observatory Tapajós– NS2 FOR B.TECH
Distributed trust protocol for IaaS Cloud Computing– NS2 FOR B.TECH
Defending flooding attack in Delay Tolerant Networks– NS2 FOR B.TECH
Inside Attack Filtering for Robust Sensor Localization– NS2 FOR B.TECH
Spy: A QoS-Aware Anonymous Multi-Cloud Storage System Supporting DSSE– NS2 FOR B.TECH
Passing Go with DNA Sequencing: Delivering Messages in a Covert Transgenic Channel– NS2 FOR B.TECH
Multi-tier network secrecy in the ether– NS2 FOR B.TECH
A Scalable Feedback Mechanism for Distributed Nullforming With Phase-Only Adaptation– NS2 FOR B.TECH
Potential Cyberattacks on Automated Vehicles– NS2 FOR B.TECH
An approach to assess the optimality of refining RC4– NS2 FOR B.TECH
Interoperable job execution and data access through UNICORE and the Global Federated File System– NS2 FOR B.TECH
EM attack sensor: Concept, circuit, and design-automation methodology– NS2 FOR B.TECH
Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures– NS2 FOR B.TECH
Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers– NS2 FOR B.TECH
Analysis of a “/0” Stealth Scan From a Botnet– NS2 FOR B.TECH
Design of secured intra-prediction mode algorithm for data hiding with improved image quality– NS2 FOR B.TECH
Unveiling flat traffic on the Internet: An SSH attack case study– NS2 FOR B.TECH
Privacy-Aware Genome Mining: Server-Assisted Protocols for Private Set Intersection and Pattern Matching– NS2 FOR B.TECH
e-commerce cloud: Opportunities and challenges– NS2 FOR B.TECH