RTT-Based Random Walk Approach to Detect Stepping-Stone Intrusion – NS2 FOR B.TECH |
Physical access control: A case study in a military institution of the Brazil– NS2 FOR B.TECH |
Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component– NS2 FOR B.TECH |
Language-based security analysis of database applications– NS2 FOR B.TECH |
Automatic and secured backup and restore technique in Android– NS2 FOR B.TECH |
The Electronic Voting in the Presence of Rational Voters– NS2 FOR B.TECH |
Criminal data mining: A case studyin Criminal Observatory Tapajós– NS2 FOR B.TECH |
Distributed trust protocol for IaaS Cloud Computing– NS2 FOR B.TECH |
Defending flooding attack in Delay Tolerant Networks– NS2 FOR B.TECH |
Inside Attack Filtering for Robust Sensor Localization– NS2 FOR B.TECH |
Spy: A QoS-Aware Anonymous Multi-Cloud Storage System Supporting DSSE– NS2 FOR B.TECH |
Passing Go with DNA Sequencing: Delivering Messages in a Covert Transgenic Channel– NS2 FOR B.TECH |
Multi-tier network secrecy in the ether– NS2 FOR B.TECH |
A Scalable Feedback Mechanism for Distributed Nullforming With Phase-Only Adaptation– NS2 FOR B.TECH |
Potential Cyberattacks on Automated Vehicles– NS2 FOR B.TECH |
An approach to assess the optimality of refining RC4– NS2 FOR B.TECH |
Interoperable job execution and data access through UNICORE and the Global Federated File System– NS2 FOR B.TECH |
EM attack sensor: Concept, circuit, and design-automation methodology– NS2 FOR B.TECH |
Novel Test-Mode-Only Scan Attack and Countermeasure for Compression-Based Scan Architectures– NS2 FOR B.TECH |
Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers– NS2 FOR B.TECH |
Analysis of a “/0” Stealth Scan From a Botnet– NS2 FOR B.TECH |
Design of secured intra-prediction mode algorithm for data hiding with improved image quality– NS2 FOR B.TECH |
Unveiling flat traffic on the Internet: An SSH attack case study– NS2 FOR B.TECH |
Privacy-Aware Genome Mining: Server-Assisted Protocols for Private Set Intersection and Pattern Matching– NS2 FOR B.TECH |
e-commerce cloud: Opportunities and challenges– NS2 FOR B.TECH |
2015 IEEE NS2 FOR B.TECH |