Войти
Регистрация
Научные статьи
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Прикладные науки. Медицина. Технология
Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68
Научные статьи
В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Analysis of CRT-based watermarking technique for authentication of multimedia content
Türker Tuncer
Investigating and analyzing bitcoin blockchain protocol using wireshark
Auqib Hamid Lone,
Roohie Naaz Mir
A state-of-the-art survey of coverless text information hiding
Shahbaz Ali
Performance evaluation of AODV, DSDV, OLSR routing protocols using NS-3 simulator
Radha Raman Chandan,
Bindeshwar Singh Kushwaha,
Pramod Kumar Mishra
Through the diversity of bandwidth-related metrics, estimation techniques and tools: an overview
Fatih Abut
Internet of things for the prevention of black hole using fingerprint authentication and genetic algorithm optimization
Pooja Chandel,
Rakesh Kumar
Parallel prefix sum algorithm on optoelectronic biswapped network hyper hexa-cell
Ashish Gupta,
Bikash Kanti Sarkar
Development and implementation of vehicle movement notification and location using GSM, GPS and web based information system
Garba Suleiman,
Abdulraheem Ojo Umar,
Salako Emmanuel Adekunle
A multi QoS genetic-based adaptive routing in wireless mesh networks with pareto solutions
Ibraheem Kasim Ibraheem,
Alyaa Abdul-Hussain Al-Hussainy
Using progressive success probabilities for sound-pruned enumerations in BKZ algorithm
Gholam Reza Moghissi,
Ali Payandeh
An efficient indexing technique for AES lookup table to prevent side-channel cache timing attack
Refazul Islam Refat,
Euna Islam,
Md. Mosaddek Khan
Role of scripting language on Unix operating system for risk assessment
Padma Lochan Pradhan
Verification of web content integrity: detection and recovery security approach using colored petri nets
Sherin Hijazi,
Amjad Hudaib
Reliability evaluation and analysis of interconnection network using edge-disjoint minimal path method
Ranjan Kumar Dash,
Deepak Kumar Panda
Evaluation of different routing protocols for mobile ad-hoc networks in scenarios with high-speed mobility
Antonio Russoniello,
Eric Gamess
Block chain: cryptographic method in fourth industrial revolution
Raihana Syahirah Abdullah,
Faizal M.A.
QoS oriented cross-synch routing protocol for event driven, mission-critical communication over MANET: Q-CSRPM
Shashi Raj K.,
Siddesh G. K.
Novel secured biometric system procuring miniaturized prorogation
Sherin Zafar,
Ayesha Hena Afzal,
M. Afshar Alam
Cuckoo optimisation based intrusion detection system for cloud computing
D. Asir Antony Gnana Singh,
R. Priyadharshini,
E. Jebamalar Leavline
Acknowledgement based localization method (ALM) to improve the positioning in vehicular ad hoc networks
M. Chitra,
S. Siva Sathya
An email modelling approach for neural network spam filtering to improve score-based anti-spam systems
Yahya Alamlahi,
Abdulrahman Muthana
An integrated perceptron kernel classifier for intrusion detection system
Ruby Sharma,
Sandeep Chaurasia
Security risk analysis and management in mobile wallet transaction: a case study of pagatech nigeria limited
Musbau D. Abdulrahaman,
John K. Alhassan,
Joseph A. Ojeniyi,
Shafii M. Abdulhamid
A novel infrared (IR) based sensor system for human presence detection in targeted locations
Kakelli Anil Kumar,
Omkar Dhadge
performance analysis of underwater acoustic communication using IDMA-OFDM-MIMO with reed Solomon and turbo code
Rajashri Khanai,
Salma S. Shahapur,
Dattaprasad Torse
Underwater sensor networks: an efficient node deployment technique for enhancing coverage and connectivity: END-ECC
Kamal Kumar Gola,
Bhumika Gupta
A comparative study of recent steganography techniques for multiple image formats
Arshiya Sajid Ansari,
Mohammad Sajid Mohammadi,
Mohammad Tanvir Parvez
Understanding the evolution of ransomware: paradigm shifts in attack structures
Aaron Zimba,
Mumbi Chishimba
Analyzing progressive-BKZ lattice reduction algorithm
Md. Mokammel Haque,
Mohammad Obaidur Rahman
A chaotic cryptosystem using conjugate transcendental fractal function
Shafali Agarwal
Performance analysis of convolution code with variable constraint length in shallow underwater acoustic communication
Krishnamoorthy Narasu Raghavan,
Suriyakala C. D.,
Ramadevi Rathinasabapathy,
Marshiana Devaerakkam,
Sujatha Kumaran
An efficient steganography technique for images using chaotic bitstream
Hidayet Ogras
An efficient image block encryption for key generation using non-uniform cellular automata
G. Kumaresan,
N. P. Gopalan,
T. Vetriselvi
Inculcating global optimization in ZRP through newfangled firefly algorithm
Neha Sharma,
Usha Batra,
Sherin Zafar
Deep learning approach on network intrusion detection system using NSL-KDD dataset
Sandeep Gurung,
Mirnal Kanti Ghose,
Aroj Subedi
Comprehensive study of data aggregation models, challenges and security issues in wireless sensor networks
Veena I. Puranikmath,
Sunil S. Harakannanavar,
Satyendra Kumar,
Dattaprasad Torse
IoT: application protocols and security
Derek Johnson,
Mohammed Ketel
A feed-forward and pattern recognition ANN model for network intrusion detection
Ahmed Iqbal,
Shabib Aftab
A novel scheme for isolation of distributed denial of service attack in VANETs
Palak Shandil,
Rakesh Kumar
Construction for searchable encryption with strong security guarantees
István Vajda
← Предыдущая
Следующая страница →
1
|
...
|
94
|
95
|
96
|
97
|
98
|
99
|
100
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.