Comparative Analysis of Threat Detection Techniques in Drone Networks
Syed Golam Abid,
Muntezar Rabbani,
Arpita Sarker,
Tasfiq Ahmed Rafi,
Dip Nandi
Prioritization of Test Cases in Software Testing Using M2 H2 Optimization
Kodepogu Koteswara Rao,
M. Babu Rao,
Chaduvula Kavitha,
Gaddala Lalitha Kumari,
Yalamanchili Surekha
Criterion for Ranking Interval Alternatives in a Decision-Making Task
Yuri Romanenkov,
Vadym Mukhin,
Viktor Kosenko,
Daniil Revenko,
Olena Lobach,
Natalia Kosenko,
Alla Yakovleva
Quantum Computers’ threat on Current Cryptographic Measures and Possible Solutions
Tohfa Niraula,
Aditi Pokharel,
Ashmita Phuyal,
Pratistha Palikhel,
Manish Pokharel
Comparative Analysis of Macro-Femto Networks Interference Mitigation Techniques
Katfun Philemon Dawar,
Abraham U. Usman,
Bala Alhaji Salihu,
Michael David,
Supreme Ayewoh Okoh,
Adegbenga Ajiboye
Privacy Enhancing for Fog Computing based - IoT
Samaa Y. Tarabay,
Ibrahim Yasser,
Ahmed S. Samra,
Abeer T. Khalil
A Technique for PUE Detection and Isolation in Cognitive Radio Network
Samuel A. Adebo,
Elizabeth N. Onwuka,
Abraham U. Usman,
Supreme Ayewoh Okoh,
Okwudili Onyishi