Linked e-resources

Details

Part I. Cyber intelligence
DTNMA: Identifying Routing Attacks in Delay-Tolerant Network
Security Aspects for Mutation Testing in Mobile Applications
Classification Framework for Fraud Detection Using Hidden Markov Model
Review on Security Issues in Healthcare Cyber-Physical Systems
Analysis of the Beaufort Cipher Expansion Technique and Its Usage in Providing Data Security in Cloud
Distribution of Internet Banking Credentials Using Visual Cryptography and Watermarking Techniques
Part II. Pattern recognition
Virtual Keyboard Using Image Processing and Computer Vision
Plus 9 other papers
Part III. Information retrieval
Plus 11 other papers
Part IV. Data science and data analytics
Plus 10 other papers
Part V. Advance computing
Plus 10 other papers.
Part VI. Computational intelligence
Plus 9 other papers.

Browse Subjects

Show more subjects...

Statistics

from
to
Export