Linked e-resources

Details

Privacy and Security
Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection
Non-malleable Codes from Authenticated Encryption in Split-State Model
Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model
Deep Learning based Differential Classifier of PRIDE and RC5
A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack
Variants of Crypto-Jacking Attacks and their detection techniques
Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms
Modified Blowfish Encryption Algorithm for Wireless Body Area Network
EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation
Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users
Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security
Intrusion Detection Using Federated Learning
Advances in Machine Learning
A Comparative Analysis of Classification Algorithms used for predicting Parkinson's Disease
Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN
Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index
Detection of Android Ransomware using Machine Learning Approach
Cyber Security and Layering of Medical Data Using Machine Learning Algorithms
Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models
Cloud, IoT and Computing Technologies
Analysis and Comparison of Different Frontend Frameworks
Lightweight Capability-Based Access control for Internet of Things (IoT)
Securing IoT using blockchain
Vikas: A Multimodal framework to Aid in Effective Disaster Management
Discovery of Rare Itemsets using Hyper-Linked Data Structure: A Parallel Approach.

Browse Subjects

Show more subjects...

Statistics

from
to
Export