Search

Your search keyword '"ISLAM, RAFIQUL"' showing total 585 results

Search Constraints

Start Over You searched for: Author "ISLAM, RAFIQUL" Remove constraint Author: "ISLAM, RAFIQUL" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
585 results on '"ISLAM, RAFIQUL"'

Search Results

2. Bangla to English Translation Using Sequence to Sequence Learning Model Based Recurrent Neural Networks

3. Analysis of Malicious Intruder Threats to Data Integrity

9. Real-Time Detection of TOR Attacks from the Dark Web

10. An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight Cipher

12. Coping Strategies of People Displaced by Riverbank Erosion in the Lower Meghna Estuary

14. Web Sanitization from Malicious Code Injection Attacks

15. A Novel Algorithm to Protect Code Injection Attacks

16. Malware Analysis and Detection Using Data Mining and Machine Learning Classification

17. Development of Mobile Based In-Home Patient Monitoring System for the Management of Chronic Disease of Indigenous Communities in a Developing Country

18. A Framework of Longitudinal Study to Understand Determinants of Actual Use of the Portable Health Clinic System

21. A Survey of Big Data Security Solutions in Healthcare

22. Malware Detection for Healthcare Data Security

23. Privacy in Social Media

24. Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks

25. Fast and Robust Biometric Authentication Scheme Using Human Ear

26. Securing Healthcare Data Using Biometric Authentication

27. Security and Privacy Protection for eHealth Data

28. Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy

29. Biometric Authentication Using Facial Recognition

30. Detection of Human Faces Using Neural Networks

31. Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks

32. Human Surveillance System for Security Application

33. A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering

34. Intelligent Financial Fraud Detection Practices: An Investigation

35. Defence Against Code Injection Attacks

37. Social Engineering through Social Media: An Investigation on Enterprise Security

38. Applicability of Portable Health Clinic to Ageing Society

39. Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs

40. (k − n) Oblivious Transfer Using Fully Homomorphic Encryption System

42. A Comparative Study of Malware Family Classification

44. Providing Security of Real Time Data Intensive Applications on Grids Using Dynamic Scheduling

47. Logistics Mode Analysis Under the Background of Cross-Border Ecommerce Era

48. Discussion on Sharing Service System Design of Household Hardware Tools

49. Comparison on Performance of Multiuser Detector

50. Evolvable Hardware Design of Digital Circuits Based on Adaptive Genetic Algorithm

Catalog

Books, media, physical & digital resources