Search

Showing total 3 results
3 results

Search Results

1. Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning.

2. India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach.

3. An improved model based on the support vector machine and cuckoo algorithm for simulating reference evapotranspiration.