Search

Your search keyword '"Humaira Arshad"' showing total 48 results

Search Constraints

Start Over You searched for: Author "Humaira Arshad" Remove constraint Author: "Humaira Arshad"
48 results on '"Humaira Arshad"'

Search Results

1. Enhancing Smishing Detection: A Deep Learning Approach for Improved Accuracy and Reduced False Positives

2. Robust Parameter Optimisation of Noise-Tolerant Clustering for DENCLUE Using Differential Evolution

3. Enhanced Parameter Estimation of DENsity CLUstEring (DENCLUE) Using Differential Evolution

4. Protection-Enhanced Watermarking Scheme Combined With Non-Linear Systems

5. Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks

6. Message Scheduling in Blockchain Based IoT Environment With Additional Fog Broker Layer

7. Feature Selection by Multiobjective Optimization: Application to Spam Detection System by Neural Networks and Grasshopper Optimization Algorithm

8. An Energy-Aware, Highly Available, and Fault-Tolerant Method for Reliable IoT Systems

9. The electrochemical reaction controlled optical response of cholestrol oxidase (COx) conjugated CdSe/ZnS quantum dots

10. EFFECTS OF DAILY ORAL IRON SUPPLEMENTATION ON HISTOMORPHOLOGY OF RAT PLACENTA

11. A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems

12. Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition

13. A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks

14. AMELIORATIVE EFFECT OF DILTIAZEM ON THE MONOSODIUM GLUTAMATE TREATED STROMA OF FALLOPIAN TUBE AND SERUM ESTROGEN LEVELS

15. A Comparison of Preventive Effects of Punica Granatum and Extract on Weight and Volume of Steroid Induced Mice Kidney

16. State-of-the-art in artificial neural network applications: A survey

17. Evaluation of Levonorgestrel Subdermal Implant as Long Term Reversible Contraceptive

19. A Review on the Security of the Internet of Things: Challenges and Solutions

20. An Energy-Aware, Highly Available, and Fault-Tolerant Method for Reliable IoT Systems

22. Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp

23. HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys

27. Carbon Quantum Dots

29. Introduction

30. Graphene Quantum Dots

32. A multilayered semantic framework for integrated forensic acquisition on social media

33. Evidence collection and forensics on social networks: Research challenges and directions

34. Comprehensive Review of Artificial Neural Network Applications to Pattern Recognition

35. A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems

36. Supplementary_Files – Supplemental material for HoneyDetails: A prototype for ensuring patient’s information privacy and thwarting electronic health record threats based on decoys

37. The internet of things security: A survey encompassing unexplored areas and new insights

39. Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication

40. A semi-automated forensic investigation model for online social networks

41. Formal knowledge model for online social network forensics

42. State-of-the-art in artificial neural network applications: A survey

43. Synthesis and characterization of Cr doped CdSe nanoparticles

44. Health morbidity and access to services by young adults with Down syndrome

45. TORTURE INJURIES

46. FIREARM WOUNDS

47. Evaluation of fasting and random plasma glucose for diagnosis of gestational diabetes

Catalog

Books, media, physical & digital resources