343 results on '"Iqbal, Waseem"'
Search Results
2. Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices
3. Reliability through an optimal SDS controller’s placement in a SDDC and smart city
4. Fall Detection in the Elderly using Different Machine Learning Algorithms with Optimal Window Size
5. S2H-securing smart homes: A blockchain-based preservation approach
6. PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems
7. Guiding Deep Learning with Expert Knowledge for Dense Stereo Matching
8. A Coronavirus Optimization (CVO) algorithm to harvest maximum power from PV systems under partial and complex partial shading conditions
9. Elevating e-health excellence with IOTA distributed ledger technology: Sustaining data integrity in next-gen fog-driven systems
10. Detection of non-trivial preservable quotient spaces in S-Box(es)
11. Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) Against Differential Cryptanalysis
12. The reality of backdoored S-Boxes—An eye opener
13. Privacy and security federated reference architecture for Internet of Things
14. State, synthesis, perspective applications, and challenges of Graphdiyne and its analogues: A review of recent research
15. Identity-based attack detection using received signal strength in MIMO systems
16. From trust to truth: Advancements in mitigating the Blockchain Oracle problem
17. A game model design using test bed for Malware analysis training
18. Robust nonlinear observer-based controller design for one-sided Lipschitz switched systems with time-varying delays
19. A novel trust management model for edge computing
20. Molecular engineering optimized carbon nitride photocatalyst for CO2 reduction to solar fuels
21. Nanostructured materials based on g-C3N4 for enhanced photocatalytic activity and potentials application: A review
22. A social qualitative trust framework for Fog computing
23. An improved hybrid model for cardiovascular disease detection using machine learning in IoT.
24. Forensic analysis of image deletion applications
25. Carving of the OOXML document from volatile memory using unsupervised learning techniques
26. Ni3S2@Ni5P4 nanosheets as highly productive catalyst for electrocatalytic oxygen evolution
27. Smart Secure USB SSU-256
28. Detection and Prevention of a Malicious Activity in Industrial Federated Cloud Computing Paradigm
29. Internet of Things Based Smart Community Design and Planning Using Hadoop-Based Big Data Analytics
30. Background subtraction in videos using LRMF and CWM algorithm
31. Climate-Driven Changes in the Projected Annual and Seasonal Precipitation over the Northern Highlands of Pakistan.
32. A Recurrent Neural Network for Multimodal Anomaly Detection by Using Spatio-Temporal Audio-Visual Data.
33. ARP Overhead Reduction Framework for Software Defined Data Centers
34. Effect of humic acid enriched cotton waste on growth, nutritional and chemical composition of oyster mushrooms (Pluerotus ostreatus and Lentinus sajor-caju)
35. Advanced Persistent Threat (APT) and intrusion detection evaluation dataset for linux systems 2024
36. Determinants of Life Satisfaction: Role of Living Arrangements, Social Status, and Perceived Satisfaction in Women
37. Forensic Analysis of LinkedIn’s Desktop Application on Windows 10 OS
38. Analysis of Windows OS’s Fragmented File Carving Techniques: A Systematic Literature Review
39. AndroKit: A toolkit for forensics analysis of web browsers on android platform
40. Weber Law Based Approach for Multi-Class Image Forgery Detection
41. CATcAFSMs: Context‐based adaptive trust calculation for attack detection in fog computing based smart medical systems.
42. Efficient Nickel and Cobalt Recovery by Metal–Organic Framework-Based Mixed Matrix Membranes (MMM-MOFs).
43. "MACROSCOPIC AND MICROSCOPIC ALTERATIONS OF LIVER IN MALE ALBINO RATS INDUCED BY NICOTINE ADMINISTRATION; AN EXPERIMENTAL STUDY".
44. Techniques of Explainable Artificial Intelligence and Machine Learning in Digital Mental Health Intervention.
45. A Framework to Determine Applications’ Authenticity
46. Smart Secure USB SSU-256
47. Detection and Prevention of a Malicious Activity in Industrial Federated Cloud Computing Paradigm
48. Correlation power analysis of modes of encryption in AES and its countermeasures
49. An improved hybrid model for cardiovascular disease detection using machine learning in IoT
50. Automated Conflict Detection in Software Functional Requirements using Rule-Based Natural Language Processing
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.