44 results on '"Kiah, Miss Laiha Mat"'
Search Results
2. Machine learning-based offline signature verification systems: A systematic review
3. RETRACTED ARTICLE: A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET
4. Compliance with bring your own device security policies in organizations: A systematic literature review
5. Improved temporal IoT device identification using robust statistical features.
6. Analysis of Terahertz (THz) Frequency Propagation and Link Design for Federated Learning in 6G Wireless Systems
7. Wireless backhaul network’s capacity optimization using time series forecasting approach
8. Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients
9. Retraction Note to: Diagnosing breast cancer with an improved artificial immune recognition system
10. Sponge-based Parallel Authenticated Encryption with Variable Tag length and Side-Channel Protection
11. Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT
12. Code-Switching in Automatic Speech Recognition: The Issues and Future Directions
13. Calculation of optimal induction heater capacitance based on the smart bacterial foraging algorithm
14. A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier
15. Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
16. Retraction Note to: A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET
17. Rules of Smart IoT Networks within Smart Cities towards Blockchain Standardization
18. Driver Behavior Profiling and Recognition Using Deep-Learning Methods: In Accordance with Traffic Regulations and Experts Guidelines
19. Parallel Sponge-based Authenticated Encryption with Side-Channel Protection and Adversary-Invisible Nonces
20. Investigating the Effect of Social and Cultural Factors on Drivers in Malaysia: A Naturalistic Driving Study
21. Modulation transfer function estimation of optical lens system by adaptive neuro-fuzzy methodology
22. Privacy-preserving Scheme using Secure Group Communication for M-healthcare Information Systems
23. An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks
24. Blockchain as a Middleware for Iot Sensing and Authentication Within Smart Cities: A Systematic Literature Review
25. Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey
26. RETRACTED ARTICLE: A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET
27. Wireless backhaul network’s capacity optimization using time series forecasting approach
28. Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things
29. A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET.
30. Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients
31. Retraction notice to Wind turbine power coefficient estimation by soft computing methodologies: comparative study [ECM (2014) 520 - 526]
32. Service delivery models of cloud computing: security issues and open challenges
33. Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network
34. Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
35. Tuberculosis Disease Diagnosis Using Artificial Immune Recognition System
36. Modulation Transfer Function Estimation of Optical Lens System by Adaptive Neuro-Fuzzy Methodology
37. RETRACTED: Kinetostatic Analysis of Passively Adaptive Robotic Finger with Distributed Compliance
38. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique
39. A more secure and scalable routing protocol for mobile ad hoc networks
40. An Implementation of Secure Group Communication in a Wireless Environment
41. A Scalable and Secure Position-Based Routing Protocol for MANETs
42. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments
43. A more secure and scalable routing protocol for mobile ad hoc networks.
44. A SCALABLE AND SECURE POSITION-BASED ROUTING PROTOCOL FOR AD-HOC NETWORKS.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.