374 results on '"Patel, Ahmed"'
Search Results
2. Evaluation of Confidentiality and Data Integrity Based on User Session for IoT Environment
3. A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active Server
4. Document Selection in a Distributed Search Engine Architecture
5. Optimizing Attribute Reduction in Rough Set Theory using Re-heat Simulated Annealing for Classification and Data Mining.
6. Multiple users replica selection in data grids for fair user satisfaction: A hybrid approach
7. Customer relationship management systems (CRMS) in the healthcare environment: A systematic literature review
8. An extended software defined optical networks slicing architecture
9. A review of security assessment methodologies in industrial control systems
10. Evaluation of Confidentiality and Data Integrity Based on User Session for IoT Environment
11. A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active Server
12. Using Tree Automata and Regular Expressions to Manipulate Hierarchically Structured Data
13. The Design & Evaluation of an Information Visualization to Improve the Efficiency & Understanding of Patient Health State
14. Situation Awareness Failure Factors: Characteristics of Barriers to Situation Awareness in Primary Care & Implications
15. A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems
16. A systematic technical survey of DTN and VDTN routing protocols
17. Empirical evaluation of the link and content-based focused Treasure-Crawler
18. A focused crawler combinatory link and content model based on T-Graph principles
19. VNDN-Fuzzy - A strategy to mitigate the forwarding interests broadcast storm problem in VNDN networks
20. Design and evaluation of a hybrid system for detection and prediction of faults in electrical transformers
21. A novel methodology towards a trusted environment in mashup web applications
22. Rapid lossless compression of short text messages
23. SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN)
24. Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing
25. Beyond ubiquitous computing: The Malaysian HoneyBee project for Innovative Digital Economy
26. A dominance based rough set classification system for fault diagnosis in electrical smart grid environments
27. Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing Approach
28. An intelligent collaborative Intrusion Detection and Prevention System for Smart Grid environments
29. An intrusion detection and prevention system in cloud computing: A systematic review
30. Comparison of New Simple Weighting Functions for Web Documents against Existing Methods
31. Web Document Indexing and Retrieval
32. An evaluation of a secure and trustworthy mobile agent‐based e‐marketplace system
33. Evaluation of cheating detection methods in academic writings
34. Design of secure and trustworthy mobile agent‐based e‐marketplace system
35. Comparative study and review of grid, cloud, utility computing and software as a service for use by libraries
36. Security on ATM Networks
37. Open Architecture for Distributed Search Systems
38. Building Topic-Specific Collections with Intelligent Agents
39. A survey of intrusion detection and prevention systems
40. A review and future research directions of secure and trustworthy mobile agent‐based e‐marketplace systems
41. An analysis of web proxy logs with query distribution pattern approach for search engines
42. Agent-Based Auction E-Marketplace with Value Added Services and Islamic Shariah Compliance
43. How audio-visual stimuli in automated asynchronous video interviews affect applicant reactions: social presence, fairness and organisational attractiveness
44. A partial equilibrium view on security and privacy
45. Using datagram based multimedia streams as a cover channel for hidden transmission
46. An attack detection system for secure computer systems - Design of the ADS
47. A model for the detection of the message stream delay attack
48. Analytical model based on green criteria for optical backbone network interconnection
49. Application of structured document parsing to focused web crawling
50. AGILE: WHERE VUCA AND AFFECTIVE FACTORS MEET
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.