1 |
Andhra University, Visakhapattanam |
Encoding Approach for Intrusion Detection Using PCA and KNN Classifier |
|
2 |
Indian Institute of Technology, Kharagpur |
Memristor Based Arbiter PUF: Cryptanalysis Threat and Its Mitigation |
|
3 |
Maulana Azad National Institute of Technology, Bhopal |
Security Attacks on Wireless Networks and their Detection Techniques. |
|
4 |
Maulana Azad National Institute of Technology, Bhopal |
Differential Privacy: its technological prescriptive using big data" |
|
5 |
College of Engineering, Guindy, Anna University |
An Approach to URL Filtering in SDN |
|
6 |
College of Engineering, Guindy, Anna University |
Mitigation of DoS in SDN using Path Randomization |
|
7 |
Centre for Development of Advanced Computing, Bangalore |
An Efficient Solution for Remote User Authentication Using DNA Crypto and Steganography |
|
8 |
Delhi Technological University, Delhi |
Securing Data at rest using Hill Cipher and XOR based operations |
|
9 |
College of Engineering, Guindy, Anna University |
Secure Image Deduplication using SPIHT Compression |
|
10 |
National Institute of Technology Hamirpur |
Identification of Disconnected Components in WSN for Secure Big Data Gathering |
|
11 |
Maulana Azad National Institute of Technology, Bhopal |
Analysis of NoSQL Database Vulnerabilities |
|
12 |
Indira Gandhi Delhi Technical University for Women, Delhi |
Empirical Validation of OO metrics and machine learning algorithms for software change proneness prediction |
|
|