Search

Your search keyword '"Shetty, Sachin"' showing total 52 results

Search Constraints

Start Over You searched for: Author "Shetty, Sachin" Remove constraint Author: "Shetty, Sachin" Database Supplemental Index Remove constraint Database: Supplemental Index
52 results on '"Shetty, Sachin"'

Search Results

1. Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture.

2. Understanding governance and control challenges of blockchain technology in healthcare and energy sectors: a historical perspective

3. Biocybersecurity and applications of predictive physiological modelling

4. Anticancer therapeutic potential of multimodal targeting agent- “phosphorylated galactosylated chitosan coated magnetic nanoparticles” against N-nitrosodiethylamine-induced hepatocellular carcinoma

5. An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things

6. Blockchain-Based Efficient Access Control With Handover Policy in IoV-Enabled Intelligent Transportation System

7. Multi-Timescale Actor-Critic Learning for Computing Resource Management With Semi-Markov Renewal Process Mobility

8. Lemierre’s syndrome variant with inferior vena cava and right common iliac vein thrombosis secondary to emphysematous pyelonephritis.

9. IMMEDIATE VITRECTOMY vs TAP AND INJECT IN EYES WITH ACUTE POSTCATARACT ENDOPHTHALMITIS AND VISUAL ACUITY ≥HM

10. CT severity score: an imaging biomarker to estimate the severity of COVID-19 pneumonia in vaccinated and non-vaccinated population.

11. BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare

12. Early and intensive motor training to enhance neurological recovery in people with spinal cord injury: trial protocol

13. Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications

14. Robust Certificateless Authentication Protocol for the SAE J1939 Commercial Vehicles Bus

16. Unusual case of skull base adenoid cystic carcinoma presenting as skull base osteomyelitis: case report.

18. A Unified Health Information System Framework for Connecting Data, People, Devices, and Systems

19. Casper: a blockchain-based system for efficient and secure customer credential verification

20. Leaf and skin disease detection using image processing

21. Lightweight, geo-scalable deterministic blockchain design for 5G networks sliced applications with hierarchical CFT/BFT consensus groups, IPFS and novel hardware design

22. Australian arm of the International Spinal Cord Injury (Aus-InSCI) Community Survey: 2. Understanding the lived experience in people with spinal cord injury

24. Spectrum of atypical pulmonary manifestations of COVID-19 on computed tomography.

25. Optical Trapping and Micro-Raman Spectroscopy of Functional Red Blood Cells Using Vortex Beam for Cell Membrane Studies

26. Age of correlated information-optimal dynamic policy scheduling for sustainable Green IoT devices: A multi-agent deep reinforcement learning approach

27. A review of IoT security and privacy using decentralized blockchain techniques.

28. Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers

30. Data Provenance in the Cloud: A Blockchain-Based Approach

31. A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain

34. SCREDENT: Scalable Real-time Anomalies Detection and Notification of Targeted Malware in Mobile Devices.

36. Security of Internet of Things (IoT) using federated learning and deep learning - Recent advancements, issues and prospects

37. Stackelberg-Game-Based Dynamic Spectrum Access in Heterogeneous Wireless Systems

38. Effects of continuation, frequency, and type of cannabis use on relapse in the first 2 years after onset of psychosis: an observational study

39. Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput.

40. Game Theoretic Cloud-Assisted Opportunistic Spectrum Access in Cognitive Radio Networks

41. Artificial intelligence-aided privacy preserving trustworthy computation and communication in 5G-based IoT networks.

43. Enhanced learning classifier to locate data in cloud data centres

44. Auditing and analysis of network traffic in cloud environment

45. Geolocation-aware resource management in cloud computing-based cognitive radio networks

46. Waiting probability analysis for opportunistic spectrum access

47. Development of an integrated network visualisation and graph analysis tool for biological networks

48. Modeling decision uncertainties in total situation awareness using cloud computation theory

49. Using Hidden Markov Model to detect rogue access points

50. Simulation for cybersecurity: state of the art and future directions

Catalog

Books, media, physical & digital resources