Search

Your search keyword '"Burhan Ul Islam Khan"' showing total 34 results

Search Constraints

Start Over You searched for: Author "Burhan Ul Islam Khan" Remove constraint Author: "Burhan Ul Islam Khan" Language undetermined Remove constraint Language: undetermined
34 results on '"Burhan Ul Islam Khan"'

Search Results

1. EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES

2. EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY

3. The Internet of Things Vision: A Comprehensive Review of Architecture, Enabling Technologies, Adoption Challenges, Research Open Issues and Contemporary Applications

4. Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs

5. A Frictionless and Secure User Authentication in Web-Based Premium Applications

6. A Game Theory-Based Strategic Approach to Ensure Reliable Data Transmission With Optimized Network Operations in Futuristic Mobile Adhoc Networks

8. Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT

9. A Holistic Architecture for a Sales Enablement Sensing-as-a-Service Model in the IoT Environment

10. A Comprehensive Insight into Game Theory in relevance to Cyber Security

11. Secure Annihilation of Out-of-Band Authorization for Online Transactions

12. Snort-based Smart and Swift Intrusion Detection System

13. Adoption of Cloud Computing in Higher Learning Institutions: A Systematic Review

14. A Survey on E-Payment Systems: Elements, Adoption, Architecture, Challenges and Security Concepts

15. Bayesian Signaling Game Based Efficient Security Model for MANETs

16. An Adaptive and Viable Face Identification for Android Mobile Devices

17. Internet of Things—The Concept, Inherent Security Challenges and Recommended Solutions

18. Critical Challenges in Access Management Schemes for Smartphones: An Appraisal

19. Radio Access Technology (RAT) Selection Mechanism using TOPSIS Method in Heterogeneous Wireless Networks (HWN)

20. Offline OTP Based Solution for Secure Internet Banking Access

21. Scrutinising internet banking security solutions

22. Securely Eradicating Cellular Dependency for E-Banking Applications

23. Trust and Resource Oriented Communication Scheme in Mobile Ad Hoc Networks

24. A Computationally Efficient P-LRU based Optimal Cache Heap Object Replacement Policy

25. A Compendious Study of Online Payment Systems: Past Developments, Present Impact, and Future Considerations

26. DFAM: A DISTRIBUTED FEEDBACK ANALYSIS MECHANISM FOR KNOWLEDGE BASED EDUCATIONAL BIG DATA

27. A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem

28. An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches

29. A study on performance evaluation of conventional cache replacement algorithms: A review

30. Efficient cache replacement policy for minimising error rate in L2-STT-MRAM caches

31. RAED: Response analysis of educational data for leveraging knowledge dissemination system

32. SSM: Secure-Split-Merge data distribution in cloud infrastructure

33. Contemplation of Effective Security Measures in Access Management from Adoptability Perspective

34. Securing electronic transactions via payment gateways - a systematic review

Catalog

Books, media, physical & digital resources