65 results on '"Shetty, Sachin"'
Search Results
2. Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection
3. A Blockchain-Empowered Federated Learning System and the Promising Use in Drug Discovery
4. Securing SDN-Enabled Smart Power Grids
5. Mitochondria-Targeted Antioxidants and Cancer
6. Leveraging Machine Learning in Financial Fraud Forensics in the Age of Cybersecurity
7. Connect - Blockchain and Self-Sovereign Identity Empowered Contact Tracing Platform
8. Promize - Blockchain and Self Sovereign Identity Empowered Mobile ATM Platform
9. Realizing Cyber-Physical Systems Resilience Frameworks and Security Practices
10. Mitochondria-Targeted Antioxidants and Cancer
11. SaaS - Microservices-Based Scalable Smart Contract Architecture
12. An SDN-IoT − Based Framework for Future Smart Cities
13. Cloud-Based Simulation Platform for Quantifying Cyber-Physical Systems Resilience
14. Modeling Mission Impact of Cyber Attacks on Energy Delivery Systems
15. A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain
16. Lekana - Blockchain Based Archive Storage for Large-Scale Cloud Systems
17. Towards Secure Software-Defined Networking Integrated Cyber-Physical Systems: Attacks and Countermeasures
18. Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System
19. Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework
20. Agent-Based Behavior Precursor Model of Insider IT Sabotage
21. Blockchain-Based Decentralized Accountability and Self-Sovereignty in Healthcare Systems
22. Special Pedestrian and Head Pose Detection for Autonomous Vehicles
23. Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems
24. Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions
25. Securing SDN-Enabled Smart Power Grids
26. Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain
27. Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance
28. Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance
29. Moving Target Defense for Distributed Systems
30. Scalable Network Diversity Modeling For Assessing Threats in Cloud Networks
31. Optimizing Network-Aware Resource Allocation in Cloud Data Centers
32. Moving Target Defense in Distributed Systems
33. Security-Aware Virtual Machine Placement in Cloud Data Center
34. A Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks in MANETs
35. Towards a Network-Aware VM Migration: Evaluating the Cost of VM Migration in Cloud Data Centers
36. Resource Allocation for Cognitive Radio Enabled Vehicular Network Users
37. Dynamic Spectrum Access for Wireless Networks
38. An Overview of Cognitive Radio Networks
39. Resource Allocation in Spectrum Underlay Cognitive Radio Networks
40. Resource Allocation in Spectrum Overlay Cognitive Radio Networks
41. Cloud-Integrated Geolocation-Aware Dynamic Spectrum Access
42. RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment
43. Cloud Computing Based Cognitive Radio Networking
44. Feature and Signal Enhancement for Robust Speaker Identification of G.729 Decoded Speech
45. Data Mining of Bayesian Network Structure Using a Semantic Genetic Algorithm-Based Approach
46. Data Mining of Bayesian Network Structure Using a Semantic Genetic Algorithm-Based Approach
47. Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput
48. Towards a Network-Aware VM Migration: Evaluating the Cost of VM Migration in Cloud Data Centers.
49. Moving Target Defense in Distributed Systems.
50. Optimizing Network-Aware Resource Allocation in Cloud Data Centers.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.