Search

Your search keyword '"Laxmi, Vijay"' showing total 101 results

Search Constraints

Start Over You searched for: Author "Laxmi, Vijay" Remove constraint Author: "Laxmi, Vijay" Publication Type eBooks Remove constraint Publication Type: eBooks
101 results on '"Laxmi, Vijay"'

Search Results

1. Honeypot-Based Data Collection for Dark Web Investigations Using the Tor Network

2. Polarization-Independent Broadband Metasurface Absorber for Near Infrared Spectrum

3. Ultra-Broadband Absorber Based on Metasurfaces in the Infrared Regime

4. Supervısed Learnıng Algorıthm: A Survey

5. A Performance Discussion of Web Crawler Using Some Advanced Factors

6. Unsupervised Person Re-ID in Surveillance Feed Using Re-ranking

7. APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android

8. DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks

9. Bloom Filter Based Privacy Preserving Deduplication System

11. MAPPER: Mapping Application Description to Permissions

12. Performance Analysis of Various Congestion Control Schemes in VANET

13. Privacy Preserving Data Offloading Based on Transformation

14. Unraveling Reflection Induced Sensitive Leaks in Android Apps

15. Performance-Enhanced -LBDR for 2D Mesh Network-on-Chip

16. ‘X’ Shape Slot-Based Microstrip Fractal Antenna for IEEE 802.11 WLAN

17. Secure Random Encryption for Deduplicated Storage

20. Detection of SQLite Database Vulnerabilities in Android Apps

21. Fault Aware Dynamic Adaptive Routing Using LBDR

22. Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps

23. Environment–Reactive Malware Behavior: Detection and Categorization

25. Privacy Leakage Attacks in Browsers by Colluding Extensions

28. Misbehavior Detection Based on Ensemble Learning in VANET

29. PEAL—Packed Executable AnaLysis

34. A Novel Attack Model Simulation in OLSR

37. Permuted Image DCT Watermarking

39. ERA: An Efficient Routing Algorithm for Power, Throughput and Latency in Network-on-Chips

40. Structural Fault Modelling in Nano Devices

41. Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip

42. Fuzzy String Matching Algorithm for Spam Detection in Twitter

43. Threshold Ring Signature with Message Block Sharing

44. Multiparty Evaluation of Finite State Machine

45. An Enhanced Privacy-Preserving Recommender System

46. Testing Program Crash Based on Search Based Testing and Exception Injection

47. An Approach to Meta-Alert Generation for Anomalous TCP Traffic

48. EvadePDF: Towards Evading Machine Learning Based PDF Malware Classifiers

49. Malware Signature Generation Using Locality Sensitive Hashing

50. Bad Signature Identification in a Batch Using Error Detection Codes

Catalog

Books, media, physical & digital resources