47 results on '"Shetty, Sachin"'
Search Results
2. Promize - Blockchain and Self Sovereign Identity Empowered Mobile ATM Platform
3. Realizing Cyber-Physical Systems Resilience Frameworks and Security Practices
4. Modeling Mission Impact of Cyber Attacks on Energy Delivery Systems
5. Cloud-Based Simulation Platform for Quantifying Cyber-Physical Systems Resilience
6. Lekana - Blockchain Based Archive Storage for Large-Scale Cloud Systems
7. Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework
8. Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System
9. Agent-Based Behavior Precursor Model of Insider IT Sabotage
10. Blockchain-Based Decentralized Accountability and Self-Sovereignty in Healthcare Systems
11. Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain
12. Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions
13. Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems
14. Realizing Cyber-Physical Systems Resilience Frameworks and Security Practices
15. Towards a Network-Aware VM Migration: Evaluating the Cost of VM Migration in Cloud Data Centers
16. Optimizing Network-Aware Resource Allocation in Cloud Data Centers
17. Moving Target Defense in Distributed Systems
18. Security-Aware Virtual Machine Placement in Cloud Data Center
19. Scalable Network Diversity Modeling For Assessing Threats in Cloud Networks
20. Cloud-Based Simulation Platform for Quantifying Cyber-Physical Systems Resilience
21. Lekana - Blockchain Based Archive Storage for Large-Scale Cloud Systems
22. Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance
23. Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance
24. Resource Allocation in Spectrum Underlay Cognitive Radio Networks
25. Resource Allocation for Cognitive Radio Enabled Vehicular Network Users
26. Cloud-Integrated Geolocation-Aware Dynamic Spectrum Access
27. An Overview of Cognitive Radio Networks
28. Resource Allocation in Spectrum Overlay Cognitive Radio Networks
29. A Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks in MANETs
30. Blockchain-Based Decentralized Accountability and Self-Sovereignty in Healthcare Systems
31. RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment
32. Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems
33. Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions
34. Transfer learning for detecting unknown network attacks
35. Moving Target Defense for Distributed Systems
36. Scalable Network Diversity Modeling For Assessing Threats in Cloud Networks
37. Optimizing Network-Aware Resource Allocation in Cloud Data Centers
38. Moving Target Defense in Distributed Systems
39. Security-Aware Virtual Machine Placement in Cloud Data Center
40. Towards a Network-Aware VM Migration: Evaluating the Cost of VM Migration in Cloud Data Centers
41. Resource Allocation for Cognitive Radio Enabled Vehicular Network Users
42. Dynamic Spectrum Access for Wireless Networks
43. An Overview of Cognitive Radio Networks
44. Resource Allocation in Spectrum Underlay Cognitive Radio Networks
45. Resource Allocation in Spectrum Overlay Cognitive Radio Networks
46. Cloud-Integrated Geolocation-Aware Dynamic Spectrum Access
47. RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.