104 results on '"Khan, Farrukh Aslam"'
Search Results
2. Demand response with pricing schemes and consumers mode constraints for energy balancing in smart grids
3. A novel intelligent optimal control methodology for energy balancing of microgrids with renewable energy and storage batteries
4. Optimum sizing of stand-alone microgrids: Wind turbine, solar photovoltaic, and energy storage system
5. State of charge estimation and error analysis of lithium-ion batteries for electric vehicles using Kalman filter and deep neural network
6. A novel routing protocol for underwater wireless sensor networks based on shifted energy efficiency and priority
7. Real-time energy optimization and scheduling of buildings integrated with renewable microgrid
8. Internet of drones security: Taxonomies, open issues, and future directions
9. FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning.
10. A novel hybrid load forecasting framework with intelligent feature engineering and optimization algorithm in smart grid
11. Context-oriented trust computation model for industrial Internet of Things
12. Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis
13. TriDroid: a triage and classification framework for fast detection of mobile threats in android markets
14. Memory augmented hyper-heuristic framework to solve multi-disciplinary problems inspired by cognitive problem solving skills
15. Melanoma identification and classification model based on fine-tuned convolutional neural network.
16. Blockchain and Smart Healthcare Security: A Survey
17. A context-aware encryption protocol suite for edge computing-based IoT devices
18. Securing SCADA-based Critical Infrastructures: Challenges and Open Issues
19. A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks
20. A Comprehensive Survey on Security in Cloud Computing
21. Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework.
22. Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review
23. Reducing the effects of DoS attacks in software defined networks using parallel flow installation
24. A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection
25. Securing wireless sensor networks for improved performance in cloud-based environments
26. BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things.
27. Attributed multi-objective comprehensive learning particle swarm optimization for optimal security of networks
28. Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art
29. A framework to address inconstant user requirements in cloud SLAs management
30. Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization
31. A Broadcast-Based Key Agreement Scheme Using Set Reconciliation for Wireless Body Area Networks
32. Enhanced Machine-Learning Techniques for Medium-Term and Short-Term Electric-Load Forecasting in Smart Grids.
33. Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications
34. A Smart Sensors-Based Solar-Powered System to Monitor and Control Tube Well for Agriculture Applications.
35. A cluster-based key agreement scheme using keyed hashing for Body Area Networks
36. A novel intrusion detection framework for wireless sensor networks
37. Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT.
38. CoCEC: An Automatic Combinational Circuit Equivalence Checker Based on the Interactive Theorem Prover.
39. Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering.
40. DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks.
41. Formal Verification of Hardware Components in Critical Systems.
42. Performance Analysis of Location-Aware Grid-Based Hierarchical Routing Protocol for Mobile Ad Hoc Networks.
43. Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis.
44. Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android.
45. Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems.
46. Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms.
47. Network Intrusion Detection Using Diversity-Based Centroid Mechanism.
48. ECG Arrhythmia Classification Using Mahalanobis-Taguchi System in a Body Area Network Environment.
49. Network intrusion detection using hybrid binary PSO and random forests algorithm.
50. Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.