Search

Your search keyword '"Burhan Ul Islam Khan"' showing total 21 results

Search Constraints

Start Over You searched for: Author "Burhan Ul Islam Khan" Remove constraint Author: "Burhan Ul Islam Khan" Topic business Remove constraint Topic: business
21 results on '"Burhan Ul Islam Khan"'

Search Results

1. Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs

2. A Frictionless and Secure User Authentication in Web-Based Premium Applications

3. A Novel Multi-Agent and Multilayered Game Formulation for Intrusion Detection in Internet of Things (IoT)

4. A Game Theory-Based Strategic Approach to Ensure Reliable Data Transmission With Optimized Network Operations in Futuristic Mobile Adhoc Networks

5. Secure Annihilation of Out-of-Band Authorization for Online Transactions

6. Adoption of Cloud Computing in Higher Learning Institutions: A Systematic Review

7. A Survey on E-Payment Systems: Elements, Adoption, Architecture, Challenges and Security Concepts

8. Bayesian Signaling Game Based Efficient Security Model for MANETs

9. Internet of Things—The Concept, Inherent Security Challenges and Recommended Solutions

10. Critical Challenges in Access Management Schemes for Smartphones: An Appraisal

11. Offline OTP Based Solution for Secure Internet Banking Access

12. Scrutinising internet banking security solutions

13. Securely Eradicating Cellular Dependency for E-Banking Applications

14. Trust and Resource Oriented Communication Scheme in Mobile Ad Hoc Networks

15. A Compendious Study of Online Payment Systems: Past Developments, Present Impact, and Future Considerations

16. DFAM: A DISTRIBUTED FEEDBACK ANALYSIS MECHANISM FOR KNOWLEDGE BASED EDUCATIONAL BIG DATA

17. A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem

18. Efficient cache replacement policy for minimising error rate in L2-STT-MRAM caches

19. RAED: Response analysis of educational data for leveraging knowledge dissemination system

20. SSM: Secure-Split-Merge data distribution in cloud infrastructure

21. Contemplation of Effective Security Measures in Access Management from Adoptability Perspective

Catalog

Books, media, physical & digital resources