Search

Your search keyword '"Burhan Ul Islam Khan"' showing total 44 results

Search Constraints

Start Over You searched for: Author "Burhan Ul Islam Khan" Remove constraint Author: "Burhan Ul Islam Khan"
44 results on '"Burhan Ul Islam Khan"'

Search Results

1. Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions

2. Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs

3. A Frictionless and Secure User Authentication in Web-Based Premium Applications

4. A Novel Multi-Agent and Multilayered Game Formulation for Intrusion Detection in Internet of Things (IoT)

5. A Game Theory-Based Strategic Approach to Ensure Reliable Data Transmission With Optimized Network Operations in Futuristic Mobile Adhoc Networks

6. SGM: Strategic Game Model for Resisting Node Misbehaviour in IoT-Cloud Ecosystem

7. A Holistic Architecture for a Sales Enablement Sensing-as-a-Service Model in the IoT Environment

13. EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES

14. EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY

15. The Internet of Things Vision: A Comprehensive Review of Architecture, Enabling Technologies, Adoption Challenges, Research Open Issues and Contemporary Applications

16. A Novel Multi-Agent and Multilayered Game Formulation for Intrusion Detection in Internet of Things (IoT)

17. A Game Theory-Based Strategic Approach to Ensure Reliable Data Transmission With Optimized Network Operations in Futuristic Mobile Adhoc Networks

19. Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT

20. A Comprehensive Insight into Game Theory in relevance to Cyber Security

21. Secure Annihilation of Out-of-Band Authorization for Online Transactions

22. Snort-based Smart and Swift Intrusion Detection System

23. Adoption of Cloud Computing in Higher Learning Institutions: A Systematic Review

24. A Survey on E-Payment Systems: Elements, Adoption, Architecture, Challenges and Security Concepts

25. Bayesian Signaling Game Based Efficient Security Model for MANETs

26. An Adaptive and Viable Face Identification for Android Mobile Devices

27. Internet of Things—The Concept, Inherent Security Challenges and Recommended Solutions

28. Critical Challenges in Access Management Schemes for Smartphones: An Appraisal

29. Radio Access Technology (RAT) Selection Mechanism using TOPSIS Method in Heterogeneous Wireless Networks (HWN)

30. Offline OTP Based Solution for Secure Internet Banking Access

31. Scrutinising internet banking security solutions

32. Securely Eradicating Cellular Dependency for E-Banking Applications

33. Trust and Resource Oriented Communication Scheme in Mobile Ad Hoc Networks

34. A Computationally Efficient P-LRU based Optimal Cache Heap Object Replacement Policy

35. A Compendious Study of Online Payment Systems: Past Developments, Present Impact, and Future Considerations

36. DFAM: A DISTRIBUTED FEEDBACK ANALYSIS MECHANISM FOR KNOWLEDGE BASED EDUCATIONAL BIG DATA

37. A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem

38. An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches

39. A study on performance evaluation of conventional cache replacement algorithms: A review

40. Efficient cache replacement policy for minimising error rate in L2-STT-MRAM caches

41. RAED: Response analysis of educational data for leveraging knowledge dissemination system

42. SSM: Secure-Split-Merge data distribution in cloud infrastructure

43. Contemplation of Effective Security Measures in Access Management from Adoptability Perspective

44. Securing electronic transactions via payment gateways - a systematic review

Catalog

Books, media, physical & digital resources