335 results on '"Iqbal, Waseem"'
Search Results
2. Lightweight secure authentication protocol for automatic dependent surveillance broadcast system
3. PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems
4. Guiding Deep Learning with Expert Knowledge for Dense Stereo Matching
5. Detection of non-trivial preservable quotient spaces in S-Box(es)
6. Fall Detection in the Elderly using Different Machine Learning Algorithms with Optimal Window Size
7. A Coronavirus Optimization (CVO) algorithm to harvest maximum power from PV systems under partial and complex partial shading conditions
8. The reality of backdoored S-Boxes—An eye opener
9. Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) Against Differential Cryptanalysis
10. Privacy and security federated reference architecture for Internet of Things
11. State, synthesis, perspective applications, and challenges of Graphdiyne and its analogues: A review of recent research
12. Identity-based attack detection using received signal strength in MIMO systems
13. From trust to truth: Advancements in mitigating the Blockchain Oracle problem
14. A game model design using test bed for Malware analysis training
15. Robust nonlinear observer-based controller design for one-sided Lipschitz switched systems with time-varying delays
16. A novel trust management model for edge computing
17. Advanced Persistent Threat (APT) and intrusion detection evaluation dataset for linux systems 2024
18. Forensic analysis of image deletion applications
19. Molecular engineering optimized carbon nitride photocatalyst for CO2 reduction to solar fuels
20. Nanostructured materials based on g-C3N4 for enhanced photocatalytic activity and potentials application: A review
21. A social qualitative trust framework for Fog computing
22. State of the art advancement in rational design of g-C3N4 photocatalyst for efficient solar fuel transformation, environmental decontamination and future perspectives
23. Carving of the OOXML document from volatile memory using unsupervised learning techniques
24. CATcAFSMs: Context‐based adaptive trust calculation for attack detection in fog computing based smart medical systems.
25. Efficient Nickel and Cobalt Recovery by Metal–Organic Framework-Based Mixed Matrix Membranes (MMM-MOFs).
26. Smart Secure USB SSU-256
27. Detection and Prevention of a Malicious Activity in Industrial Federated Cloud Computing Paradigm
28. Ni3S2@Ni5P4 nanosheets as highly productive catalyst for electrocatalytic oxygen evolution
29. Internet of Things Based Smart Community Design and Planning Using Hadoop-Based Big Data Analytics
30. Background subtraction in videos using LRMF and CWM algorithm
31. ARP Overhead Reduction Framework for Software Defined Data Centers
32. Effect of humic acid enriched cotton waste on growth, nutritional and chemical composition of oyster mushrooms (Pluerotus ostreatus and Lentinus sajor-caju)
33. "MACROSCOPIC AND MICROSCOPIC ALTERATIONS OF LIVER IN MALE ALBINO RATS INDUCED BY NICOTINE ADMINISTRATION; AN EXPERIMENTAL STUDY".
34. Forensic Analysis of LinkedIn’s Desktop Application on Windows 10 OS
35. Analysis of Windows OS’s Fragmented File Carving Techniques: A Systematic Literature Review
36. Weber Law Based Approach for Multi-Class Image Forgery Detection
37. An improved hybrid model for cardiovascular disease detection using machine learning in IoT
38. Determinants of Life Satisfaction: Role of Living Arrangements, Social Status, and Perceived Satisfaction in Women
39. Smart Secure USB SSU-256
40. Forensic Analysis of Tor Browser: A Case Study for Privacy and Anonymity on the Web
41. A Framework to Determine Applications’ Authenticity
42. Automated Conflict Detection in Software Functional Requirements using Rule-Based Natural Language Processing
43. An Improved Hybrid Model for Cardiovascular Disease Detection Using Machine Learning in IoT
44. Demographical Based Sentiment Analysis for Detection of Hate Speech Tweets for Low Resource Language
45. BSLPSDN: Base station location privacy via software‐defined networking (SDN) in wireless sensor networks
46. Detection and Prevention of a Malicious Activity in Industrial Federated Cloud Computing Paradigm
47. Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art
48. Techno economic analysis of a wind-photovoltaic-biomass hybrid renewable energy system for rural electrification: A case study of Kallar Kahar
49. Optical Developments in Concentrator Photovoltaic Systems—A Review
50. Weber Law Based Approach forMulti-Class Image Forgery Detection.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.