34 results on '"Mohammad Iftekhar Husain"'
Search Results
2. Security Analysis of Mobile Money Applications on Android.
3. A Decision Support System for Personality Based Phishing Susceptibility Analysis.
4. Towards building a word similarity dictionary for personality bias classification of phishing email contents.
5. Covert Botnet Command and Control Using Twitter.
6. Enabling Wide Area Single System Image Experimentation on the GENI Platform.
7. Lightweight Reconfigurable Encryption Architecture for Moving Target Defense.
8. CD-PHY: Physical layer security in wireless networks through constellation diversity.
9. PGV: A Storage Enforcing Remote Verification Scheme.
10. A Simple Cost-Effective Framework for iPhone Forensic Analysis.
11. D-RNA: Towards a DDoS Resistant Network Architecture using Social Network Analysis.
12. iForensics: Forensic Analysis of Instant Messaging on Smart Phones.
13. Bidirectional data verification for cloud storage.
14. A Novel Approach for Security and Robustness in Wireless Embedded Systems.
15. Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams
16. How to Bypass Verified Boot Security in Chromium OS
17. Almost Universal Hash Families are also Storage Enforcing
18. CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity
19. Storage Enforcement with Kolmogorov Complexity and List Decoding
20. An Approach to Developing EEG-Based Person Authentication System
21. An Authentication System using Neurological Responses to Music
22. Design and Development of a Mobile EEG Data Analytics Framework
23. Bidirectional data verification for cloud storage
24. Improving Network Management by XML to Relational Data Translation
25. Moving Target Defense Mechanisms in Cyber-Physical Systems
26. Implementation Vulnerability Associated with OAuth 2.0 -- A Case Study on Dropbox
27. Facebook Privacy Management Simplified
28. Towards building a word similarity dictionary for personality bias classification of phishing email contents
29. Lightweight Reconfigurable Encryption Architecture for Moving Target Defense
30. Enabling Wide Area Single System Image Experimentation on the GENI Platform
31. PGV: A Storage Enforcing Remote Verification Scheme
32. CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity
33. A Simple Cost-Effective Framework for iPhone Forensic Analysis
34. iForensics: Forensic Analysis of Instant Messaging on Smart Phones
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.