162 results on '"Shaikh, Riaz Ahmed"'
Search Results
2. Retraction Note: Dynamic pseudonyms trust-based model to protect attack scenario for internet of vehicle ad-hoc networks
3. Decoding the animated text-based captchas to verify their robustness against automated attacks
4. Window Functions for Phasor Signal Processing of Wide-Area Measurement in Smart Grid Internet of Things Communications
5. A Self-reliant Trust Management Model for VANETs
6. Window Functions for Phasor Signal Processing of Wide-Area Measurement in Smart Grid Internet of Things Communications
7. A novel dataset of date fruit for inspection and classification
8. Smart Intelligent System for Mobile Travelers Based on Fuzzy Logic in IoT Communication Technology
9. Lightweight Trust Model with Machine Learning scheme for secure privacy in VANET
10. Location Closeness Model for VANETs with Integration of 5G
11. A DDoS Attack Mitigation Framework for IoT Networks using Fog Computing
12. TQ-Model: A New Evaluation Model for Knowledge-Based Authentication Schemes
13. A Self-reliant Trust Management Model for VANETs
14. Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks
15. Dynamic pseudonyms trust-based model to protect attack scenario for internet of vehicle ad-hoc networks.
16. Dynamic pseudonyms trust-based model to protect attack scenario for internet of vehicle ad-hoc networks
17. The Design and Evaluation of Novel Ananimated Captcha Schemes Based on Humans’ Natural Vision Capabilities
18. An analysis of fault detection strategies in wireless sensor networks
19. Trust Model for Reliable Grouping-Based Communications in Vehicular Ad-Hoc Networks
20. A Novel Dataset of Date Fruit for Inspection and Classification
21. People's History of Pakistan: Peasants' Uprisings in East Bengal / East Pakistan (1946 – 50)
22. A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets
23. Segmentation of connected characters in text-based CAPTCHAs for intelligent character recognition
24. Trust Management Method for Vehicular Ad Hoc Networks
25. Image-Feature Based Human Identification Protocols on Limited Display Devices
26. Human Identification Through Image Evaluation Using Secret Predicates
27. LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network
28. THE EFFECT OF INVENTORY MANAGEMENT PRACTICES ON SUPPLY CHAIN PERFORMANCE: EVIDENCE FROM PRIVATE HOSPITALS OF SINDH PAKISTAN.
29. Dynamic risk-based decision methods for access control systems
30. Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC)
31. Critical applications in vehicular ad hoc/sensor networks
32. Energy-Efficient Fuzzy Management System for Internet of Things Connected Vehicular Ad Hoc Networks
33. A Novel Hybrid Textual-Graphical Authentication Scheme With Better Security, Memorability, and Usability
34. Knowledge and Perception of Marital Rape in Pakistan
35. A Privacy-Preserving Attack-Resistant Trust Model for Internet of Vehicles Ad Hoc Networks
36. Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology
37. Civil-Military Relations in Pakistan: Politicians, the Military and the Media Debating the Country’s National Interests
38. Image-Feature Based Human Identification Protocols on Limited Display Devices
39. An Anomaly Mitigation Framework for IoT Using Fog Computing
40. A hybrid dual-mode trust management scheme for vehicular networks
41. Automation of Traffic Control System Using Image Morphological Operations
42. Security Analysis of Network Anomalies Mitigation Schemes in IoT Networks
43. LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network
44. TQ-Model: A New Evaluation Model for Knowledge-Based Authentication Schemes
45. Risk-Based Decision Methods for Vehicular Networks
46. IMSI Catcher Detection Method for Cellular Networks
47. A contemporary approach for object recognition based on spatial layout and low level features’ integration
48. Security and privacy for IoT and fog computing paradigm
49. Multiple Trips Pattern Mining
50. Intelligent travel information platform based on location base services to predict user travel behavior from user-generated GPS traces
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.