Search Results - "Mahatma Gandhi"
Suggested Topics within your search.
Suggested Topics within your search.
- Biography 2
- Statesmen 2
- Computer networks 1
- Democracy 1
- English fiction 1
- Gandhi, Mahatma 1
- Heroes 1
- Indian freedom 1
- Juvenile 1
- Juvenile literature 1
- Lawyers 1
- Mahatma Gandhi 1
- Nationalist 1
- Nationalists 1
- Politics and government 1
- Privacy, Right of 1
- Readers (Elementary) 1
- Readers (Middle school) 1
- Reading comprehension 1
- Security measures 1
- Women political activists 1
-
1
-
2
-
3
-
4
-
5
Security and privacy management, techniques, and protocols
Published 2018Table of Contents: “…A lightweight authentication & encryption protocol for secure communications between resource limited devices without hardware modification : resource limited device authentication / Piotr Ksiazak, Letterkenny Institute of Technology, Ireland, Kevin Curran, Ulster University, United Kingdom -- Role of cryptography in security / Sarvesh Tanwar, Mody University of Science and Technology, Lakshmangarh, India, Anil Kumar, Mody University of Science & Technology, India -- Risk assessment in virtualization / Dev Pandey, Mahatma Gandhi Chitrakoot Gramodaya Vishwavidyalaya, India, Bharat Mishra, Mahatma Gandhi Chitrakoot Gramodaya Vishwavidyalya, India -- Metamorphic malware detection using minimal opcode statistical patterns / Mahmood Fazlali, Shahid Beheshti University, Iran, Islamic Republic of Iran -- False alarm reduction : a profiling mechanism and new research directions / Salima Hacini, Constantine University, Algeria, Zahia Guessoum, Pierre et Marie Curie University, France, Mohamed Cheikh, Lire Laboratory, Constantine2 University, Algeria -- Trust-based analytical models for secure wireless sensor networks / Aminu Usman, Auckland University of Technology, Nigeria, Jairo Gutierrez, Auckland University of Technology, New Zealand, New Zealand -- Intrusion detection systems alerts reduction new approach for forensics readiness / Aymen Akremi, Umm Al-Qura University, Saudi Arabia, Hassen Sallay, Umm Al-Qura University, Saudi Arabia, Mohsen Rouached, Sultanate Qabus University, Oman -- Security visualization extended review issues,classifications, validation methods,trends, extensions / Ferda Özdemir Sönmez, Middle East Technical University, Turkey, Banu Günel, Middle East Technical University, Turkey…”
Book -
6
-
7


