NETWORK SECURITY

In stock

S.NO NETWORK SECURITY 2019-2020 Price approx
GURU01 A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning on Physical Leakage Information PDF/DOC
GURU02 A Secure Exception Mode for Fault-Attack-Resistant  Processing PDF/DOC
GURU03 AccConF An Access Control Framework for Leveraging In-Network Cached Data in the ICN- Enabled Wireless Edge PDF/DOC
GURU04 Adding Support for Automatic Enforcement of Security Policies in NFV Networks PDF/DOC
GURU05 Advancing the State-of-the-Art in Hardware Trojans  Detection PDF/DOC
GURU06 Atlas Application Confidentiality in Compromised Embedded Systems PDF/DOC
GURU07 Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM PDF/DOC
GURU08 Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database PDF/DOC
GURU09 Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things PDF/DOC
GURU10 Cryptographic Solutions for Credibility and Liability Issues of Genomic Data PDF/DOC
GURU11 Decay-Based DRAM PUFs in Commodity Devices PDF/DOC
GURU12 Defending Against Web Application Attacks Approaches, Challenges and Implications PDF/DOC
GURU13 Defending Against Web Application Attacks Approaches, Challenges and Implications PDF/DOC
GURU14 Design and Implementation of the Ascend Secure Processor PDF/DOC
GURU15 Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming PDF/DOC
GURU16 Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation PDF/DOC
GURU17 Emerging Attacks and Solutions for Secure Hardware in the Internet of Things PDF/DOC
GURU18 Estimating Cardinality of Arbitrary Expression of Multiple Tag Sets in a Distributed RFID System PDF/DOC
GURU19 Evolving Bipartite Authentication Graph Partitions PDF/DOC
GURU20 Exact Inference Techniques for the Analysis of Bayesian Attack Graphs PDF/DOC
GURU21 Fast Data Plane Testing for Software-Defined Networks With RuleChecker PDF/DOC
GURU22 FastGeo Efficient Geometric Range Queries on Encrypted Spatial Data PDF/DOC
GURU23 Fault-Tolerant Adaptive Routing in Dragonfly Networks PDF/DOC
GURU24 Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems PDF/DOC
GURU25 GaitLock Protect Virtual and Augmented Reality Headsets Using Gait PDF/DOC
GURU26 G-SIR An Insider Attack Resilient Geo-Social Access Control Framework PDF/DOC
GURU27 HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion PDF/DOC
GURU28 High Rate Robust Codes with Low Implementation  Complexity PDF/DOC
GURU29 Investigating the Multi-Ciphersuite and Backwards-  Compatibility Security of the Upcoming TLS 1.3 PDF/DOC
GURU30 KI-Mon ARM A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object PDF/DOC
GURU31 Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection PDF/DOC
GURU32 Memory-Efficient Implementation of Elliptic Curve  Cryptography for the Internet-of-Things PDF/DOC
GURU33 Optimal Spot-Checking for Collusion Tolerance in Computer Grids PDF/DOC
GURU34 Optimizing Gradual SDN Upgrades in ISP Networks PDF/DOC
GURU35 PersonaIA A Lightweight Implicit Authentication System based on Customized User Behavior Selection PDF/DOC
GURU36 Privacy-Aware Caching in Information-Centric Networking PDF/DOC
GURU37 Privacy-Preserving Aggregate Queries for Optimal Location Selection PDF/DOC
GURU38 Privacy-Preserving Multi-Keyword Top-k k Similarity Search Over Encrypted Data PDF/DOC
GURU39 Refinement-Based Specification and Security Analysis of Separation Kernels PDF/DOC
GURU40 SADI A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks PDF/DOC
GURU41 SADI A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks PDF/DOC
GURU42 Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets PDF/DOC
GURU43 Stochastic Model Checking for Predicting Component Failures and Service Availability PDF/DOC

 

Compare
Category:
Submit your review

Your email address will not be published. Required fields are marked *

Reviews

There are no reviews yet.

Shop By Department

NETWORK SECURITY