From post

Online Hybrid Model for Online Fraud Prevention and Detection.

, и . ICACNI, том 243 из Advances in Intelligent Systems and Computing, стр. 805-815. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of All to All Broadcast on multi mesh of trees using genetic algorithm., и . ICUMT, стр. 1-5. IEEE, (2009)Optimising the DTLS handshake design for TEE enabled sensor nodes., , , и . Int. J. Secur. Networks, 14 (3): 167-179 (2019)Analysis of Multi-Sort Algorithm on Multi-Mesh of Trees (MMT) architecture., и . J. Supercomput., 57 (3): 276-313 (2011)Implementation of Linear Network Coding on Parallel Architecture., и . EMS, стр. 450-454. IEEE Computer Society, (2009)Implementation of intrusion detection model for DDoS attacks in Lightweight IoT Networks., , и . Expert Syst. Appl., (апреля 2023)Resilient Packet Transmission (RPT) for Buffer Based Routing (BBR) Protocol., и . J. Inf. Process. Syst., 12 (1): 57-72 (2016)Different Job Scheduling Methodologies for Web Application and Web Server in a Cloud Computing Environment., и . ICETET, стр. 569-572. IEEE Computer Society, (2010)Linear Network Coding on Multi-Mesh of Trees (MMT) using All to All Broadcast (AAB)., и . CoRR, (2013)Sunrise Based Alarm Clock using IoT., , , , , , и . ACI@ISIC, том 3283 из CEUR Workshop Proceedings, стр. 40-48. CEUR-WS.org, (2022)Problems in Replica Server Placement (RSP) over Content Delivery Networks (CDN)., , и . ICCCT, стр. 175-179. ACM, (2015)