Active Jamming-Aware Traffic Allocation And Jamming Attack When Intelligence Of Adversary’s Attack Type Is Unknown
PsoPSO based fuzzy clustering for replicated gene expression data
Resource Contention in Task Parallel Problems
Privacy preserving on mobile health data in cloud
Steganography For Data Reading And Information Hiding in Compressed Video
MULTIBANKING ONLINE TRANSACTION PROCESSING USING DATA TRANSFER SECURITY MODEL
Resource Contention in Task Parallel Problems.docx
A SECURE AND EFFICIENT CONFERENCE KEY DISTRIBUTION SYSTEM