“Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework” has been added to your cart. Continue shopping “DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × Enhancing Heart-Beat-Based Security for mHealth Applications ₹4,500 Enhancing Heart-Beat-Based Security for mHealth Applications quantity ₹4,500 × A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud ₹4,500 A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud quantity ₹4,500 × Design Space?Time Trellis-Coded Intercarrier Interference Parallel Cancelation Architectures for OFDM Systems ₹4,500 Design Space?Time Trellis-Coded Intercarrier Interference Parallel Cancelation Architectures for OFDM Systems quantity ₹4,500 × Relevance Feature Discovery for Text Mining ₹4,500 Relevance Feature Discovery for Text Mining quantity ₹4,500 × Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework ₹4,500 Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework quantity ₹4,500 × DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments ₹4,500 DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹31,500 Total ₹31,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout