“DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments” has been added to your cart. Continue shopping “Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × Relevance Feature Discovery for Text Mining ₹4,500 Relevance Feature Discovery for Text Mining quantity ₹4,500 × Lifetime & Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks ₹5,500 Lifetime & Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks quantity ₹5,500 × DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments ₹4,500 DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments quantity ₹4,500 × Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation ₹4,500 Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹23,500 Total ₹23,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout