“A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹9,000 × Service Class Resource Management for Green Wireless-Optical Broadband Access Networks (WOBAN) ₹4,500 Service Class Resource Management for Green Wireless-Optical Broadband Access Networks (WOBAN) quantity ₹4,500 × Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications ₹4,500 Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications quantity ₹4,500 × Visual voice activity detection as a help for speech source separation from convolutive mixtures ₹4,500 Visual voice activity detection as a help for speech source separation from convolutive mixtures quantity ₹4,500 × DP-MCDBSCAN: Differential Privacy Preserving Multi-core DBSCAN Clustering for Network User Data ₹4,500 DP-MCDBSCAN: Differential Privacy Preserving Multi-core DBSCAN Clustering for Network User Data quantity ₹4,500 × QoS-aware Node Selection Algorithm for Routing Protocols in VANETs ₹4,500 QoS-aware Node Selection Algorithm for Routing Protocols in VANETs quantity ₹4,500 × A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection ₹4,500 A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹36,000 Total ₹36,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout