“Securing Cognitive Radio Networks against Primary User Emulation Attacks” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × Low-Power and Fast Full Adder by Exploring New XOR and XNOR Gates ₹4,500 Low-Power and Fast Full Adder by Exploring New XOR and XNOR Gates quantity ₹4,500 × A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection ₹4,500 A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection quantity ₹4,500 × Towards Open-World Person Re-Identification by One-Shot Group-based Verification ₹4,500 Towards Open-World Person Re-Identification by One-Shot Group-based Verification quantity ₹4,500 × Fuzzy Logic-based Routing Algorithm for Lifetime Enhancement in Heterogeneous Wireless Sensor Networks ₹4,500 Fuzzy Logic-based Routing Algorithm for Lifetime Enhancement in Heterogeneous Wireless Sensor Networks quantity ₹4,500 × Securing Cognitive Radio Networks against Primary User Emulation Attacks ₹4,500 Securing Cognitive Radio Networks against Primary User Emulation Attacks quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹27,000 Total ₹27,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout