“Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection ₹4,500 A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection quantity ₹4,500 × Relevance Feature Discovery for Text Mining ₹4,500 Relevance Feature Discovery for Text Mining quantity ₹4,500 × A 65 nm Cryptographic Processor for High Speed Pairing Computation ₹4,500 A 65 nm Cryptographic Processor for High Speed Pairing Computation quantity ₹4,500 × A Suitable Initialization Procedure for Speeding a Neural Network Job-Shop Scheduling ₹4,500 A Suitable Initialization Procedure for Speeding a Neural Network Job-Shop Scheduling quantity ₹4,500 × Max-Min Fair Resource Allocation for SWIPT in Multi-Group Multicast OFDM Systems ₹4,500 Max-Min Fair Resource Allocation for SWIPT in Multi-Group Multicast OFDM Systems quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹27,000 Total ₹27,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout