“Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data ₹4,500 Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data quantity ₹4,500 × Generalized 3-D Constellation Design for Spatial Modulation ₹4,500 Generalized 3-D Constellation Design for Spatial Modulation quantity ₹4,500 × A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection ₹4,500 A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection quantity ₹4,500 × CSR: Classi?ed Source Routing in DHT-Based Networks ₹4,500 CSR: Classi?ed Source Routing in DHT-Based Networks quantity ₹4,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 × Supervised Classification Analysis with Information-Theoretic Methods ₹4,500 Supervised Classification Analysis with Information-Theoretic Methods quantity ₹4,500 × Hybrid Clustering Scheme for Drone based Cognitive Internet of Things ₹4,500 Hybrid Clustering Scheme for Drone based Cognitive Internet of Things quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹36,000 Total ₹36,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout