“Securing Cognitive Radio Networks against Primary User Emulation Attacks” has been added to your cart. Continue shopping “Multi-Context Integrated Deep Neural Network Model for Next Location Prediction” has been added to your cart. Continue shopping “Low-Power and Fast Full Adder by Exploring New XOR and XNOR Gates” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments ₹4,500 DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments quantity ₹4,500 × Geo-Fencing: Geographical-Fencing based Energy-Aware Proactive Framework for Mobile Devices ₹4,500 Geo-Fencing: Geographical-Fencing based Energy-Aware Proactive Framework for Mobile Devices quantity ₹9,000 × A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks ₹4,500 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks quantity ₹4,500 × Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks ₹5,500 Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks quantity ₹5,500 × Neuro Fuzzy Systems: State-of-the-art Modeling Techniques ₹4,500 Neuro Fuzzy Systems: State-of-the-art Modeling Techniques quantity ₹4,500 × Collaboratively Tracking Interests for User Clustering in Streams of Short Texts ₹4,500 Collaboratively Tracking Interests for User Clustering in Streams of Short Texts quantity ₹4,500 × Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm ₹4,500 Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm quantity ₹9,000 × An efficient multi-channel MAC protocol for wireless adhoc networks ₹5,500 An efficient multi-channel MAC protocol for wireless adhoc networks quantity ₹5,500 × Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework ₹4,500 Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework quantity ₹4,500 × Subcarrier and Power Allocation for OFDMA-Based Cognitive Radio Systems With Joint Overlay and Underlay Spectrum Access Mechanism ₹4,500 Subcarrier and Power Allocation for OFDMA-Based Cognitive Radio Systems With Joint Overlay and Underlay Spectrum Access Mechanism quantity ₹4,500 × A Low Area Overhead NBTI/PBTI Sensor for SRAM Memories ₹4,500 A Low Area Overhead NBTI/PBTI Sensor for SRAM Memories quantity ₹4,500 × DP-MCDBSCAN: Differential Privacy Preserving Multi-core DBSCAN Clustering for Network User Data ₹4,500 DP-MCDBSCAN: Differential Privacy Preserving Multi-core DBSCAN Clustering for Network User Data quantity ₹4,500 × Securing Cognitive Radio Networks against Primary User Emulation Attacks ₹4,500 Securing Cognitive Radio Networks against Primary User Emulation Attacks quantity ₹4,500 × Multi-Context Integrated Deep Neural Network Model for Next Location Prediction ₹4,500 Multi-Context Integrated Deep Neural Network Model for Next Location Prediction quantity ₹4,500 × Low-Power and Fast Full Adder by Exploring New XOR and XNOR Gates ₹4,500 Low-Power and Fast Full Adder by Exploring New XOR and XNOR Gates quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹78,500 Total ₹78,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout