“A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection” has been added to your cart. Continue shopping “Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications” has been added to your cart. Continue shopping “An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Sum capacity maximization for MIMO?OFDMA based cognitive radio networks ₹3,500 Sum capacity maximization for MIMO?OFDMA based cognitive radio networks quantity ₹3,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × Stocks Market Prediction Using Support Vector Machine ₹4,500 Stocks Market Prediction Using Support Vector Machine quantity ₹4,500 × Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? ₹4,500 Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? quantity ₹4,500 × Relevance Feature Discovery for Text Mining ₹4,500 Relevance Feature Discovery for Text Mining quantity ₹4,500 × CSR: Classi?ed Source Routing in DHT-Based Networks ₹4,500 CSR: Classi?ed Source Routing in DHT-Based Networks quantity ₹4,500 × Dynamic Spectrum Allocation for the Downlink of OFDMA-Based Hybrid-Access Cognitive Femtocell Networks ₹5,500 Dynamic Spectrum Allocation for the Downlink of OFDMA-Based Hybrid-Access Cognitive Femtocell Networks quantity ₹5,500 × Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework ₹4,500 Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework quantity ₹4,500 × DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments ₹4,500 DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments quantity ₹4,500 × QoS-aware Node Selection Algorithm for Routing Protocols in VANETs ₹4,500 QoS-aware Node Selection Algorithm for Routing Protocols in VANETs quantity ₹4,500 × A Survey on Blood Vessel detection Methodologies in Retinal Images ₹4,500 A Survey on Blood Vessel detection Methodologies in Retinal Images quantity ₹4,500 × Supervised Classification Analysis with Information-Theoretic Methods ₹4,500 Supervised Classification Analysis with Information-Theoretic Methods quantity ₹4,500 × The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities ₹4,500 The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities quantity ₹4,500 × Hybrid Clustering Scheme for Drone based Cognitive Internet of Things ₹4,500 Hybrid Clustering Scheme for Drone based Cognitive Internet of Things quantity ₹4,500 × A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection ₹4,500 A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection quantity ₹4,500 × Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications ₹4,500 Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications quantity ₹4,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹76,500 Total ₹76,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout