ENSEMBLE DESIGN OF MASQUERADER DETECTION SYSTEMS FOR INFORMATION SECURITYT. Subbulakshmi1, S. Mercy Shalinie2, A. Ramamoorthi3
|
A NOVEL APPROACH OF DESIGNING RFID AUTHENTICATION PROTOCOL BASED ON SIMPLE SYMMETRIC KEY (SSK) ALGORITHMPrakash Kuppuswamy1, Shanmugasundaram2, Rajan John3
|
ENHANCED CYBERATTACK DETECTION IN INTERNET OF VEHICLES USING DEEP RESIDUAL NEURAL NETWORKSA.P. Janani, J. Thimmiaraja
|
DESIGN OF ENERGY EFFICIENT APPROXIMATE MULTIPLIERS FOR IMAGE PROCESSING APPLICATIONSChinna V Gowdar1, M C Parameshwara2
|
STATE ADEQUACY EVALUATION USING GENERALIZED REGRESSION NEURAL NETWORK FOR NON-SEQUENTIAL MONTE CARLO SIMULATION BASED COMPOSITE POWER SYSTEM RELIABILITY ANALYSISR. Ashok Bakkiyaraj1 and N. Kumarappan2
|
EFFECTIVE SUMMARY FOR MASSIVE DATA SETA. Radhika
|