Tomar, Deepak Singh
278  results:
Search for persons X
?
1

Advanced Techniques for Digital Evidence Preservation: The ..:

, In: Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications; Contributions to Environmental Sciences & Innovative Business Technology,
 
?
2

Quantum-Resistant Cryptography to Prevent from Phishing Att..:

, In: Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications; Contributions to Environmental Sciences & Innovative Business Technology,
 
?
3

Revolutionizing Gait Analysis with Blockchain Technology: E..:

, In: Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications; Contributions to Environmental Sciences & Innovative Business Technology,
 
?
4

Blockchain-Based Privacy-Protected Reputation Model for Int..:

, In: Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications; Contributions to Environmental Sciences & Innovative Business Technology,
 
?
5

Building Resilient Digital Forensic Frameworks for NoSQL Da..:

, In: Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications; Contributions to Environmental Sciences & Innovative Business Technology,
 
?
6

Zero-Knowledge Proofs in Blockchain-Enabled Supply Chain Ma..:

, In: Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications; Contributions to Environmental Sciences & Innovative Business Technology,
 
?
7

A Threat modeling approach to analyze and mitigate WhatsApp..:

, In: 2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS),
 
?
8

Blockchain Security and Challenges: A Review:

, In: 2023 IEEE 2nd International Conference on Industrial Electronics: Developments & Applications (ICIDeA),
 
?
9

Precision Agriculture: Crop Image Segmentation and Loss Eva..:

, In: 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC),
 
?
 
?
11

A Sophisticated Framework for Document Forensics:

, In: Communications in Computer and Information Science; Machine Learning, Image Processing, Network Security and Data Sciences,
 
?
12

Internet of Things: A Survey on Fused Machine Learning-Base..:

, In: Lecture Notes in Electrical Engineering; Advanced Machine Intelligence and Signal Processing,
 
?
13

An Approach to Meta-Alert Generation for Anomalous TCP Traf..:

, In: Communications in Computer and Information Science; Security and Privacy,
 
?
14

Guidelines for an Effective Network Forensic System:

, In: International Conference on Intelligent Computing and Smart Communication 2019; Algorithms for Intelligent Systems,
 
?
15

Architecture, Enabling Technologies, Security and Privacy, ..:

, In: 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on,
Singh, Kaptan ; Tomar, Deepak Singh - p. 642-646 , 2018
 
1-15