Search for persons
X
?
Rising Threats in Expert Applications and Solutions; Lecture Notes in Networks and Systems ,
2
Intrusion Detection of Internet of Things Botnet Attacks Us..:
, In:
?
2022 International Conference on Futuristic Technologies (INCOFT) ,
3
Dual Mode Host-Based and Cloud-Based Smartphone Intrusion D..:
, In:
?
Rising Threats in Expert Applications and Solutions; Lecture Notes in Networks and Systems ,
4
A Secure Framework for the Deployment of Microservices Usin..:
, In:
?
2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC) ,
5
Data Driven Approach to Predict Ground Water Level using Su..:
, In:
?
Rising Threats in Expert Applications and Solutions; Lecture Notes in Networks and Systems ,
6
A Survey on Water Usage Optimization Using Artificial Intel..:
, In:
?
Lecture Notes in Networks and Systems; Proceedings of the 2nd International Conference on Computational and Bio Engineering ,
8
A Comparative Performance Analysis of AOMDV and PAR Algorit..:
, In:
?
Information and Communication Technology for Competitive Strategies (ICTCS 2020); Lecture Notes in Networks and Systems ,
10
Python GUI for Language Identification in Real-Time Using F..:
, In:
?
Rising Threats in Expert Applications and Solutions; Advances in Intelligent Systems and Computing ,
11
Automated Voter System by Using Fingerprint and Offline Dat..:
, In:
?
Advances in Intelligent Systems and Computing; Advances in Artificial Intelligence and Data Engineering ,
12
A Novel Approach for Error Analysis in Classified Big Data ..:
, In:
?
Advances in Intelligent Systems and Computing; Advances in Artificial Intelligence and Data Engineering ,
13
Braille Cell Segmentation and Removal of Unwanted Dots Usin..:
, In:
?
Rising Threats in Expert Applications and Solutions; Advances in Intelligent Systems and Computing ,
14
Analytical Design of the DIS Architecture: The Hybrid Model:
, In:
?
Rising Threats in Expert Applications and Solutions; Advances in Intelligent Systems and Computing ,
15