A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches Subtitle
By : Harnoor Mehta
Book Info
A Comparison of Four Photogrammetry Methodologies in Determining Unknown Height of Persons Subtitle
By : Anand Sarkar
A Compositional Automation Engine for Verifying Complex System Software Subtitle
By : Samiksha Sahu
A GIS Based Spatial Analysis of Flood Susceptibility Using Machine Learning Models in Data Scarce Regions Subtitle
By : Vicky Mehta
A Highly Reliable and Secure Strong Physically Unclonable Functions for Internet of Things Devices Subtitle
By : Prashant Patel
A Hybrid Phishing Email Detection Framework Leveraging Transformer-Based Embeddings, NIST PhishScale, and Ensemble Learning Subtitle
By : Vimal Kumar
A Lightweight Highly Secure PUF-Based Security Suite for Constrained Devices Subtitle
By : Lakshmi Gaikwad
A mobile and cloud-based framework for plant stress detection from crowdsourced visual and infrared imagery Subtitle
By : Meera Agarwal
A Multi-Level Brain-Computer Interface for Object Recognition and Object Identification Subtitle
By : Sachin Yadav
A Natural Language Interface to the Da Vinci Surgical Robot Subtitle
By : Yashasvi Khanna