Found about 3 results
Downloads: 114
Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015
1246 - 1249From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time Critical Traffic
P. Sudha [4] | K. Durairaj [3]
Share this Article
Downloads: 111
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
1581 - 1584Signature Authentication Using Biometric Methods
A. S. Syed Navaz [3] | K. Durairaj [3]
Share this Article
Downloads: 2
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
91 - 93A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud
Dilipprasad.E | Ajay.R | K. Durairaj [3]
Share this Article