Found about 6 results
Downloads: 138
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
149 - 153Evading Flooding Attack in MANET Using Node Authentication
Anup A. Wanjari | Vidya Dhamdhere [6]
Downloads: 124
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
1752 - 1754Study of Evasion Attack using Feature Selection in Adversarial Environment
Swapnali Jadhav | Vidya Dhamdhere [6]
Downloads: 124 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016
1451 - 1454Review on Medical Secure Systems Using Machine Learning Algorithm
Pragati Hadole [2] | Vidya Dhamdhere [6]
Downloads: 110
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
1052 - 1055Survey on Recent Malicious Data Injection Detection Techniques
Pragati Hadole [2] | Vidya Dhamdhere [6]
Downloads: 103
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
1588 - 1591Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke | Vidya Dhamdhere [6]
Downloads: 101
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
1548 - 1550Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication
Chaitali P. Kathar | Vidya Dhamdhere [6]