Product | Details | Total |
---|---|---|
![]() | Face recognition under varying illumination based on adaptive homomorphic eight local directional patterns Rs3,500.00 Spoofing attacks are one of the security traits that biometric recognition systems are proven to… | Rs3,500.00 |
![]() | RIHT A novel Hybrid IP Traceback scheme Rs2,500.00 Because the Internet has been widely applied in various fields, more and more network security… | Rs2,500.00 |
![]() | NDCMC: A Hybrid Data Collection Approach for Large-Scale WSNs Using Mobile Element and Hierarchical Clustering Rs4,500.00 To collect data from large-scale wireless sensor networks (WSNs) is a challenging issue and… | Rs4,500.00 |
![]() | Zone Trust Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using SHT Rs2,500.00 Abstract—Due to the unattended nature of wireless sensor networks, an adversary can physically capture and… | Rs2,500.00 |
Cart totals
Add a coupon
SubtotalRs13,000.00
9% CGSTRs1,170.00
9% SGSTRs1,170.00
Total
Rs15,340.00