Product | Details | Total |
---|---|---|
![]() | Vulnerable Concealed Map-Reading Inside Mobile Ad Hoc Networks Rs4,500.00 Number of techniques has been used based on packet encryption to protect the data forwarding… | Rs4,500.00 |
![]() | Visual Role Mining A Picture Is Worth a Thousand Roles Rs2,500.00 ACCESS control is the process of mediating requests to data and services maintained by a… | Rs2,500.00 |
![]() | Zone Trust Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using SHT Rs2,500.00 Abstract—Due to the unattended nature of wireless sensor networks, an adversary can physically capture and… | Rs2,500.00 |
Cart totals
Add a coupon
SubtotalRs9,500.00
9% CGSTRs855.00
9% SGSTRs855.00
Total
Rs11,210.00