Dissertation, CE (INS) : [225] Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 225
PreviewIssue DateTitleAuthor(s)
18MCEI07.pdf.jpg1-Jun-2020Automated Solutions for Network Security Enterprise OperationsMoondra, Preksha
18MCEI06.pdf.jpg1-Jun-2020Real Time DDOS Attack Detection Using Time Series AlgorithmsPatel, Dhruvi
18MCEI05.pdf.jpg1-Jun-2020Quantum Computing for Secure Communication in Healthcare ApplicationsMakwana, Bhavin
18MCEI04.pdf.jpg1-Jun-2020Performance Flow: Hospital Assets Monitoring and Notification SystemMacwan, Zealous
18MCEI03.pdf.jpg1-Jun-2020Network Security Probing For VPNKodgyale, Priya
18MCEI01.pdf.jpg1-Jun-2020Artificial Intelligence Base 360 Dash-CameraAmbaliya, Meera
17MCEI18.pdf.jpg1-Jun-2019To Handle Software RoT At IaaS Level In CloudParmar, Priya
17MCEI17.pdf.jpg1-Jun-2019IFWI Integrated Firmware Integration automation for ServersTrivedi, Drashti
17MCEI16.pdf.jpg1-Jun-2019Automation Of Workloads In Pre-Silicon Software ValidationSonawane, Susmita
17MCEI15.pdf.jpg1-Jun-2019Analyzing and Automating Manual Activities within Oracle Retail Environment SecuritySondagar, Akshar
17MCEI14.pdf.jpg1-Jun-2019Eliminate False Alerts in Intrusion Detection using Deep LearningSheth, Vidhi
17MCEI13.pdf.jpg1-Jun-2019Sentiment Analysis Based on Images and VideosSanghavi, Vihar
17MCEI12.pdf.jpg1-Jun-2019Establishing Trust In Cloud Using Machine LearningGujaran, Reetu
17MCEI11.pdf.jpg1-Jun-2019Security in 3D Graphics DriversPatel, ShubhamKumar
17MCEI10.pdf.jpg1-Jun-2019Premium Content Protection Using HDCPPatel, Pruthviben
17MCEI09.pdf.jpg1-Jun-2019Advanced framework for Displaying Power, Performance and Thermal Data for Intel CPU DFXPatel, Hetashvi
17MCEI08.pdf.jpg1-Jun-2019Detecting over-claim permission and recognizing dangerous permission using static analysis in Android appsNair, Krishnendu
17MCEI06.pdf.jpg1-Jun-2019Efficient classiffication of True Positive and False Positive vulnerabilities for XSS and CSRF vulnerabilitiesLad, Himani
17MCEI05.pdf.jpg1-Jun-2019Fraud Detection System in Retail ManagementJuthani, Anushree
17MCEI04.pdf.jpg1-Jun-2019Vehicle Identification and Inspection System to Improve Security in Restricted Access AreasDetroja, Dhara
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 225