Skip to main content
Koha online
Your cart is empty.
Cart
Lists
Public lists
WISE
joshi shubhangi
Computer Science
Technical communication
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
SNDT WOMEN'S UNIVERSITY
BMK Knowledge Resource Centre
Vithaldas Vidyavihar, Juhu Tara Road,
Santacruz (West) Mumbai - 400049
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog by keyword
Advanced search
Authority search
Tag cloud
Contact
Log in to your account
Card number or username:
Password:
Home
Advanced search
Results of search for 'ccl=su:"Security "', page 3 of 3
Refine your search
Availability
Limit to records with available items
Authors
Aastha Verma
Ankita Singh
Dr.Firas M.Tuaimah
Gollmann, Dieter
Hala M.Abbas
Hassan, Nihad ; Hij...
Heena
Immareddy suhash red...
Jha, Raghbendra ; Ga...
Karthick S
Kaufman, Charlie ; P...
Paritosh pawar
Paula C
Paula C.Useche Muril...
Raju Lal Bhardwaj
Raveendra Podeti
Sam bodjrenou
Sharma, Vidushi ; Jo...
Stallings, William
Subramanian, Chandra...
Show more
Show less
Collections
NTB
Item types
Book
Journal Article
Topics
Algorithms
Blockchain
child nutrition
Commerce and Mana...
Computer Science
Electronics
ENGINEERING
Food Technology
FOOD TECHNOLOGY
General Books (inter...
hackers
MCA
Show more
Show less
Your search returned 52 results.
Sort
First
Previous
1
2
3
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to cart
Add to list
New list
Place hold
Results
41.
Cryptography in IoT Using Elliptic Curve Cryptography with Adaptive Hunter-Prey Optimization
by
C.A. Yogaraja
In:
IETE Journal of Research
New Delhi IETE
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
42.
Secured IoT Data Transmission with Enhanced Integrated Encryption Techniques with Blockchain Technology
by
S. Joseph
In:
IETE Journal of Research
New Delhi IETE
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
43.
Use of CNNs for follower mobile agents with safe distance
by
Paula C
Robinson jimenez mereno
In:
Indian Journal of Modern Wireless & Optical Communication
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
44.
Comparative Analysis of detection and prevention security techniques in mobile agents system
by
Heena
Gurpreet singh
In:
Indian Journal of Information Security and Computer
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
45.
Trust model for hybrid security architecture based on reputation for secure execcution of mobile agents
by
Heman pathak
In:
Indian Journal of Information Science and Computer Application
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
46.
Evaluating the efficiency of security mechanisms in cloud environments
by
D.M.Ajay
Umamaheswari
In:
International Journal of Computer and Electronics Engineering
New Delhi Serial Publication
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
47.
Cyber Security: A Review of Cyber Crimes, Security Challenges and Measures to Control
by
Aastha Verma
Charu Shr
In:
Vision: The Journal of Business Perspectives
New Delhi Sage Publications
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
48.
ProDetect; A proactive detection approach of the TCP SYN Flooding attack in the SND Controller
by
Tinku Adhikari
Ajoy kumar khan
In:
IETE Journal of Education
New Delhi IETE
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
49.
A TTP-Free location privacy framework for mobile social networks with key agreement protocol
by
Ahmad mahmoud AI-Badawy
Hala M.Abbas
In:
Indian Journal of Computer Networking & Modern Technique
New Delhi GBS Publisher and Distributors
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
50.
Static Analysis tool for identification of permission misuse by android applications
by
Karthick S
Sumitra Binu
In:
Indian Journal of Computer Networking & Modern Technique
New Delhi GBS Publisher and Distributors
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
51.
cyber security challenges in social media; bridging awareness and action
by
k.Uttamsagar
In:
Indian Journal of Computer Science
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
52.
How to complement traditional instruments to measure the economic dimension of food security in older people? An application for regions of Argentina
by
Milva Geri
Gisela González
In:
Simona Sestito Benefits of a prolonged-release amino acid mixture in four pregnant women with phenylketonuria
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
First
Previous
1
2
3
Not finding what you're looking for?
Make a
purchase suggestion