A Review on Authentication Protocols in Wireless Body Area Networks (WBAN)
Narwal, Bhawna, Mohapatra, A.K.
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Get full text
Conference Proceeding
Proposing a Key Escrow Mechanism for Real-Time access to End-to-End encryption systems in the Interest of Law Enforcement
Bharadwaj, Pooja, Pal, Harshita, Narwal, Bhawna
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Get full text
Conference Proceeding
Finding out the needy one from Tweets : An analysis using #kerelafloods
Ranjan, Rahul, Sarma, Himangshu, Saharia, Navanath
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Get full text
Conference Proceeding
Secured Secret Sharing and Reconstruction Algorithm for Organizations
Narwal, Bhawna, Mohapatra, A.K.
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Get full text
Conference Proceeding
Water Quality Data Analysis and Monitoring System in IoT Environment
Khaire, Supriya R., Wahul, Revati M.
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Get full text
Conference Proceeding
Study on Scattering Models for UWOC Channel Using Monte Carlo Simulation
Rani, Anchal, Kumar, Arvind
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Get full text
Conference Proceeding
Filtering of Noise in Audio/Voice Signal
Thakur, Rishma, Pandey, Manoj Kumar, Gupta, Neeraj
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Get full text
Conference Proceeding
Encrypted Web Traffic Classification
Balhwan, Suman, Kumari, Noble, Mohapatra, A.K
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Get full text
Conference Proceeding
Wind Forecasting:Hybrid Statistical and Deep Neural Network Approaches
Kumar, Himanshu, Arora, Parul, Panigrahi, Bijaya Ketan
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Get full text
Conference Proceeding
Mitigating popularity bias in Twitter- Recommending novel hashtags using pooled tweets
Sharma, Chhavi, Bedi, Punam
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Get full text
Conference Proceeding
Analyzing Detection Avoidance of Malware by Process Hiding
Kirmani, Mariya Shafat, Banday, M. Tariq
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Get full text
Conference Proceeding
A Primer on Intelligent Defense Mechanism to Counter Cloud Silent Attacks
Mukoko, Fungayi Donewell, Thada, Vikas
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Get full text
Conference Proceeding
Security Requirements Extraction and Classification: A Survey
Kadebu, Prudence, Thada, Vikas, Chiurunge, Panashe
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Published in 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I) (01.10.2018)
Get full text
Conference Proceeding